Skip to main content

Hi All,

Currently we have set up a PSO environment (6.8) and integrated with IFS apps 10 during a apps8 → apps10 upgrade.

The Customer is complaining that the inbound PSO Messages to Apps 10 not being received.

The issue is that the customer wants to use a AD User for Inbound and Outbound message and this is where we are having issues.  In their current apps8 setup they are using an AD user in Apps 8/PSO5.9.

We have only enabled Annonymus Authentication in PSO server.

 

Do we need to enable windows authentication and enable “Active Directory Authenticator” in Apps10 middleware server admin console?

 

This customer use Azure Ad and SSO enabled already.

 

Please give me any thoughts on this. Enabling  “Active Directory Authenticator” would cause any troubles on PSO work? Currently customer is having tests on PSO and we need to make sure not to break anything. :)

 

TIA!

 

Best Regards,

Rayan

Dear Rayanhimal,

 

I had to face a broadcasting issue in a PSO to IFS Apps 10 integration on an IFS Managed Cloud hosted setup, sometime back.

 

Following is the knowledge article I wrote on that:

https://community.ifs.com/integration-301/what-causes-a-pso-broadcast-error-the-http-request-was-forbidden-with-client-authentication-scheme-basic-when-integrated-with-ifs-apps-10-cloud-environment-4132?postid=13661#post13661

 

Could you please check whether the suggestions mentioned on the article solves your problem.

 

Thanks and Regards

Ruchira


Hi @Ruchira Jayasinghe,

 

I have gone through the post and it seems this is not the same issue we are having.

Have you done the Active Directory Authenticator setup for Integrations & Compatibility in middleware server admin console?
I believe setting this up would do the work since customer wants to use a AD User for Inbound and Outbound message and this is where we are having issues.

Any input?

 

Best Regards,
Rayan


Hi @rayanhimal,

did you check the technical docs?

https://wit.ifsworld.com/f1docs/apps10/Foundation1/040_administration/210_security/015_authentication/050_configure_compatibility/default.htm

I think you only need to configure this when you intent to use LDAP instead OpenID when using Azure AD or AD.
 

I’m not quite familiar with the IFS APPS - PSO Integration but just some thoughts:

When you connect both system isn’t PSO using IFS APPS as the authentication provider? This means, that PSO will redirect authentication requests (e.g. when sending Broadcasts) through the Identity Provider within IFS APPS (in your case Azure AD).

Thus, no additional configuration should be required then setting up Azure AD as described here:
https://wit.ifsworld.com/f1docs/apps10/Foundation1/040_administration/210_security/015_authentication/020_configure_azure_ad/default.htm

...and of course the Broadcast User (=Azure AD Account) under 
Service and Maintenance/Scheduling/Basic Data/Scheduling Configuration needs to be set.

Lastly, I suggest that you make any changes first in a DEV/TEST environment to avoid interrupting customer testing. ;)

Best regards
Roman