Skip to main content
Mitratech Success Center

Client Support Center

Need help? Click a product group below to select your application and get access to knowledge articles, webinars, training content, and release notes or to contact our support team.

Authorized users - log in to create a ticket, view tickets status and check your success plan details.


O-Auth Support to IDP Login

This guide provides an overview on O-Authentication in android CMO application 

1. O-Auth Support to IDP Login

The CMO application provides secure login for its users by introducing open standard authorization framework (O-Auth) to its clients. It helps the users by collecting limited user data without giving away user’s password.

1.1 Definition

O-Auth is an open standard authorization framework or protocol where unrelated servers can safely allow authenticated access to their assets without actually sharing the login credentials.

1.2 Why O-Auth?

O-Auth allows single sign on (SSO) instead of providing username and password to the server for each request. In this scenario the end user talks to their Identity Provider (IDP) where the IDP generates access tokens and hands it to the application to authenticate the user. The application then allows the user to login after the user is authenticated.

2. OpenID Connect

In CMO, the O-Auth is maintained by introducing the OpenID Connect infrastructure where it acts as a layer. With OpenID Connect, the clients can verify the end user based on the authentication performed by an authorization server.

3. Version Support for O-Authentication

The O-Authentication support for IDP login is being introduced by CMO application from version R2106 provided the client-side server supports IDP login.

3.1 Bypassed O-Authentication for Existing Users

For existing CMO application users upgraded to version R2106 and the user side server doesn’t support O-authentication, the CMO application by passes support for O-authentication. These users will continue providing username and password for CMO application login which is based on the client URL.

3.2 O-Authentication Support for Existing Users

For existing CMO application users upgraded to version R2106 and the user side server supports O-authentication, the CMO application redirects the user to IDP page that supports single sign-on. Based on the client URL provided during the CMO application login, the system recognizes client server that supports O-authentication.

4. User Authentication

CMO application verifies the user and authenticate for the first-time login. The user has to provide username and password in the IDP page. The IDP settings are configured by the admin from the web end. The IDP login page may be same or different from company to company.


  • When the user tries to logs in the CMO application, the login page redirects to clients IDP for initial authentication.
  • When the user logs out of the application and re-login, the system prompts the user to enter credential  in the IDP page again for user authentication.
  • If the user closes the application (without logging out) and re launches the application, the user can login to the application just by using device security settings like Screen Lock (pin/password/pattern/swipe) and Fingerprint (biometric) in offline and online mode.
  • When the application is used in offline mode, all the data will be synced to the sever and the user is authenticated when the device is connected to the internet.

4.1 Initial User Authentication in Mobile

  1. Go to CMO mobile application.
  2. Enter the company web address for the CMO and click Go.


  1. The user gets redirected to IDP login page. The user must provide the username and password for the initial login.


Note: The email id used to create the user in the CMO application has to be provided in the username section.

  1. For the second time login, the user doesn’t have to provide username and password. The user goes through SSO login and directly lands on the mobile application homepage.

5. The CMO application asks the user to authenticate in the following scenarios after the initial authentication.

  • When mobile token expires.
  • When mobile token is revoked from web end (Admin can revoke for specific user).
  • When a user logs out of the application and re-login.
4.1.1 Offline Mode (Android)

The CMO mobile application user can login in the offline mode. For the authentication of the user to happen, the user must connect to the internet. The user can still login if there is no internet.

Before the implementation of the O-Auth, in the offline mode, the user is authenticated by comparing the username and password credentials provided in the login fields and the data existing in the database. But, after the implementation of the O-Auth, in the offline mode, the user will be authenticated using device security settings where the user can login by providing pin or biometric (fingerprint) scan.

For the first time, when the user logs into the CMO application, the system prompts to set up security lock for the application with pattern or password or pin or fingerprint.

  1. CMO application prompts the user with a Warning message.


  1. Click OK. The user will be redirected to Device Security Settings page in the mobile.


  1. Depending on the type of security, the user can choose Fingerprint or other Screen lock options available in the settings.


