Skip to main content

Adding an External Authentication System (OpenID)

RCOM Gateway supports integration with OpenID Connect (OIDC) providers to enable secure Single Sign-On (SSO) and centralized identity management. This guide walks you through configuring an OpenID-based authentication system using the Admin Console.

Where to Begin

From the Gateway Dashboard go to:

Settings → Client Settings → Auth Systems

Add new auth system

Add new auth system

  1. Click ➕ Create Auth System

  2. You will be redirected to the Create Auth System page.

  3. Under Name, provide a display name for your auth system.

  4. In the Auth Type dropdown, select OpenID.

info

Currently, only OpenID is supported. LDAP configuration is not applicable at this time.

Auth System Configuration

Once navigated to the form, fill in the following fields.

Add basic authentication info

Add basic authentication info

Basic Information

FieldDescription
NameA unique display name for the authentication system (e.g., AzureAD_SSO).
Auth TypeSet to OpenID.
Authentication EndpointAuthorization URL from the provider (see below).
Default GroupSelect the default RCOM Gateway Group for authenticated users (e.g., Admins).
info

🔗 AUTHENTICATION ENDPOINT:
Must include the tenant-specific authorization URL. For Azure:

https://login.microsoftonline.com/<TENANT_ID>/oauth2/v2.0/authorize

Parameters

Add authentication parameters

Add authentication parameters

FieldDescription
Client IDUnique identifier for the registered application in your identity provider.
Response TypeType of OAuth2 response expected (e.g., code for authorization code flow).
Response ModeMethod used to return the authorization response (e.g., query, form_post).
Redirect URIMust exactly match one of the URIs registered in the OpenID provider's app.
ScopeList of requested claims (e.g., openid profile email).
StateOptional. Protects against CSRF attacks or used to maintain request context.
Tenant IDIdentifier for your identity provider tenant (e.g., Azure AD Directory ID).
Client SecretSecret key associated with the Client ID (used for token exchange).
InstanceBase URL of the identity platform (e.g., https://login.example.com/).

Role & Group Mapping

Map user roles and access groups

Map user roles and access groups

Auth System Roles
Define mappings between external user roles and RCOM Gateway roles.

FieldExample
NameExternal_Admins
RCOM Gateway RoleSuper_Master_All

Use ➕ Add New Role to define more.

Auth System Groups
You may also map specific external groups to internal RCOM Gateway access groups.

FieldExample
NameWave1Users
RCOM Gateway GroupMaps

Use ➕ Add New Group to map more groups.

Submit & Activate

  1. Click Submit to save the configuration.

  2. Your new OpenID Auth System will appear in the Auth Systems list.

RCOM Gateway will now delegate login to this identity provider.

Auth system in action

Auth system in action

Validation & Best Practices

  • 🔐 Always use HTTPS in all Redirect URIs and Instance URLs.

  • 🧪 Ensure the client app is properly registered in your OpenID provider.

  • ✔ Confirm the redirect URI is exactly matched in the provider configuration.

  • 👥 Carefully map roles and groups to avoid unauthorized access.

Example

FieldExample Value
Auth Endpointhttps://login.example.com/<TENANT_ID>/oauth2/v2.0/authorize
Client IDxxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx
Client Secret***************
Scopeopenid profile email
Response Typecode
Response Modequery
Redirect URIhttps://your-gateway.example.com/RCOMUI/
StatecustomStateValue
Tenant ID<TENANT_ID>
Instancehttps://login.example.com/
Default RCOM Gateway GroupAdmin
Mapped RoleExternal Role: Example_Admins → RCOM Gateway Role: Super_Master_All
Mapped GroupExternal Group: Example_Group_1 → RCOM Gateway Group: 00_Live_Wave1