OceanBase logo

OceanBase

A unified distributed database ready for your transactional, analytical, and AI workloads.

DEPLOY YOUR WAY

OceanBase Cloud

The best way to deploy and scale OceanBase

OceanBase Enterprise

Run and manage OceanBase on your infra

TRY OPEN SOURCE

OceanBase Community Edition

The free, open-source distributed database

OceanBase seekdb

Open source AI native search database

Customer Stories

Real-world success stories from enterprises across diverse industries.

View All
BY USE CASES

Mission-Critical Transactions

Global & Multicloud Application

Elastic Scaling for Peak Traffic

Real-time Analytics

Active Geo-redundancy

Database Consolidation

Resources

Comprehensive knowledge hub for OceanBase.

Blog

Live Demos

Training & Certification

Documentation

Official technical guides, tutorials, API references, and manuals for all OceanBase products.

View All
PRODUCTS

OceanBase Cloud

OceanBase Database

Tools

Connectors and Middleware

QUICK START

OceanBase Cloud

OceanBase Database

BEST PRACTICES

Practical guides for utilizing OceanBase more effectively and conveniently

Company

Learn more about OceanBase – our company, partnerships, and trust and security initiatives.

About OceanBase

Partner

Trust Center

Contact Us

International - English
中国站 - 简体中文
日本 - 日本語
Sign In
Start on Cloud

A unified distributed database ready for your transactional, analytical, and AI workloads.

DEPLOY YOUR WAY

OceanBase Cloud

The best way to deploy and scale OceanBase

OceanBase Enterprise

Run and manage OceanBase on your infra

TRY OPEN SOURCE

OceanBase Community Edition

The free, open-source distributed database

OceanBase seekdb

Open source AI native search database

Customer Stories

Real-world success stories from enterprises across diverse industries.

View All
BY USE CASES

Mission-Critical Transactions

Global & Multicloud Application

Elastic Scaling for Peak Traffic

Real-time Analytics

Active Geo-redundancy

Database Consolidation

Comprehensive knowledge hub for OceanBase.

Blog

Live Demos

Training & Certification

Documentation

Official technical guides, tutorials, API references, and manuals for all OceanBase products.

View All
PRODUCTS
OceanBase CloudOceanBase Database
ToolsConnectors and Middleware
QUICK START
OceanBase CloudOceanBase Database
BEST PRACTICES

Practical guides for utilizing OceanBase more effectively and conveniently

Learn more about OceanBase – our company, partnerships, and trust and security initiatives.

About OceanBase

Partner

Trust Center

Contact Us

Start on Cloud
编组
All Products
    • Databases
    • iconOceanBase Database
    • iconOceanBase Cloud
    • iconOceanBase Tugraph
    • iconInteractive Tutorials
    • iconOceanBase Best Practices
    • Tools
    • iconOceanBase Cloud Platform
    • iconOceanBase Migration Service
    • iconOceanBase Developer Center
    • iconOceanBase Migration Assessment
    • iconOceanBase Admin Tool
    • iconOceanBase Loader and Dumper
    • iconOceanBase Deployer
    • iconKubernetes operator for OceanBase
    • iconOceanBase Diagnostic Tool
    • iconOceanBase Binlog Service
    • Connectors and Middleware
    • iconOceanBase Database Proxy
    • iconEmbedded SQL in C for OceanBase
    • iconOceanBase Call Interface
    • iconOceanBase Connector/C
    • iconOceanBase Connector/J
    • iconOceanBase Connector/ODBC
    • iconOceanBase Connector/NET
icon

