Configure multi-domain user ID support
- Last Updated: February 11, 2026
- 2 minute read
- OpenEdge
- Version 13.0
- Documentation
In OpenEdge 11.7.5+ and 12.1+, support has been added for multiple fully qualified domain names (FQDN) in OpenEdge Authentication Gateway. Support for domain-qualified user IDs solves an issue for users who perform multi-tenant account lookup and information retrieval: their authentication services are now able to customize access to tenant-aware user account storage, and add tenant specific information to Client-Principal security token fields.
- Open the domains.json file for your STS web application. For example, oeauthserver-name/webapps/ROOT/WEB-INF/config/domains.json, where oeauthserver-name is the name of the instance where the OESTS web application is deployed.
- Edit the domains.json file
to include the FQDN used during the authentication process. For example, if your
authentication method is LDAP, and the domain for your application is
employee01@progress, add or edit the domain entry to the list:
{ "name" : "PROGRESS", "enabled" : true, "description" : "LDAP Multi domain authentication", "actions" : { "authenticate" : { "enabled" : true, "options" : "-useFQUserIds" }, "exchange" : { "enabled" : true, "options" : "" }, "sso" : { "enabled" : true, "options" : "" }, "refresh" : { "enabled" : false, "options" : "" } }, "options" : "", "authProvider" : "ldap", "policyProvider" : "", "events" : { "provider" : "", "groups" : {} } }The value that allows for multi-domain support is the-useFQUserIdsswitch. Once added, the OpenEdge Authentication Gateway will pass a fully qualified OpenEdge user ID to whichever authentication provider (“authProvider”) is configured.Note: The authentication providers where the-useFQUserIdsoption can be most useful are OERealm and LDAP because OERealm supports multi-tenant-enabled user accounts, and LDAP can use the fully qualified user ID as an email account name.
- If the client input contains a blank OpenEdge Domain subfield, the user ID is passed to the authentication provider unaltered. A static OpenEdge Domain name can be configured to be appended to the user ID after a successful authentication.
- If the client input contains a non-blank OpenEdge domain subfield, and
the
-useFQUserIdsoption is not specified, then only the user ID subfield is passed to the authentication provider. Upon successful authentication, the client-specified fully qualified user ID is placed into the sealed client-principal. - If the client input contains a non-blank OE Domain subfield, and the
-useFQUserIdsoption is specified, then the client-specified fully qualified user ID is passed to the authentication provider unaltered. Upon successful authentication, the fully qualified user ID is placed into the sealed client-principal.
The following table shows various client user ID inputs and what values are passed to authentication providers:
| Client Specified User ID | Without -useFQUserIds | With -useFQUserIDs | Inserted Into Client-Princpal |
|---|---|---|---|
| user1 | user1 | user1 | user1 1 |
| user1@domain1 | user1 | user1@domain1 2 | user1@domain1 |
| user1@email@domain1 | user1@email 2 | user1@emain@domain1 | user1@email@domain1 2 |
1 The optional @domain may be blank, a configured static value used by all OpenEdge Domains, or a value derived from one of the user account’s granted group/role memberships.
2 The user1@domain1or user1@email may be passed to an LDAP authentication provider when the user search filter includes matching the LDAP user account’s email attribute.