  1. The user then lands on the CMO mobile application homepage.


  1. After the initial setup, when the user closes the application and logs in again, the application authorizes the user when the device is connected to internet but the user will be able to log in to the application in the offline mode.

4.2 Initial User Authentication in Web

  1. Go to CMO web application.
  2. The CMO login page redirects to the IDP page if the user is not authenticated.


  1. The Okta IDP page opens up where the user has to enter username and password for Single Sign On (SSO).

Note: Each company can have different IDP pages for SSO. E.g. Okta, Google, Microsoft are some of the Identity Providers for SSO.

  1. The user information is sent to the CMO application where the user account is verified and authenticated. Once the account is authenticated, the user gets automatically logged in.

  2. The CMO application prompts the user to authenticate again in the following scenarios after the initial authentication.

  • When the login session expires/user logs out.
  • When the browser is closed.

5. O-Auth Resolution Details

OpenIDConnect is implemented for Web and Mobile authentication.


To enable OpenIdConnect for the Web new Authentication Mode (OpenIDConnect) was introduced. To turn on OpenIdConnect, add OpenIdConnect value into Authentication.Mode parameter in the web.config.

1.  <add key="Authentication.Mode" value="OpenIdConnect"/>

Some additional OpenIdConnect parameters are required to be filled in the web.config.

Example of parameters for authentication against google:

1.  <add key="Authentication.OpenIdConnect.ClientId" value="" />

2.  <add key="Authentication.OpenIdConnect.ClientSecret" value="xp6jDs81V0-_ehPkbbjkCLoO" />

3.  <add key="Authentication.OpenIdConnect.Audience" value="" />

4.  <add key="Authentication.OpenIdConnect.RedirectUri" value="https://localhost:44315" />

5.  <add key="Authentication.OpenIdConnect.PostLogoutRedirectUri" value="" />

6.  <add key="Authentication.OpenIdConnect.ClaimType" value="email" />

7.  <add key="Authentication.OpenIdConnect.IdentityType" value="Email" />

8.  <add key="Authentication.OpenIdConnect.Scope" value="openid email profile" />

9.  <add key="Authentication.OpenIdConnect.ClockSkew" value="2" />

10. <add key="Authentication.OpenIdConnect.ResponseType" value="code id_token" />

11. <add key="Authentication.OpenIdConnect.MetadataUri" value="" />


To enable OpenIdConnect for Mobile, add OpenIdConnect value into Authentication.Idp parameter in the web.config.

1. <add key="Authentication.Idp" value="OpenIdConnect "/>

Additional parameters:

1.  <add key="Authentication.OpenIdConnect.MobileAppClientId" value="" />

2.   <add key="Authentication.OpenIdConnect.MobileAppClientSecret" value="xp6jDs81V0-_ehPkbbjkCLoO" />

3.  <add key="Authentication.OpenIdConnect.MobileAppAudience" value="" />

4.   <add key="Authentication.OpenIdConnect.MobileAppRedirectUri" value="https://localhost:44315" />

5.  <add key="Authentication.OpenIdConnect.MobileAppMetadataUri" value="" />

6.  <add key="Authentication.OpenIdConnect.MobileAppIssuer" value="" />

Example of web.config file with OpenIDConnect settings was added to the project as well.


5.1 Validation of Access Token

5.1.1 Resolution Details

1.  POST: /api/openidconnect/GetMobileToken

json payload

1.  {

2.      "CompanyID":<id of the company>,

3.  }


If companyID is unknown then it should have value -2. Use CompanyID parameter the same way as for request to /api/sync/authorize/post. Request should contain Authorization header with token.


1. Authorization Bearer <id_token recieved from IDP>

Response is the same as for /api/sync/authorize

1.  {

2.  "Token": "df62161f483a423a97ada35bc11db5d56878fd80468b445b999be52fe60f66c648838a18e82e4c84b5164e497568bcaa",

3.  "ExpiredDate": "2021-04-15T20:36:58.387"

4.  }

Currently there is endpoint /api/sync/companies to retrieve available companies for the user.

