Skip to main content
Skip table of contents

(25.x)Streamlined Search Configuration for OpenText Content Server

Before you begin

Shinydocs Streamlined Search can authenticate users through OTDS using either Kerberos or OAuth 2.0 with OpenID Connect (OIDC). While both options are supported, we recommend using OAuth 2.0 with OIDC for greater flexibility, compatibility with modern identity providers like Microsoft Entra ID (Azure AD), and easier support for cloud and hybrid environments.

Select which authentication mechanism your organization would like to use, you only need to configure one (either OAuth - recommended or OTDS via Kerberos)

OAuth 2

Prepare

This setup uses OTDS as your broker to your OIDC provider, meaning Shinydocs Search will authenticate against OTDS via OIDC and OAUTH 2.

If you do not have this setup configured in your organization already, please KB0797287 from OpenText for more information. This will need to be completed before proceeding. Please contact OpenText support for more information/assistance.

OTDS Configuration

This section documents how to setup OTDS to be an OAuth client for Integrated search, so users can connect and search against Content Server.

Remember to note your Client Id and Secret made during this process, you will need it later!

  1. Login to the OTDS Admin portal.

  2. In the side bar click on OAuth Clients to add a new OAuth client.

    image-20250707-185301.png

    Add an OAuth Client for Shinydocs Integrated Search

  3. Click the Add Button to add a new OAuth Client

  4. General Section - fill in the following fields

    • Client Id - This is an arbitrary name, however it should be unique and descriptive.

    • Display Name - This is an arbitrary name, however it also should be unique and descriptive

    • Confidential should be checked.

    • Authentication Method should be Client Secret

      image-20250707-190119.png

      Adding an OAuth Client

  5. User Partition - fill in the following fields

    • Global or User Partition. - If all your users are from the provided OAuth source, you can select Global. However, if you have a mix of authentication sources, all different, you may want to restrict it to the user partition from the source you wish to use. If so, specify the partition name in the User Partition. In the screenshot below, the partition setup for users from Entra Id is called entraid.

      image-20250707-190354.png

      User Partition Selection

  6. Advanced - fill in the following fields

    • Grant Refresh Token - checked

    • Permissible Scopes - openid

    • Default Scopes - openid

      image-20250707-190517.png

      Advanced Configuration

  7. Redirect Urls - these are permitted redirect urls that OTDS will redirect to once the user is authorized.

    • This should be the hostname of the integrated search with the path /oauth/authorized on the end of the url: e.g. https://search.example.cloud:9701/oauth/authorized where search.example.cloud:9701 is the host that is running control center and integrated search.

  8. Custom Attributes - nothing to fill in there

    image-20250707-190811.png
  9. Click Save

    • Upon save, a popup will appear showing you the Generated Client Secret. Copy this value, and put it in a safe place. You will need this later to setup integrated search.

image-20250707-191031.png

Shinydocs Streamlined Search Setup for OpenText Content Server via OAuth/OIDC

In Shinydocs Control Center, either adding a new source or editing an existing source:

  1. Select Protected - OAuth 2 for Search Authentication Type.

    image-20250707-161545.png
  2. Fill out the following information that you would have gathered during this setup

    1. Client Id

      1. This is the client id from Entra/Azure

    2. Client Secret

      1. This is the client secret from Entra/Azure

    3. Login/Authorize Endpoint

      1. e.g. https://acme.net/otdsws/oauth2/auth

    4. Token Endpoint

      1. e.g. https://acme.net/otdsws/oauth2/auth

    5. Revoke Token Endpoint (optional)

      1. e.g. https://acme.net/otdsws/oauth2/auth

    6. Redirect URL

      1. This is the URL OTDS will use to redirect users back to Integrated Search after login. It should just be the fully qualified domain name for Integrated Search (e.g., https://search.example.cloud:9701). The system will automatically append the correct path for OTDS authentication. Make sure this matches the hostname of the redirect URL you set in OTDS earlier.

Enable Content Server Shortcuts (optional)

  1. Open Content Server as an administrator.

  2. Select Admin from the top navigation.

  3. Navigate to Content Server Administration > Core System > Presentation > Configure Document Function.

  4. [Recommended] Check Enable Document Overview Pages.

  5. [Optional] Configure additional options based on organizational requirements.

