Hello,
I am looking for a robust solution to make the Universal GUI accessible outside our corporate network.
Currently, we are using Azure Application Proxy (AAP) to achieve this. Our goal is to avoid exposing our on-premises (web) servers publicly. With AAP, users must first log in with their Microsoft account before they can access the URL for the Universal GUI. After logging in with AAP, this authentication can be used to log in to the Universal GUI/Indicium by configuring Microsoft as the OpenID Provider. This way, after clicking "Log in with Microsoft," users are immediately directed to the Universal GUI.
The issue we're facing is that the AAP authentication expires after a certain period, but the Universal GUI does not recognize this expiration. This results in various error messages and blank pages, and users have to press Shift + F5 to be redirected to the Microsoft login page. This workaround is problematic for mobile devices, as Shift + F5 is not available, making it impossible to add the app as a PWA on iOS, for example. We have had extensive contact with Thinkwise about this (6846S), but it seems that this issue cannot be resolved when combined with Azure Application Proxy.
Therefore, we are now considering setting up a reverse proxy server to overcome these problems. Although the documentation provides some guidance on how to configure this, I am interested in hearing from other customers who have implemented a similar setup. Searching through the community has given me some insights, but these do not fully align with our situation (e.g., everything already hosted in Azure).
How do you handle this, especially from a security perspective? Ideally, we would like users to authenticate via Microsoft before the Universal GUI loads, ensuring that the server is not exposed without prior authentication.
Thanks