Skip to content

Configure OAuth2 Application/Provider for TPLink Omada Controller using the client id/secret provided by omada #12243

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Closed
cheggerdev opened this issue Dec 2, 2024 · 2 comments
Labels
question Further information is requested

Comments

@cheggerdev
Copy link

Describe your question/
Configure OAuth2 Application/Provider for TPLink Omada Controller Version 5.14 using the client id/secret provided
by omada and not from authentik.
Can you help me out here?

Screenshots
If applicable, add screenshots to help explain your problem.

Version and Deployment (please complete the following information):

  • authentik version: 2024.10.4
  • Deployment: docker-compose

Additional context
Omada Controller Documentation how to use Open API:
https://omada-northbound-docs.tplinkcloud.com/#/home

The special thing here is the configuration works up-side-down:
The Omada Controller provides a client id and a client secret to be used by authentik,
while I am used to use the client id/secret from authentik provider.

@cheggerdev cheggerdev added the question Further information is requested label Dec 2, 2024
@cheggerdev
Copy link
Author

cheggerdev commented Jan 16, 2025

I need some guidance in how to connect an authentik Application with the Omada Controller (OC200/300).
I want to use Authentik as the IdP and not Omada.
Anyone who can help me?

@cheggerdev
Copy link
Author

New Omada versions added SAML support.
Closing this in favour of #14508

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
question Further information is requested
Projects
None yet
Development

No branches or pull requests

1 participant