OceanBase Developer Center

V4.3.1

  • Overview
    • What is ODC?
    • Features
    • Architecture
    • Limitations
    • ODC console
  • Quick Start
    • Client ODC
      • Overview
      • Install Client ODC
      • Use Client ODC
    • Web ODC
      • Overview
      • Deploy Web ODC
      • Use Web ODC
  • Data Source Management
    • Create a data source
    • Data sources and project collaboration
    • Database O&M
      • Session management
      • Global variable management
      • Recycle bin management
  • SQL Development
    • SQL editing and execution
    • Perform PL compilation and debugging
    • Use the command-line window
    • Edit and export the result set of an SQL statement
    • Execution analysis
    • Generate test data
    • Database objects
      • Table objects
        • Overview
        • Create a table
        • Manage tables
      • View objects
        • Overview
        • Create a view
        • Manage views
      • Function objects
        • Overview
        • Create a function
        • Manage functions
      • Stored procedure objects
        • Overview
        • Create a stored procedure
        • Manage stored procedures
      • Sequence objects
        • Overview
        • Create a sequence
        • Manage sequences
      • Package objects
        • Overview
        • Create a program package
        • Manage program packages
      • Trigger objects
        • Overview
        • Create a trigger
        • Manage triggers
      • Type objects
        • Overview
        • Create a type
        • Manage types
      • Synonym objects
        • Overview
        • Create a synonym
        • Manage synonyms
  • Import and Export
    • Import schemas and data
    • Export schemas and data
  • Database Change Management
    • User Permission Management
      • Users and roles
      • Automatic authorization
    • Project collaboration management
    • Risk levels, risk identification rules, and approval processes
    • SQL check specifications
    • SQL window specification
    • Database change management
    • Logical database change management
    • Batch database change management
    • Lock-free schema changes
    • Synchronize shadow tables
    • Schema comparison
  • Data Lifecycle Management
    • Archive data
    • Clean up data
    • Partitioning Plan Management
      • Manage partitioning plans
      • Set partitioning strategies
      • Examples
    • SQL plan task
  • Data Desensitization and Auditing
    • Desensitize data
    • Operation records
  • Notification Management
    • Overview
    • View notification records
    • Manage Notification Channel
      • Create a notification channel
      • View, edit, and delete a notification channel
      • Configure a custom channel
    • Manage notification rules
  • System Integration
    • Login integration
    • Approval integration
    • SQL approval integration
  • Deployment Guide
    • Deployment overview
    • Preparations before deployment
    • Load and run an ODC image
    • Deploy ODC in high-availability mode
    • Deployment verification
  • Upgrade Guide
    • Upgrade Overview
    • Preparations before upgrade
    • Update single-node ODC
    • Update high-avaliability ODC
    • Upgrade verification
    • Rollback after upgrade failed
  • Troubleshooting
    • ODC troubleshooting process
    • Collect Message
      • View the runtime environment and version information
      • View web ODC logs
      • View client ODC logs
      • View end-to-end ODC-related logs
      • View ODC MetaDB data
      • Query the index status in OceanBase Database V4.x
      • Query the index status in OceanBase Database V1.4.x to V3.2.x
      • Collect JVM runtime information
      • Use tcpdump to capture packets
    • Common Troubleshooting
      • Deployment Upgrade
        • Web ODC cannot be accessed after startup
      • Database Connection
        • Access denied in a connection trial or test
        • Connection is refused in a connection trial or test
        • Connection times out
        • `Connection reset` is reported for a time-consuming statement
        • `socket write error` or `closed by server` is reported for a connection
      • SQL Execution
        • Disconnection during SQL execution
        • `Over tenant memory limits` is reported during SQL execution
        • `Unknown thread id` is returned during SQL execution
        • `timeout` errors returned during SQL execution
        • `OutOfMemoryError` is returned during SQL execution
        • Incomplete result columns for the SELECT statement
        • Garbled Chinese characters in the SQL execution result set
        • Garbled Chinese data is returned for query of data in GBK encoding
      • PL Object
        • Debugging is not supported for invalid PL objects
        • `JSONException` is reported during PL debugging
        • Garbled variable values in debugging
        • Failed to view PL objects or garbled characters are returned
        • PL objects cannot be executed or an execution error is returned
        • ODC issues during PL debugging
        • PL anonymous block cannot be debugged
        • Alert information of a PL object is unavailable
      • Import and Export
        • Garbled Chinese characters in an imported file in GBK encoding
        • Invalid ZIP package reported during file import
        • Time-type data exported from an Oracle tenant cannot be imported
        • Mismatched columns reported during the import of a single-table CSV file
        • Failed to export a result set in ODC to an Excel file
        • Incorrect display in Excel for a result set exported in CSV format
        • Incomplete data in batch export of multiple tables
        • `javax.crypto.BadPaddingException: Given final block not properly padded` is returned for a data import or export failure
      • Client ODC Problems
        • Client ODC startup failure / H2 Database corruption: Chuck not found
        • Garbled Chinese characters in the command-line window of ODC
        • Failed to install client ODC
        • Client ODC startup failure or no response
        • `Not a valid secret key` is returned for connection creation in client ODC
        • `User does not exist` returned for connection creation in client ODC
        • High memory usage of client ODC
        • Client ODC fails to be installed or start due to a port conflict
      • Front Page Exception
        • JavaScript exception is thrown on the ODC page
        • No response in browser after opening ODC
        • White screen in ODC
      • Account Password Problem
        • Forgot the admin account password in ODC V3.2.0 or later
        • Forgot an account password in ODC V2.4.1 to V3.1.3
        • Forgot an account password in ODC V2.4.0 or earlier
    • FAQ
      • Installation of client ODC
      • Web ODC deployment and startup
      • FAQ
      • Command-line window
      • DDL statement display
  • Release Note
    • V4.3
      • ODC V4.3.2
      • ODC V4.3.1
      • ODC V4.3.0
    • V4.2
      • ODC V4.2.4
      • ODC V4.2.3
      • ODC V4.2.2
      • ODC V4.2.1
      • ODC V4.2.0
    • V4.1
      • ODC V4.1.3
      • ODC V4.1.2
      • ODC V4.1.1
      • ODC V4.1.0
    • V4.0
      • ODC V4.0.2
      • ODC V4.0.0
    • V3.4
      • ODC V3.4.0
    • V3.3
      • ODC V3.3.3
      • ODC V3.3.2
      • ODC V3.3.1
      • ODC V3.3.0
    • V3.2
      • ODC V3.2.3
      • ODC V3.2.2
      • ODC V3.2.1
      • ODC V3.2.0

