Skip to main content

Documentation Index

Fetch the complete documentation index at: https://docs.abbyy.com/llms.txt

Use this file to discover all available pages before exploring further.

Once you’ve prepared an External Identity Provider (see Configuring an OAuth 2.0 External Identity Provider or Configuring a SAML 2.0 External Identity Provider) and tested it, connect it to your Vantage tenant.
This setup requires the Tenant Administrator role.
When you enable an External Identity Provider, the Resource Owner Password Credentials authentication flow stops working for this tenant.

Connect an External Identity Provider to your tenant

1

Open the Identity Provider settings

In Vantage, click Configuration in the left pane, then click Identity Provider.
2

Switch to External Identity Provider

In the top drop-down, select External Identity Provider.
3

Choose your protocol

In the Protocol field, select OAuth 2.0 or SAML 2.0. The settings panel updates with protocol-specific fields. See OAuth 2.0 fields or SAML 2.0 fields for details on each field.
4

Fill in the protocol-specific fields

Enter the values from the provider you prepared earlier.
External Identity Provider configuration — OAuth 2.0 with Azure AD
5

(Optional) Add associated email domains

Under Associated Email Domains, click + Add Domain URL, enter the domain (for example, example.com) in the Domain URL field, and click Apply. Repeat to add more. For more information, see Associated email domains.
6

Apply the configuration

Click Apply Changes.
Reverting to the Vantage Identity Provider. To undo, select Vantage in the top drop-down and click Apply Changes. You can do this as long as your current session (access token) hasn’t expired. If it has expired, you’ll need to sign in through the configured External Identity Provider to regain access — contact your System Administrator if you’re locked out.

OAuth 2.0 fields

FieldDescription
Identity ProviderThe type of provider. Choose Active Directory Federation Services (AD FS), Azure Active Directory (Azure AD), or Other for any OAuth 2.0-compatible provider.
Identity Provider URLURL of the Identity Provider. In Azure, find it in the Endpoints section of your registered application.
Client IDClient identifier of the application registered in your Identity Provider.
Client Secret(Visible only when Identity Provider is set to Other.) The client secret of the registered application.
Associated Email DomainsEmail domains whose users can sign in to this tenant, even if they don’t have a Vantage account yet. See Associated email domains.

SAML 2.0 fields

FieldDescription
Federation Metadata Document URLURL of your Identity Provider’s SAML 2.0 federation metadata document.
Application ID URI(Optional.) A custom URI that identifies your Vantage application to the Identity Provider (for example, api://<appId>). If left empty, the obsolete default api://platform.abbyy.cloud/{tenantId} is used, where tenantId is the Vantage tenant identifier in GUID format without hyphens (for example, 117489fc1aea41658369d4d18d6557ga).
Associated Email DomainsEmail domains whose users can sign in to this tenant, even if they don’t have a Vantage account yet. See Associated email domains.

Setting up default roles for new users

When users are created automatically through an External Identity Provider, Vantage assigns them the default roles you configure here.
1

Open the Identity Provider settings

In Vantage, click Configuration in the left pane, then click Identity Provider and select External Identity Provider from the top drop-down.
2

Select default roles

In the Default Roles For New Users field, select one or more roles to automatically assign to new users.
3

Apply the configuration

Click Apply Changes.
For each selected role, the Allow all current and further skills toggle is on by default, giving new users access to every skill in the tenant. You can adjust this later for individual users from the Users page. See Role-based access control for details on each role.

Configuring a SAML 2.0 External Identity Provider without an XML file URL

You can configure Vantage to use a SAML 2.0 External Identity Provider by copying the contents of your XML metadata file to the Vantage API request. The contents of XML file should contain the information necessary for interacting with SAML-enabled Identity Providers. To configure a SAML 2.0 External Identity Provider via the Vantage API, do the following:
  1. Authorize in the Vantage API (see Authentication documentation for details).
  2. Send a PUT request with the Authorization = Bearer <access token> header to https://<your-vantage-url>/api/adminapi2/v2/tenants/<tenantId>/external-providers/ with the following request body parameters:
ParameterDescription
kindThe protocol used. The value of the parameter is Saml2.
settings.MetadataThe contents of your XML metadata file.
Sample request:
curl --location --request PUT "https://<your-vantage-url>/api/adminapi2/v2/tenants/<tenantId>/external-providers/"
-H "Authorization: Bearer <token>"
{
  "providerSettings": {
    "kind": "Saml2",
    "settings": {
      "Metadata": "<SAML XML file contents>"
    }
  }
}
curl --location --request PUT 'https://<your-vantage-url>/api/adminapi2/v2/tenants/<tenant-id>/external-providers/'
-H 'Authorization: Bearer <token>'
{
  'providerSettings': {
    'kind': 'Saml2',
    'settings': {
      'Metadata': '<SAML XML file contents>'
    }
  }
}

Setting up an External Identity Provider

Overview of OAuth 2.0 and SAML 2.0 provider setup

Configuring an OAuth 2.0 External Identity Provider

AD FS or Azure AD with OAuth 2.0

Configuring a SAML 2.0 External Identity Provider

AD FS or Azure AD with SAML 2.0

Testing external authentication

Verify the External Identity Provider before users sign in

Associated email domains

Allow users from specific email domains to sign in