Creating an Application Group |
Scroll |
Thereforeā¢ Generic OIDC authentication via AD FS requires creating an Application Group on the AD FS server. Please follow the steps below to create the Application Group.
1. Select Application Groups in the AD FS tree view. Click Add Application Groupā¦ in the Actions pane.
2. Type in the desired name for the Application Group. Select Web browser accessing a web application and click Next.
3. Add the Redirect URI for the Thereforeā¢ Web Application and then press Next. For Thereforeā¢ Online the URI follows the pattern shown in the example below. Here, <tenantName> needs to be replaced with the actual tenant name.
https://<tenantName>.thereforeonline.com/signin
To enable OIDC authentication for Thereforeā¢ installed clients such as the Thereforeā¢ Navigator two more URLs need to be added, as shown in the screenshot below. These URLs can also be added later.
http://127.0.0.1:64957/redirect
http://localhost:64957/redirect
Note: Redirect URIs for other Thereforeā¢ applications such as the Thereforeā¢ Go app can be found here. |
4. The next step involves choosing the access control policy for this application. For additional information about Access Control Policy templates and creating customized templates the relevant Microsoft documentation provides a detailed description. Click Next to continue.
5. Check the information displayed on the summary page. Click Next to confirm.
This concludes creating an application group. Click here for the tutorial on setting the necessary Client Permissions.