Download PDF

What is ODC? Features Architecture Limitations ODC console Overview Install Client ODC Use Client ODC Overview Deploy Web ODC Use Web ODC Create a data source Data sources and project collaboration Session management Global variable management Recycle bin management SQL editing and execution Perform PL compilation and debugging Use the command-line window Edit and export the result set of an SQL statement Execution analysis Generate test data Import schemas and data Export schemas and data Users and roles Automatic authorization Project collaboration management Risk levels, risk identification rules, and approval processes SQL check specifications SQL window specification Database change management Logical database change management Batch database change management Lock-free schema changes Synchronize shadow tables Schema comparison Archive data Clean up data Manage partitioning plans Set partitioning strategies Examples SQL plan task Desensitize data Operation records Overview View notification records Create a notification channel View, edit, and delete a notification channel Configure a custom channel Manage notification rules Login integration Approval integration SQL approval integrationDeployment overview Preparations before deployment Load and run an ODC image Deploy ODC in high-availability modeDeployment verification Upgrade OverviewPreparations before upgrade Update single-node ODC Update high-avaliability ODCUpgrade verification Rollback after upgrade failed ODC troubleshooting process View the runtime environment and version information View web ODC logsView client ODC logsView end-to-end ODC-related logsView ODC MetaDB dataQuery the index status in OceanBase Database V4.xQuery the index status in OceanBase Database V1.4.x to V3.2.xCollect JVM runtime informationUse tcpdump to capture packetsInstallation of client ODCWeb ODC deployment and startupFAQCommand-line windowDDL statement display ODC V4.3.2 ODC V4.3.1 ODC V4.3.0 ODC V4.2.4 ODC V4.2.3 ODC V4.2.2 ODC V4.2.1 ODC V4.2.0 ODC V4.1.3 ODC V4.1.2 ODC V4.1.1 ODC V4.1.0 ODC V4.0.2 ODC V4.0.0ODC V3.4.0ODC V3.3.3 ODC V3.3.2 ODC V3.3.1 ODC V3.3.0 ODC V3.2.3 ODC V3.2.2
OceanBase logo

The Unified Distributed Database for the AI Era.

Follow Us
Products
OceanBase CloudOceanBase EnterpriseOceanBase Community EditionOceanBase seekdb
Resources
DocsBlogLive DemosTraining & Certification
Company
About OceanBaseTrust CenterLegalPartnerContact Us
Follow Us

© OceanBase 2026. All rights reserved

Cloud Service AgreementPrivacy PolicySecurity
Contact Us
Document Feedback
  1. Documentation Center
  2. OceanBase Developer Center
  3. V4.3.1
iconOceanBase Developer Center
V 4.3.1
  • V 4.4.2
  • V 4.4.1
  • V 4.4.0
  • V 4.3.4
  • V 4.3.3
  • V 4.3.2
  • V 4.3.1
  • V 4.3.0
  • V 4.2.4
  • V 4.2.3
  • V 4.2.2
  • V 4.2.1
  • V 4.2.0
  • V 4.1.3 and earlier

Login integration

Last Updated:2026-04-13 07:30:36  Updated
share
What is on this page
Background information
Concepts
Technical mechanism
OAuth 2.0
OIDC
LDAP
Prerequisites
Considerations
Create a login integration task
Configure SSO based on OAuth 2.0
Grant third-party access by using OIDC
Grant third-party access by using LDAP
Manage login integration tasks
References

folded

share

You can configure Open Authorization (OAuth) 2.0, OpenID Connect (OIDC), or Lightweight Directory Access Protocol (LDAP) for logging on to OceanBase Developer Center (ODC) through single sign-on (SSO).

