Skip to main content

Onboarding Native Apps using Adaptive Access

A native application using Adaptive access can be onboarded using the admin web interface.


Procedure

Setting up your application with the minimum required fields. For more detailed information about each field, see Configuring single sign-on in the OpenID Connect provider.

  1. Navigate to the Sign-on tab.
  2. In the Sign-on Method, select OpenID Connect 1.0.
  3. Select "Context-based authorization" as the Grant Type.
    This will also check the "JWT Bearer" Grant Type.
  4. If using refresh tokens check "Issue refresh token"
  5. Under Access Policies, unselect (if selected) "Use default policy".
  6. Select the pencil icon, and select an Access policy to associate with the application.
    For steps on configuring access policy see Native application policy
  7. Check the grant types the policy will be attached to.
    Ensure "JWT Bearer" is checked, otherwise only Pre-authentication rules will be applied.
  8. Click Save.
  9. Take note of the client_id and client_secret issued to your application to be used when integrating the proxy SDK.

Adaptive Sign-on

  1. Navigate to the Adaptive sign-on tab.
  2. Enter an Allowed domain. An allowed domain enables the Adaptive access session collection and detection for a given sub-domain. For example sub.domain.com, *.domain.com.
  3. Click Add domain + if you wish to add additional domains.
  4. Click Generate. This will take up to 30 minutes to complete.
    You can navigate away from Adaptive sign-on tab and check on the generate progress at a later stage.

Adaptive sign-on

Note: When using Adaptive access for native applications, Adaptive access will only run on webpages matching the allowed hosts entered when onboarding the application.

What's next

Now that your application is onboarded you can start instrumenting your application. The generated snippet host / snippet ID enables you to make calls to the adaptive web SDK. Head over to Developing Native Web Applications to get started.