CyberApp SSO service account
Note
For more information on OpenID, see OpenID Foundation website.
To use Acronis as an OpenID provider for your systems, you must generate an SSO service account credentials.
Note
To do this, you must specify a list of redirect URIs which will receive the OIDC authentication credentials.
id_token
access_token
These tokens can then be used to make calls to Acronis API to fetch data and interact with the Acronis system.
Note
For technical information on CyberApp SSO implementation, see CyberApp OIDC SSO authentication.
The CyberApp SSO flow
The CyberApp must offer a link to users in the Acronis UI. This is not a redirect link. It simply verifies that the tenant exists on the vendor cloud service and then starts the authentication and redirect process.
Important
Acronis recommends that you include the
tenant_id
Acronis system variable in the link.The vendor must generate SSO credentials, which are used by the vendor to check Acronis and confirm that this is a legitimate, authorized call.
Note
To avoid being redirected to the wrong final landing URI,the list of final landing URIs is predefined and cannot be changed.
- The vendor gets information about the user, such as which roles the user has. This can be used to show different type of functionality.For example, if it is an admininistrator user, the vendor can show full UI. If it is a user with read-only rights, the vendor can show UI which doesn’t allow any modification. So, the vendor just needs to be aware of roles available on Acronis side and, based on the role Acronis returns, provide capabilities on their console.
The user is redirected to one of the URIs from the CyberApp’s SSO service account pre-defined redirect URI list.