Background information

Both SSO and LDAP are identity authentication methods, which allow you to securely get authenticated in ODC by using a group of credentials.

Concepts

  • OAuth is an open standard authorization protocol that allows users to authorize third-party applications to access their protected information stored on resource services without providing the username or password to the third-party applications. This decouples authentication from authorization. OAuth is a widely recognized and used international standard. OAuth 2.0 is an extension to OAuth 1.0. It is more secure and easier to implement. However, it is incompatible with OAuth 1.0. In other words, OAuth 2.0 deprecates OAuth 1.0. OAuth defines a secure, open, and simple standard for authorizing user resources. A third party can obtain the authorization information of users without the need to obtain the user account and password.

    • OAuth 2.0 is a delegated authorization framework used for REST/APIs.

    • OAuth 2.0 is a token-based authorization protocol that grants applications limited access to user data without disclosing the user password.

    • OAuth 2.0 decouples authentication from authorization.

  • OIDC is a security authentication mechanism. A third-party application connects to the identity provider to request user information and the identity provider returns the information to the application in a secure and reliable manner. OIDC extends the OAuth 2.0 protocol. The ID Token field is added to provide basic user identity information. The ID Token field is encapsulated in the JSON Web Token (JWT) format. An ID token encapsulated in the JWT format is self-contained and provides a tamper-proof mechanism. Therefore, it can be securely transferred to a third-party application and easily verified.

  • LDAP is an industrial standard protocol used to access and manage directory services. It is generally used to store and retrieve information about users, groups, organizational structures, and other resources in a network environment.

Technical mechanism

OAuth 2.0

ODC adapts to the OAuth 2.0 authentication center and supports only the authorization-code mode. In this mode, applications use an authorization code to request an access token or refresh token from the authorization server.

1

As shown in the preceding figure, the authorization process comprises the following steps:

  1. The user logs on to the application system. The request is forwarded to the authentication server. Then, the logon authentication page appears, with the status code 302 returned.
  2. The user enters the account and password for authentication. After authentication, the authentication server returns an authorization code to the application system.
  3. The application system sends a request carrying the code to the authentication server to request for an access token. The authentication server verifies the client ID and code and returns an access token to the application system.
  4. The application system uses the access token to query the user logon information. The authentication server returns the user information, such as the username.
  5. The application system verifies the username, creates a session, and jumps to the redirection URL.

The following table describes the parameters involved in different steps.

Step Description
1 Authorization Request
  • response_type: Required. The value is fixed to code.
  • client_id: Required. The ID of the third-party application.
  • state: Recommended. A string provided by the client. The server will return this string back to the client.
  • redirect_uri: Required. The redirection URL after authorization.

    Note

    The authorization server calls back the URL of ODC. If the SSO system has a callback allowlist, you must add the URL of ODC to this allowlist.

  • scope: Optional. The authorization scope.
2 Parameters passed in Step 1 are verified.
The logon authentication page appears.
The user specifies the resources accessible to the client.
3 Authorization Response
The authorization server jumps to the redirection URL specified in Step 1 and returns the following information:
  • code: the authorization code.
  • state: the state parameter provided by the client in Step 1.
4 Access Token Request
  • grant_type: Required. The value is fixed to authorization_code.
  • code: Required. The response code in Authorization Response.
  • redirect_uri: Required. The value must be the same as the redirection URL provided in Authorization Request.
  • `client_id: Required. The value must be the same as the client ID provided in Authorization Request.
5 Access Token Response
  • access_token: the access token.
  • Refresh_token: the refresh token.
  • Expires_in: the expiration time.

