You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* Supported account types / Who can use this application or access this API?: select `Accounts in this organizational directory only (Default Directory only - Single tenant)`
@@ -36,7 +36,7 @@
36
36
37
37
2. Retrieve Tenant and Client information.
38
38
39
-
In **Azure Active Directory** / **App Registration**, select **ODM Application** and click **Overview**:
39
+
In **Microsoft Entra Id** / **Manage** / **App Registration**, select **ODM Application** and click **Overview**:
40
40
41
41
* Application (client) ID: **Client ID**. It will be referenced as `CLIENT_ID` in the next steps.
42
42
* Directory (tenant) ID: **Your Tenant ID**. It will be referenced as `TENANT_ID` in the next steps.
@@ -45,7 +45,7 @@
45
45
46
46
3. Generate an OpenID client secret.
47
47
48
-
In **Azure Active Directory** / **App registrations**, select **ODM Application**:
* From the Overview page, click on the link Client credentials: **Add a certificate or secret** or on the **Manage / Certificates & secrets** tab
51
51
* Click + New Client Secret
@@ -58,7 +58,7 @@
58
58
59
59
4. Add Claims.
60
60
61
-
In **Azure Active Directory** / **App registrations**, select **ODM Application**, and in **Manage / Token Configuration**:
61
+
In **Microsoft Entra Id** / **Manage** / **App registrations**, select **ODM Application**, and in **Manage / Token Configuration**:
62
62
63
63
* Add Optional Email ID Claim
64
64
* Click +Add optional claim
@@ -85,7 +85,7 @@
85
85
86
86
To allow ODM rest-api to use the password flow with email as user identifier and the client-credentials flow with client_id as user identifier, we need to create a new claim named "identity" that will take the relevant value according to the flow:
87
87
88
-
In **Azure Active Directory** / **Enterprise applications**, select **ODM Application**, and in **Manage / Single sign-on**:
88
+
In **Microsoft Entra Id** / **Manage** / **Enterprise applications**, select **ODM Application**, and in **Manage / Single sign-on**:
89
89
90
90
* Click Edit in the "Attributes & Claims" section
91
91
* Click + Add new claim
@@ -97,7 +97,7 @@
97
97
98
98
6. API Permissions.
99
99
100
-
In **Azure Active Directory** / **App Registration**, select **ODM Application**, and then click **API Permissions**.
100
+
In **Microsoft Entra Id** / **Manage** / **App Registration**, select **ODM Application**, and then click **API Permissions**.
101
101
102
102
* Click Grant Admin Consent for Default Directory
103
103
@@ -109,7 +109,7 @@
109
109
110
110
7. Manifest change.
111
111
112
-
In **Azure Active Directory** / **App Registration**, select **ODM Application**, and then click **Manifest**.
112
+
In **Microsoft Entra Id** / **Manage** / **App Registration**, select **ODM Application**, and then click **Manifest**.
113
113
114
114
As explained in [accessTokenAcceptedVersion attribute explanation](https://docs.microsoft.com/en-us/azure/active-directory/develop/reference-app-manifest#accesstokenacceptedversion-attribute), change the value to 2.
115
115
@@ -449,7 +449,7 @@ You can now install the product. We will use the PostgreSQL internal database an
449
449
- Decision Server Runtime redirect URI: `https://<INGRESS_ADDRESS>/DecisionService/openid/redirect/odm`
Deploy the **Loan Validation Service** production_deployment ruleapps using the **production deployment** deployment configuration in the Deployments>Configurations tab.
* Supported account types / Who can use this application or access this API?: select `Accounts in this organizational directory only (Default Directory only - Single tenant)`
@@ -42,7 +42,7 @@ For additional information regarding the implement in Liberty, please refer to t
42
42
43
43
2. Retrieve Tenant and Client information.
44
44
45
-
In **Identity** / **Applications** / **App Registration**, select **ODM Application** and click **Overview**:
45
+
In **Microsoft Entra Id** / **Manage** / **App Registration**, select **ODM Application** and click **Overview**:
46
46
47
47
* Application (client) ID: **Client ID**. It will be referenced as `CLIENT_ID` in the next steps.
48
48
* Directory (tenant) ID: **Your Tenant ID**. It will be referenced as `TENANT_ID` in the next steps.
