OvalEdge Open Authorization (OAuth2) Setup Guide
Open Authorization (OAuth2) is an industry-standard protocol that allows applications to access user data from other services securely, without exposing user credentials.
This document outlines the procedure for configuring OAuth 2.0 authentication for the OvalEdge application using Azure Active Directory (Azure AD).
Prerequisites
Before starting the configuration, ensure the following conditions are met:
Azure AD Access: Administrative access to the Azure Portal with permissions to register and manage applications.
OvalEdge Access: Administrative access to the OvalEdge application and its configuration files.
Tomcat Knowledge: Familiarity with Tomcat server configuration (
setenv.shfor Linux/Mac orsetenv.batfor Windows).Domain Setup: The fully qualified domain name (FQDN) where OvalEdge is hosted (required for setting the Redirect URI).
Steps Involved
Register the Application in Azure AD
Log in to the Azure Portal.
Navigate to: Azure Active Directory > App registrations.
Select + New registration.
Enter a descriptive name for the application.
Choose the appropriate Supported account types according to organizational requirements.
In the Redirect URI section, select Web and enter:
https://<domainname>/ovaledge/oauth2/code/azureClick Register to complete the registration.
Capture Application Credentials
In the registered application’s Overview page, copy the following values:
Client ID
Tenant ID
Navigate to Certificates & secrets.
Under Client secrets, select + New client secret.
Provide a description and choose an expiration period.
Click Add, then copy and securely store the generated Client Secret (this value is displayed only once).
Configure OvalEdge Properties
Update the
oasis.propertiesfile in the OvalEdge installation directory with the following entries:spring.security.oauth2.client.registration.azure.clientId=<clientId> spring.security.oauth2.client.registration.azure.clientSecret=<clientSecret> spring.security.oauth2.client.registration=azure spring.security.oauth2.tenantId=<tenantId>
Enable OAuth2 in Tomcat
Configure Tomcat to enable OAuth2 authentication:
Linux/Mac
export CATALINA_OPTS="-DOVALEDGE_SECURITY_TYPE=oauth2"Windows
SET CATALINA_OPTS="-DOVALEDGE_SECURITY_TYPE=oauth2"
Enable Hybrid Authentication Mode in OvalEdge
Hybrid mode ensures that OvalEdge continues to manage roles while integrating OAuth2 authentication.
Log in to OvalEdge > Configuration > SSO Tab.
Set the following parameter:
ovaledge.saml.type=HYBRID
Verify OAuth2 Authentication
Open a browser and access the OvalEdge application URL.
Select Log in with Azure.
Enter valid Azure AD credentials.
Confirm successful login to verify the OAuth2 integration.
Error Handling and Troubleshooting
Invalid Redirect URI: Ensure the Redirect URI configured in Azure AD exactly matches the domain name used by OvalEdge.
Expired Client Secret: Renew the secret in Azure AD and update the
oasis.propertiesfile.Tomcat Startup Failure: Verify that
CATALINA_OPTSis set correctly and does not conflict with other JVM options.Login Failure: Check the OvalEdge logs (
catalina.outor application logs) for OAuth2-related errors.
Copyright © 2025, OvalEdge LLC, Peachtree Corners, GA, USA.
Last updated
Was this helpful?