OIDC

2

  1. The client sends an authentication request to the authentication service.

  2. The user logs on by using the username and password on the authentication page to confirm authorization.

  3. The authentication service verifies the authentication request and returns a code to the client.

  4. The client requests a callback API from the business service, carrying the code in the request.

  5. The business service requests a token from the authentication service, carrying the code, client ID, and client secret in the request.

  6. The authentication service verifies the information carried in the request and returns an ID token to the business service.

  7. After authentication, the business service returns the ID token to the client.

  8. The client initiates a business request, carrying the ID token in the request.

  9. The business service verifies the ID token and returns a response to the client.

LDAP

ODC can integrate with an LDAP repository to authenticate users, retrieve user information, and bind user groups. The authorization process is as follows:

  1. Configure information about the LDAP identity source in ODC.

  2. Choose LDAP logon on the logon page and enter the username and password.

  3. The LDAP authentication server verifies the username and password through a BIND request.

  4. After successful authentication, the LDAP server returns the user information to ODC.

Prerequisites

  • You have the system integration permission.

  • You have deployed the authorization service.

Considerations

  • Only the authorization-code mode is supported in OAuth and OIDC.

  • When you log off in OAuth/OIDC, only the logon state in ODC is cleared, and the logon state in the SSO system is not cleared.

Create a login integration task

Configure SSO based on OAuth 2.0

Example: Use OAuth to integrate Apereo Central Authentication Service (CAS) to ODC so that you can access ODC by using a CAS account.

  1. Log on to Web ODC. In the project collaboration window, choose Integrations > Login Integration > Create Login Integration.

    3.2

  2. Configure gateway authentication parameters on the Create Login Integration page.

    The following table describes the OAuth parameters.

    Parameter Description
    Configuration Name The configuration name will be used as a custom username for logon.
    Type Select OAUTH2.
    Client ID The ID of the application, which must be consistent with that registered with the authorization server.
    Auth URL The URL provided by the authorization server for obtaining the grant code.
    User Info URL The URL provided by the authorization server for obtaining user information.
    Token URL The URL provided by the authorization server for obtaining the access token.
    Redirect URL The callback URL used by the authorization server to call the ODC service.

    Notice

    If the SSO system has a callback allowlist, you must add the redirection URL to the allowlist.

    User Data Structure Type The FLAT and NESTED structure types are supported.
    Scope The authorization scope. Separate multiple scopes with spaces. We recommend that you set the value to profile.

    Notice

    When you configure Alibaba Cloud Object Storage Service (OSS) in a third-party application, the value of Scope must include openid.

    jwkSet URL Optional. The address of the public key provided by the authorization server for authentication.
    userNameAttribute Optional. The username.
    Client Authentication Method The identity authentication method used by the authorization server to authenticate the client.
    Authorization Grant Type The authorization method of OAUTH2.
    User Info Authentication Method The identity authentication method used when the access token in the resource request is sent to the resource server.
  3. Click Test Connection to go to the CAS logon page.

    Note

    CAS does not require a callback allowlist. If a callback allowlist is required when you integrate another application to ODC, you can manually add an allowlist as prompted.

    4

  4. Enter the CAS account and password and click Allow on the authorization page to grant access to ODC.

    5

  5. After the connection test succeeds, the user information API returns structure information. Configure the user field mapping parameters based on the returned information.

    Note

    • The structure returned by a user information API varies based on the third-party application. To map the user information of a third-party application to the user fields in ODC, you must configure the user field mappings. User field mappings identify the ODC account used for OAuth 2.0 logon.
    • You can configure the Username Field and Nickname Field parameters based on the returned connection information.
    • You can also specify custom fields and custom field mapping rules.
    • The system administrator can configure custom field names through automatic authorization. When you log on to ODC by using custom fields, you are automatically granted the specified roles or permissions.
  6. Click Save.

  7. In the login integration task list, enable the created login integration task.

    Note

    You can enable only one login integration task.

  8. On the logon page of Web ODC, click OAUTH2 to go to the third-party logon page and use a third-party account to access ODC.

    6.9

Grant third-party access by using OIDC

Example: Use OIDC to integrate a third-party application to ODC so that you can use a third-party account to access ODC.

  1. Log on to Web ODC. In the project collaboration window, choose Integrations > Login Integration > Create Login Integration.

    7.1

  2. Configure gateway authentication parameters on the Create Login Integration page.

    The following table describes the OIDC parameters.

