Authentication Providers

The Authentication Providers section allows you to configure how users authenticate in Gaio DataOS, combining traditional authentication, enhanced security, and third-party identity providers (SSO). These settings are project-wide and directly impact security, access governance, and user experience.
In this section, you can:
Define global authentication policies.
Enable or disable Two-Factor Authentication (2FA).
Configure session timeout.
Allow or restrict email/password login.
Integrate third-party authentication providers (SSO).
Authentication Settings
Two-factor authenticator (Google Authenticator, Microsoft Authenticator, Authy, etc.)
Adds an extra security layer to user login
Based on time-based authenticator apps
Strongly recommended for:
Corporate environments
Sensitive data projects
Multi-user workspaces
Session timeout (zero for infinite): Defines the maximum duration of an active session.
Activate third party providers
Enables external authentication providers
Uses OAuth / identity federation standards
Authentication Flow
User opens the login page → Selects an available authentication method. → (Optional) Completes 2FA validation. → Session starts based on the configured timeout.
Step-by-Step Guide to Obtain Google Credentials
How to Create a Google Account to Use as an Authentication Provider
Access Google Cloud Console
Log in to the Google Cloud Console using the link: https://console.cloud.google.com/
Create a New Project
Click on “Select a project”.
A popup will open — click “New Project”.
You will be redirected to the project creation page.
Fill in:
Project name
Organization location (if applicable)
Click “Create”
Google Cloud Free Trial (Optional)
After creating the project, you may be redirected to the “Start your free Google Cloud trial” screen.
You can agree and continue
Choose whether the account will be:
Organizational
Personal
Access Google Auth Platform
Once your account is ready, go to: https://console.cloud.google.com/products
In the “All products” list, find and click “Google Auth Platform”
On the main screen, under the “Overview” tab, click “Get started”
Fill out the form and create a new configuration
Create OAuth Client
After completing the setup, you will see a screen with:
Metrics
Project Check-up
In this screen, under Metrics, click “Create an OAuth client”.
Configure OAuth Client
Set Application type to Web application
Define the Application name
Configure the following fields (you will need help from your developers):
Authorized JavaScript origins
Authorized redirect URIs
Click “Create”
Retrieve Client ID and Client Secret
A popup will appear showing the Client ID. Click OK.
Navigate to: https://console.cloud.google.com/auth/clients
Select the client you just created
In the bottom-right corner, click “+ Add secret” (if one does not already exist)
Create a new secret
Copy and store securely:
Client ID
Client Secret
These credentials will be used to configure Google as an authentication provider in your application (OAuth 2.0).
Keep the Client Secret secure and never expose it in public repositories.
Microsoft Entra ID (Azure AD) — Step-by-step to get OAuth credentials (Client ID + Client Secret)
What you will obtain
Tenant ID (Directory ID)
Client ID (Application ID)
Client Secret (Secret Value)
Redirect URI(s) (Callback URL(s)) configured for your app
These are the typical values required to configure Microsoft as an authentication provider.
Access the Microsoft Entra admin center
Open the Microsoft Entra admin center (Entra portal).
Sign in with an account that can create app registrations (typically Application Developer or higher).
Create a new App Registration
Go to: Entra ID → App registrations
Click New registration
Fill in:
Name: a recognizable name for your application (e.g.,
Gaio Auth Provider)Supported account types: choose based on your scenario (most internal business cases use “Accounts in this organizational directory only”)
Click Register
Copy the required IDs (Client ID and Tenant ID)
After registration, on the app Overview page:
Copy Application (client) ID → this is your Client ID
Copy Directory (tenant) ID → this is your Tenant ID
Configure the Redirect URI (Callback URL)
This step ensures Microsoft can redirect the user back to your application after sign-in.
In the left menu, go to Authentication
Click Add a platform
Choose Web
Under Redirect URIs, add the callback URL(s) provided by your developers (must match your app domain/routes)
Save your changes
Developer input required
Your team must provide:
The exact Redirect URI(s) used by your frontend/backend sign-in callback routes
If applicable, the correct environment URLs (prod/staging/local)
Create a Client Secret
In the left menu, go to Certificates & secrets
Under Client secrets, click New client secret
Enter:
Description
Expiration
Click Add
Copy the Value immediately (this is the Client Secret) — it will not be shown again after you leave the page
Save your credentials securely
Store these values in your secrets manager or environment variables:
TENANT_ID= Directory (tenant) IDCLIENT_ID= Application (client) IDCLIENT_SECRET= Secret ValueREDIRECT_URI= the same redirect URI configured in Authentication
Best Practices
Always enable 2FA for sensitive or enterprise environments.
Configure an appropriate session timeout.
Prefer SSO providers for corporate projects.
Disable conventional login if only SSO is required.
Periodically review authentication policies.
Last updated