OAuth settings

Prerequisite: To configure the OAuth settings, you must have the OAUTH2ADM access code.

The OAuth settings page has three tabs:

  • Clients: This tab is for internal KMD use only.
  • Integrations: Here you can configure access to WorkZone by the third-party apps registered in your Entra tenant. By default, there are nine built-in integration accounts that you can configure for different third-party apps.
  • Confidential clients: Here you can specify an existing WorkZone user that a third-party app can use as an integration user.

The Clients tab

Important: This tab is for internal KMD use only. The settings on this tab are obsolete and the tab will be removed in coming releases.

The Integrations tab

Use the Integrations tab to configure access to WorkZone by the third-party apps registered in your Entra tenant. By default, there are nine built-in integration accounts that you can configure for different third-party apps.

Set up a new third-party integration account

  1. In WorkZone Configurator, click GlobalOAuth Settings > Integrations.
  2. On the OAuth settings page, hover the mouse over the integration account you want to edit, and click in the menu.
  3. In the [%account_name] - OAuth Integration settings form, fill in and edit the needed settings:
    • Account ID: This field is read-only.
    • Object ID: Enter the object ID of your Enterprise app registration in Azure.
    • Security code: From the dropdown, select the security code.
    • Department: Select a department from the dropdown, if this integration should only apply to a specific department within your organization.
    • Allow to act on behalf of other users: Turn on to allow this account to act on behalf of other users.
    • Departmental access: Turn on to give the integration account full access to any items within the selected Authority.
    • Global access: Enable to give the integration account full access to any items in the whole organization.
  4. Click Save.

The Confidential clients tab

Use the Confidential clients tab to configure access to WorkZone by the third-party apps that are registered in your Entra tenant. On this tab, you can select an already existing WorkZone user account. This gives you the option to create and configure your own WorkZone user accounts in, for example, Active Directory or Entra ID, if you need more than the nine existing integration accounts.

Make an existing WorkZone account an integration user

  1. In WorkZone Configurator, click GlobalOAuth Settings > Confidential clients.
  2. In the lower right corner, click Create.
  3. In the Create oAuth2ConfidentialClient dialog fill in the settings for:
    • Client name (Optional): Name the new client, so you can easily identify it.
    • Object ID: Enter the object ID of your Enterprise app registration in Azure.
    • User: Select an existing WorkZone user account to allow the third-party app to act through.
  4. Click Create.

See also:

Set up third-party integrations in Azure