Configure PlaceOS Authentication Source
You may supply the client_id
and client_secret
to PlaceOS or your PlaceOS Integration Partner to complete these steps.
Prerequisites
PlaceOS Backoffice Administrator Access
Microsoft Azure App Registration
client_id
andclient_secret
generated in the Microsoft Azure App Registration steps.
Procedure
In PlaceOS Backoffice navigate to the Domains tab.
Select the domain you would like to add Microsoft Authentication to.
Click the Authentication Tab.
Identify the OAuth Source previously created.
Click the Edit Icon.
Update missing fields per the table below.
These fields are specific to the OAuth2 provider and tend to differ slightly between providers.
Details on how Azure handles OAuth2 will be used to describe the following fields.
PlaceOS Field | Requirement |
---|---|
| A friendly name for this authentication configuration. |
| The Client ID provided by Microsoft Azure App Registration. |
| The Secret created in the Microsoft Azure App Registration. |
| This should be set to: ` |
| The scopes, space separated, for the APIs that are intended to be accessed
|
| Azure uses a |
|
|
| The URL to obtain a token from, Azures is:
|
| The URL that initialises the OAuth2 request:
|
| The URL we can use to test the OAuth2 token and obtain user details:
|
| This maps PlaceOS fields to User Profile fields (see below).
|
PlaceOS Staff API
Once you have completed the above steps, you will also need to create a StaffAPI Record for your domain.
To create the Staff API Record follow these instructions on configuring Staff API.
Last updated