Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 12 Next »

ModelOp Center requires the following Azure AD configurations when used with OAuth2:

  1. Apps: gateway-service, internal-client, external-integration-client, go-cli

  2. Scopes: custom_scope

  3. App roles: modelop_client

  4. Access tokens version: 2

Normally, access tokens issued by Azure AD are issued for Microsoft Graph. However, ModelOp Center needs access tokens issued for the aforementioned applications. To accomplish that, each application needs a manually created scope (Expose an API tab; Add a scope), custom_scope for example, to indicate the tokens issued for the given application are intended for the application and not Microsoft Graph. Additionally, the custom_scope has to be added as a permission (API permissions tab; Add a permission) on the application and admin consent must be granted (API permissions tab; Grant admin consent for), so that the application can actually use the permission.

For more details per application, please reference the following table:

Application Name

Platform

Application (Client) ID Required

Client Secret Required

Grant Type

Scope

App Roles

Token Claim

Redirect URIs

gateway-service

(C2B)

  1. Web

Authorization Code

  • openid

  • profile

  • email

  • custom_scope

  • offline_access

  • email

  • family_name

  • given_name

  • groups

  • https://<ModelOp Center URL>/login/oauth2/code/gateway-service

internal-client

(B2B)

Client Credentials

  • modelop_client

  • email

  • family_name

  • given_name

  • idtyp

external-integration-client

(C2B)

  1. Single-page application

  2. Mobile and desktop applications

Implicit

  • custom_scope

  • email

  • family_name

  • given_name

  • groups

  1. Single-page application; Redirect URIs

    1. https://<ModelOp Center URL>/jupyterOauth2ImplicitGrant.html

    2. https://<ModelOp Center URL>/modelOpWDC.html

  2. Mobile and desktop applications; Redirect URIs

    1. https://oauth.powerbi.com/views/oauthredirect.html

go-cli

(C2B)

Password

  • custom_scope

  • email

  • family_name

  • given_name

  • groups

NOTE: Once the internal-client app has been created, please open the Overview tab for the app and click on:

  • "Add an Application ID URI"

  • “Set”

  • “Save” the suggested Application ID URI.

In addition to the configurations at Azure AD, ModelOp Center will need to be configured with the following values for:

  • Issuer URI

  • Authorization URI

  • Token URI

  • JWKS URI

  • Client ID for each application

  • Client Secret for each application

  • No labels