Now this endpoint accepts login/password. i.e. the same JSON payload as for /api/sync/authorize endpoint.

In case OpenIdConnect it will be impossible to send login/password so additional endpoint to retrieve companies has been added.

1.  GET:  /api/sync/companies/GetAvailableCompanies

Request to this endpoint should contain Header with Mobile token. i.e. the same mobile token like for other sync api requests.

1.  Token <mobile token>

It would be good to use this Endpoint regardless of Authentication type.

So first of all, it will require to retrieve mobile token from CMO Web. And then using mobile token retrieve available companies.

5.2 Retrieve Mobile Auth Settings

5.2.1 Resolution Details

The following endpoint was created to receive auth settings.

1. GET: /api/sync/Settings/GetAuthSettings?key=<static key>

<static key> - the same static key which is used for the following endpoints






1.  {

2.   "Idp": "OpenIdConnect",

3.   "Settings": "F8IH7PV7+VA2s1iML3jbMYd6XFt+WVOtlZZeENQi6XLNAownRleWXyACPaMhzdMueG1Wf9gCXtnJv4rUPNAuHus42rG7Y4RPWyH0KQvZr5X705zC3A4fAu/VL08yJTFmLV337ZNW1t1dj2VYZt4hlbcRE2R8lNTLQBp+u9FQa1s/rxSlhw57WkuTBbal8QpzpDJ3niGDnK84PRMuaDj2XadggIBEjwUcrclzyVIaeIO0D+gnAkCi3ajoAesFOUkUN/RMF5gbQMatBuhRtUVheYMp+6dw73kqecVIOSSYinRwCW39AIqMyTYnX7oyqIWj/JrlFLT22KzM80M8ecba8J+9Ka1uRMrD+929zVWCnr/mI2v65DFC3eriDxLfk3ZXnUffIATAY5pTWiPLme+e6t35VVnfO66fPi4Yx3tCoHnbWtJwA0dADagIptwiubfgLeAGjQ8kVN+XLUrkz+L9Sk1Lz9B6OfR742W+6K/b4fJRt/06p8k+15E864oCvc6vrRKPf4toCHbUGDr61yvd92sMzfZKcevcLM1jBNIhGKDkxe6J3H42BiS8ChMimFOjX8gY6jhG+inZaLpyt7Nc/A=="

4.  }

IDP - string field which can have one of the following values

  • Default
  • ActiveDirectory
  • AzureAD
  • ADFS
  • Okta
  • SecureAuth
  • OpenIdConnect

Settings - it is encrypted settings.

Decrypted Settings is JSON string of the following format

1.  {

2.  "ClientID": "",

3.  "ClientSecret": "xp6jDs81V0-_ehPkbbjkCLoO",

4.  "Issuer": "",

5.  "MetadataUri": "",

6.  "Audience": "",

7.  "RedirectUri": "https://localhost:44315",

8.  "ResponseType": "code id_token",

9.  "Scope": "openid email profile"

10.  }

To decrypt settings, you have to use AES algorithm with the same key which you use to encrypt password when you send it to the web.

NOTE: Ignore Settings field if Idp is not OpenIdConnect

If IDP is not OpenIdConnect then Settings field will contain encrypted empty string.

JWT Token

Currently there is endpoint /api/token to generate JWT token which can be used later for public api.

This endpoint accepts login/password.

In case OpenIdConnect it will be impossible to send login/password so additional endpoint to generate token was introduced.

1.  GET:  /api/openidconnect/GetJwtToken

Request should contain Authorization header with token.


1.  Authorization Bearer <id_token recieved from IDP>

Response is the same as for /api/token.

1.  "eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJzdWJqZWN0IjozLCJleHAiOjE3MzU4MDg0NTYuMH0.oP00-GndiZ0ibqvnXHbBkTmMV1T1ta_JKqG_RfPE2a8"

  • Was this article helpful?