  6. Save changes.

For further details, refer to the embedded PDF for information on on-click behaviour for documents in OpenText Content Server.

Application_Note_-_On-click_behavior_for_documents_on_OpenText_Content_Server.pdf

OTDS (via Kerberos)

Configure Content Server, Active Directory, and SPNs

1. Setup the Service Account

Configure Shinydocs Search Service Account:

  1. Account Requirements:

    • The "Shinydocs Control Center" process must run as a domain user account or a group-managed service account (GMSA). For more details on GMSA, refer to the Microsoft documentation.

  2. Grant Permissions to the Service Account:

    • Add the account to the local Administrators group on the server where Shinydocs Pro is installed.

      • Alternatively, configure the following specific permissions:

        • Read access to the server.

          • Add the account to the local "Users" group.

        • Full Control on the Shinydocs Search folder (default path: C:\Program Files\Shinydocs Professional\ControlCenter).

        • Read access to the Shinydocs Search service certificate (default certificate: localhost.localdomain).

Grant Certificate Permissions

  1. On the Shinydocs Pro server, open certlm.msc.

  2. Navigate to Certificates - Local Computer > Personal > Certificates.

  3. Locate and select localhost.localdomain.

  4. From the menu bar, choose Action > All Tasks > Manage Private Keys.

  5. Click Add and select the service account.

  6. Under "Allow", checkmark Read, then click Apply.

2. Active Directory User Setup

Configure Delegation

  1. Open Active Directory Users and Computers.

  2. Locate the Shinydocs Service Account.

  3. Right-click the account and select Properties.

  4. Go to the Delegation tab and:

    • Choose Trust this user for delegation to specified services only.

    • Select Use Kerberos only.

Add SPNs for Delegation

  1. Click Add to open the delegation window.

  2. Select Users or Computers and search for the target service account.

  3. Add the required SPNs associated with the service.

  4. Click Apply to save changes.

3. Setting Service Principal Names (SPNs)

SPN Configuration Steps

  1. Open a command prompt or PowerShell with administrative rights.

  2. Determine the hostnames of the Shinydocs Search servers:

    • For single-instance setups, use the machine hostname (e.g., search.example.local).

    • For load-balanced clusters, include all machine hostnames and the load balancer's DNS name (e.g., search01.example.local, search02.example.local, search.example.local).

  3. Run the following commands to add SPNs:

    CODE
    setspn -S HTTP/<hostname> <domain\service_account>

    Repeat for each hostname.

4. Authorization to OTDS (SPNs)

Set SPNs for OTDS Hosts

Run either of the following commands for each OTDS-related hostname:

  1. OTDS Hostname:

    CODE
    setspn -S HTTP/<otdsHostName> <domain\service_account>
  2. OTDS Fully Qualified Domain Name (FQDN):

    CODE
    setspn -S HTTP/<otdsHostName.fqdn.com> <domain\service_account>
  3. OTDS Load Balancer:

    CODE
    setspn -S HTTP/<otdsloadbalancer> <domain\service_account>
    setspn -S HTTP/<otdsloadbalancer.fqdn.com> <domain\service_account>

Troubleshooting

  • Kerberos logging can be enabled by editing the following registry key:
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\Kerberos\Parameters

Registry Value: LogLevel

Value Type: REG_DWORD

Value Data: 0x1

If the Parameters subkey does not exist, create it.

Shinydocs Streamlined Search Setup for OpenText Content Server via OTDS

In Shinydocs Control Center, either adding a new source or editing an existing source:

  1. Select Protected - OTDS for Search Authentication Type.

    image-20250707-162312.png
  2. Enter your OTDS Server URL

    1. e.g. http://otds-server:8080/otdsws

Enable Content Server Shortcuts (optional)

  1. Open Content Server as an administrator.

  2. Select Admin from the top navigation.

  3. Navigate to Content Server Administration > Core System > Presentation > Configure Document Function.

  4. [Recommended] Check Enable Document Overview Pages.

  5. [Optional] Configure additional options based on organizational requirements.

  6. Save changes.

For further details, refer to the embedded PDF for information on on-click behaviour for documents in OpenText Content Server.

Application_Note_-_On-click_behavior_for_documents_on_OpenText_Content_Server.pdf

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.