website/integrations/networking/omada-controller/index.mdx
import TabItem from "@theme/TabItem"; import Tabs from "@theme/Tabs";
Omada Controller is a software platform used to centrally manage and monitor Omada networking devices like access points, switches, and routers. It provides a single interface for configuring, managing, and monitoring these devices, offering centralized control over your entire Omada network.
The following placeholders are used in this guide:
authentik.company is the FQDN of the authentik installation.:::info This documentation lists only the settings that you need to change from their default values. Be aware that any changes other than those explicitly mentioned in this guide could cause issues accessing your application. :::
To support the integration of Omada Controller with authentik, you need to create property mappings, a group, and an application/provider pair in authentik.
Log in to authentik as an administrator and open the authentik Admin interface.
Navigate to Customization > Property Mappings, click Create, select SAML Provider Property Mappings, and click Next.
Configure the first mapping for the user's given name (first name):
givennamehttp://schemas.xmlsoap.org/ws/2005/05/identity/claims/givennamereturn request.user.name.split(" ", 1)[0]
Click Finish to save. Then, repeat the process to create a mapping for the user's surname:
surnamehttp://schemas.xmlsoap.org/ws/2005/05/identity/claims/surnamereturn request.user.name.split(" ", 1)[-1]
Click Finish to save. Then, repeat the process to create a mapping for the user's group memberships:
omada_usergroup_nameusergroup_nameomada_groups = [g.name for g in user.groups.all() if g.name.startswith("Omada-")]
yield omada_groups[0] if omada_groups else None
Click Finish to save. Finally, repeat the process to create a mapping for the user's username:
usernameusernamereturn request.user.username
Click Finish.
Omada-admins) and click Create. The group name must start with Omada- for the omada_usergroup_name property mapping to function correctly.:::warning
Omada can't handle a user being in multiple groups/roles. Therefore, ensure that you only add a user to a single Omada- group.
:::
Log in to authentik as an administrator and open the authentik Admin interface.
Navigate to Applications > Applications and click Create with Provider to create an application and provider pair. (Alternatively you can first create a provider separately, and then create the application and connect it with the provider.)
https://aps1-omada-account.tplinkcloud.com/sso/saml/login/https://<controller_ip_address>:8043/sso/saml/loginhttps://omada.tplinkcloud.com/https://<controller_ip_address>:8043Post.authentik default SAML Mapping: UPNauthentik default SAML Mapping: Emailauthentik default SAML Mapping: Nameauthentik default SAML Mapping: UPNgivennamesurnameomada_usergroup_nameusernameClick Submit to save the new application and provider.
authentik.Metadata URL as the Configuration Method, and then paste the metadata URL that you copied from authentik.The default relay state is generated by Base64-encoding a combination of the Resource ID and Omada ID, separated by an underscore (_).
You can generate the relay state value using one of the following methods:
<Tabs defaultValue="linuxmac" values={[ {label: 'Linux and macOS', value: 'linuxmac'}, {label: 'Windows', value: 'windows'}, ]}> <TabItem value="linuxmac">
Run the following command:
echo -n '<Resource_ID>_<Omada_ID>' | base64 --wrap=0
Run the following command:
[Convert]::ToBase64String([System.Text.Encoding]::UTF8.GetBytes('<Resource_ID>_<Omada_ID>'))
</TabItem>
To verify that authentik is correctly integrated with Omada Controller, first log out of Omada Controller. Log in to authentik and click on the Omada Controller application in the application dashboard, and you should then be redirected to the Omada Controller dashboard.