    Step Description
    Configuration Name The configuration name will be used as a custom username for logon.
    Type Select OIDC.
    Client ID The ID of the application, which must be consistent with that registered with the authorization server.
    Client Secret The secret of the application, which must be consistent with that registered with the authorization server.
    Scope The authorization scope. Separate multiple scopes with spaces. We recommend that you set the value to profile.

    Notice

    When you configure Alibaba Cloud Object Storage Service (OSS) in a third-party application, the value of Scope must include openid.

    Issue URL The issue address of the authentication service.
    Redirect URL The callback URL used by the authorization server to call the ODC service.

    Notice

    If the SSO system has a callback allowlist, you must add the redirection URL to the allowlist.

    User Data Structure Type The FLAT and NESTED structure types are supported.
  3. An independent callback allowlist is required for connection testing. Manually add an allowlist as prompted and then click Test Connection.

  4. Enter the third-party account and password.

  5. After the connection test succeeds, the user information API returns structure information. Configure the user field mapping parameters based on the returned information.

    Note

    • The structure returned by a user information API varies based on the third-party application. To map the user information of a third-party application to the user fields in ODC, you must configure the user field mappings. The user field mappings identify the ODC account used for OIDC logon.
    • You can configure the Username Field and Nickname Field parameters based on the returned connection information.
    • You can also specify custom fields and custom field mapping rules.
    • The system administrator can configure custom field names through automatic authorization. When you log on to ODC by using custom fields, you are automatically granted the specified roles or permissions.
  6. Click Save.

  7. In the login integration task list, enable the created login integration task.

    Note

    You can enable only one login integration task.

  8. On the logon page of Web ODC, click OIDC to go to the third-party logon page and use a third-party account to access ODC.

Grant third-party access by using LDAP

Example: Use LDAP to integrate a third-party application to ODC so that you can use a third-party account to access ODC.

  1. Log on to Web ODC. In the project collaboration window, choose Integrations > Login Integration > Create Login Integration.

    ldap1.0

  2. Configure gateway authentication parameters on the Create Login Integration page.

    The following table describes the LDAP parameters.

    Parameter Description
    Configuration Name The configuration name will be used as a custom username for logon.
    Type Select LDAP.
    URL The access URL of the LDAP server, which is a formatted string used to define the location and search parameters of the LDAP service.
    User DN The user domain name for accessing the LDAP server. Each LDAP entry is uniquely identified by a user domain name, which is the position of the entry in the LDAP directory tree.
    Access Password The password for accessing the LDAP server.
    userSearchFilter The condition for filtering user search results. For example, users can be filtered by username, email address, or department.
    userSearchBase The start or base point for user search, namely, the part or organization unit where the user is to be searched.
    groupSearchBase (Optional) The start or base point for group search.
    groupSearchFilter (Optional) The filtering condition for group search.
    groupSearchSubtree Specifies whether to include parameters of sub-trees during group search.
    loginFailedLimit The maximum number of consecutive logon failures allowed.
    lockTimeSeconds The interval for resetting the logon count.
  3. Click Test Connection.

  4. Enter the third-party account and password.

    ldap2

  5. After the connection test succeeds, the user information API returns structure information. Configure the user field mapping parameters based on the returned information.

    Note

    • The structure returned by a user information API varies based on the third-party application. To map the user information of a third-party application to the user fields in ODC, you must configure the user field mappings. User field mappings identify the ODC account used for LDAP logon.
    • You can configure the Username Field and Nickname Field parameters based on the returned connection information.
    • You can also specify custom fields and custom field mapping rules.
    • The system administrator can configure custom field names through automatic authorization. When you log on to ODC by using custom fields, you are automatically granted the specified roles or permissions.

    ldap3.0

  6. Click Save.

  7. In the login integration task list, enable the created login integration task.

    ldap4

    Note

    You can enable only one login integration task.

  8. On the logon page of Web ODC, click LDAP to go to the third-party logon page and use a third-party account to access ODC.

    ldap5.0

Manage login integration tasks

In the login integration task list, you can enable, view, edit, or delete a created login integration task.

10.1

References

  • Automatic authorization

  • Approval integration

  • SQL approval integration

Previous topic

Manage notification rules
Last

Next topic

Approval integration
Next
What is on this page
Background information
Concepts
Technical mechanism
OAuth 2.0
OIDC
LDAP
Prerequisites
Considerations
Create a login integration task
Configure SSO based on OAuth 2.0
Grant third-party access by using OIDC
Grant third-party access by using LDAP
Manage login integration tasks
References