@@ -62,7 +62,7 @@ For additional information regarding the implement in Liberty, please refer to t
62
62
-addext "subjectAltName = DNS:myodmcompany.com"
63
63
```
64
64
65
-
In **Identity** / **Applications** / **App registrations**, select **ODM Application**:
* From the Overview page, click on the link Client credentials: **Add a certificate or secret** or on the **Manage / Certificates & secrets** tab
68
68
* Select the **Certificates** tab
@@ -73,7 +73,7 @@ For additional information regarding the implement in Liberty, please refer to t
73
73
74
74
4. Add Claims.
75
75
76
-
In **Identity** / **Applications** / **App registrations**, select **ODM Application**, and in **Manage / Token Configuration**:
76
+
In **Microsoft Entra Id** / **Manage** / **App registrations**, select **ODM Application**, and in **Manage / Token Configuration**:
77
77
78
78
* Add Optional Email ID Claim
79
79
* Click **+ Add optional claim**
@@ -99,7 +99,7 @@ For additional information regarding the implement in Liberty, please refer to t
99
99
5. Create a custom claim named "identity"
100
100
101
101
To enable the ODM REST API to use both the 'Password Credentials' flow with email as the user identifier and the 'Client Credentials' flow with client_id as the user identifier, we must establish a new claim named "identity" that will dynamically capture the appropriate value based on the chosen flow:
102
-
In **Identity** / **Applications** / **Enterprise applications**, select **ODM Application**, and in **Manage / Single sign-on**:
102
+
In **Microsoft Entra Id** / **Manage** / **Enterprise applications**, select **ODM Application**, and in **Manage / Single sign-on**:
103
103
104
104
* Click on Edit of the "Attributes & Claims" section
105
105
* Click **+ Add new claim**
@@ -110,13 +110,13 @@ For additional information regarding the implement in Liberty, please refer to t
110
110
111
111
6. API Permissions.
112
112
113
-
In **Identity** / **Applications** / **App Registration**, select **ODM Application**, and then click **API Permissions**.
113
+
In **Microsoft Entra Id** / **Manage** / **App Registration**, select **ODM Application**, and then click **API Permissions**.
114
114
115
115
* Click **Grant Admin Consent for <Directoryname>**
116
116
117
117
7. Manifest change.
118
118
119
-
In **Identity** / **Applications** / **App Registration**, select **ODM Application**, and then click **Manifest**.
119
+
In **Microsoft Entra Id** / **Manage** / **App Registration**, select **ODM Application**, and then click **Manifest**.
120
120
121
121
As explained in [accessTokenAcceptedVersion attribute explanation](https://docs.microsoft.com/en-us/azure/active-directory/develop/reference-app-manifest#accesstokenacceptedversion-attribute), change the value of **accessTokenAcceptedVersion** to `2`.
122
122
@@ -334,7 +334,7 @@ You can now install the product. We will use the PostgreSQL internal database an
334
334
- Decision Server Console redirect URI: `https://<INGRESS_ADDRESS>/res/openid/redirect/odm`
335
335
- Decision Server Runtime redirect URI: `https://<INGRESS_ADDRESS>/DecisionService/openid/redirect/odm`
336
336
337
-
From the Azure console, in **Identity** / **Applications** / **App Registrations** / **ODM Application**:
337
+
From the Azure console, in **Microsoft Entra Id** / **Manage** / **App Registrations** / **ODM Application**:
338
338
339
339
- Click`Add Redirect URIs link`
340
340
- Click `Add Platform`
@@ -352,7 +352,7 @@ You can now install the product. We will use the PostgreSQL internal database an
352
352
353
353
The ODM Rule Designer will use the [PKCE authorization code flow](https://oauth.net/2/pkce/) to connect to Decision Center and Decision Server Console.
354
354
355
-
From the Azure console, in**Identity** / **Applications** / **App Registrations** / **ODM Application**:
355
+
From the Azure console, in**Microsoft Entra Id** / **Manage** / **App Registrations** / **ODM Application**:
356
356
357
357
- Click`Add Redirect URIs link`
358
358
- Click `Add Platform`
@@ -406,11 +406,11 @@ To manage ODM runtime call on the next steps, we used the [Loan Validation Decis
406
406
407
407
Import the **Loan Validation Service**in Decision Center connected using *myodmuser*@YOURDOMAIN created at step 2
Deploy the **Loan Validation Service** production_deployment ruleapps using the **production deployment** deployment configuration in the Deployments>Configurations tab.
0 commit comments