Skip to content

OAuth and octoplant communication workflow

This topic explains how octoplant integrates with OAuth for secure authentication and communication. It outlines the participant interaction in during OAuth sign-in process in different network scenarios.

Scenario 1: Direct communication between octoplant server and client (each in the same network)​

This workflow explains the runtime OAuth login flow between octoplant client, octoplant server, ID provider, and DNS, in a same-network scenario, with FQDN and certificates as prerequisites.

In this example, the Configuration name in the Server configuration settings is Svr.demo.com.

Figure: octoplant with OAuth

Scenario 2: Indirect communication between octoplant server and client (each in different networks)​

This workflow explains runtime OAuth login flow between octoplant client, octoplant server, ID provider, DNS, and a CSC-Gateway in a separated-network scenario:

  • CSC Gateway forwards/routes HTTPS traffic between networks.
  • An additional DNS server in separated network and adjustment of matching table is required.
  • A secure certificate needs to be implemented on the octoplant server.
  • The client resolves the server FQDN to the gateway, not the server IP.
  • The client never queries the global DNS. The global DNS is relevant only as configuration context for the server network.
  • In this example, the Configuration name in the Server configuration settings is Svr.demo.com.

Figure: octoplant with OAuth and CSC


Related topics

Use your own certificate