Email notifications
This page contains third-party references. We strive for our content to always be up-to-date, however, the content referring to external vendors may change independently of Omada. If you spot any inconsistency, please report it to our Helpdesk.
Omada Identity offers a comprehensive email notification feature designed to streamline communication processes within your organization. By utilizing customizable email templates, you can effortlessly generate and dispatch notifications for various events triggered within the system.
Whether it's notifying stakeholders about access requests, sharing survey results, or updating personnel on organizational changes, Omada Identity's email templates provide the flexibility to tailor messages to specific scenarios. Events such as access request approvals, rejections, or assignment removals due to access reviews can automatically trigger email notifications, ensuring timely and efficient communication.
For information on how to set up sending mails in the Omada Identity Cloud portal, refer to the Email delivery section in the Creating environment documentation.
Setting up sending mails on-prem
You can configure sending emails by defining the host name, port, TLS configuration, and authentication method.
The notificationSettings XML schema is available under the following path: <website root>/Schema/NotificationSettingsML.xsd.
Follow these steps to set up port and host name:
-
Go to Setup > System settings > Configuration objects.
-
Open the configuration object notificationSettings.
-
Set up the port and host name in the XML schema:
<?xml version="1.0" encoding="utf-8">
<notificationSettings xmlns="http://schemas.omada.net/ois/2022/NotificationSettingsML">
<smtp>
<network
host="mail.name-domain.com"
port="25"
secureSocketOptions="StartTlsWhenAvailable" > -
Optionally, you can change the
SecureSocketOptionsdefault security configurationStartTlsWhenAvailableto one of the following values:StartTlsWhenAvailable- this is the default configuration. It supports the SMTP Service Extension for Secure SMTP over Transport Layer Security as defined in RFC 3207. In this mode, the SMTP session begins on an unencrypted channel, then aSTARTTLScommand is issued by the client to the server to switch to secure communication using SSL.None- no SSL or TLS encryption should be used.Auto- allows the IMailService to decide which SSL or TLS options to use (default). If the server does not support SSL or TLS, then the connection will continue without any encryption.SslOnConnect- an alternate connection method is where an SSL session is established up front before any protocol commands are sent. This connection method is sometimes called SMTP/SSL, SMTP over SSL, or SMTPS and by default uses port 465.StartTls- elevates the connection to use TLS encryption immediately after reading the greeting and capabilities of the server.
Next, depending on the authentication type, the parameters needed will vary.
Vault Service
Instead of storing sensitive information locally in Omada Identity, we recommend using the Vault Service, which is able to fetch secrets from external vault services.
For more information, see Vault Service (Cloud) or Vault Service (On-prem).
StringEncrypter
We recommend using the StringEncrypter utility to encrypt strings (for example, passwords) before storing them in the configuration files.
For more information, see the StringEncrypter section of Additional security aspects.
Anonymous authentication
This setup is for testing purposes only. When connecting to the SMTP service, Omada Identity gets the capabilities of the SMTP service:
- If the SMTP service supports anonymous authentication, then, Omada Identity authenticates using SASL anonymous authentication protocol.
If you are using Exchange, follow Microsoft guidelines to configure Exchange for anonymous authentication.
<?xml version="1.0" encoding="utf-8">
<notificationSettings xmlns="http://schemas.omada.net/ois/2022/NotificationSettingsML">
<smtp>
<network
host="mail.name-domain.com"
port="25"
<anonymous
userName = ""/>
</network>
</smtp>
</notificationSettings>
NTLM authentication
No parameter value is needed.
<?xml version="1.0" encoding="utf-8">
<notificationSettings xmlns="http://schemas.omada.net/ois/2022/NotificationSettingsML">
<smtp>
<network
host="mail.name-domain.com"
port="25">
<defaultCredentials />
</network>
</smtp>
</notificationSettings>
Basic authentication
The following parameters are needed:
userName- the user name associated with the credentials.password- the password for the user name associated with the credentials.
<?xml version="1.0" encoding="utf-8">
<notificationSettings xmlns="http://schemas.omada.net/ois/2022/NotificationSettingsML">
<smtp>
<network
host="mail.name-domain.com"
port="25">
<basic
userName=""
password="" />
</network>
</smtp>
</notificationSettings>
Microsoft Entra ID authentication
This method of authentication was deprecated starting from the December 2024 Cloud Update. This does not mean that it is no longer possible, but as it is not considered the most secure, Omada recommends using client credentials, which are described below on this page.
This setup is only for Microsoft Entra ID Password Grant. The following parameters are needed:
instance- specify an instance. If not, your app will target the Azure public cloud instance (the instance of URL https://login.onmicrosoftonline.com).clientId- the Application (client) ID that the Azure portal - App registrations page assigned to your app.tenantId- the directory tenant that you want to log the user into.userName- the user name associated with the credentials.password- the password for the user name associated with the credentials.scopes- space-separated list of permissions that the app requires.
For more detailed information, refer to the Microsoft documentation.
<?xml version="1.0" encoding="utf-8">
<notificationSettings xmlns="http://schemas.omada.net/ois/2022/NotificationSettingsML">
<smtp>
<network
host="smtp.office365.com"
port="587">
<azureAdPasswordGrant
instance="https://login.microsoftonline.com"
clientId="7A83471E-A8C7-4C06-8120-77B9AA56FA04"
tenantId="2487ABFA-47FC-4F60-8AF4-2B857B17432C"
userName="example@megamart.onmicrosoft.com"
password="xxx"
scopes="https://outlook.office365.com/.default"
/>
</network>
</smtp>
</notificationSettings>
Client credentials
The following parameters are needed:
instance- specify an instance. If not, your app will target the Azure public cloud instance (the instance of URL https://login.onmicrosoftonline.com).clientId- the Application (client) ID that the Azure portal - App registrations page assigned to your app.clientSecret-<CLIENT_SECRET>tenantId- the directory tenant that you want to log the user into.userName-<MAILBOX>scopes- space-separated list of permissions that the app requires.
For more detailed information, refer to Configure Client Credentials Flow for SMTP Auth in Exchange Online and to Microsoft documentation.
<?xml version="1.0" encoding="utf-8">
<notificationSettings xmlns="http://schemas.omada.net/ois/2022/NotificationSettingsML">
<smtp>
<network
host="smtp.office365.com"
port="587">
<azureAdClientCredentials>
instance="https://login.microsoftonline.com"
clientId="7A83471E-A8C7-4C06-8120-77B9AA56FA04"
clientSecret="xxx"
tenantId="2487ABFA-47FC-4F60-8AF4-2B857B17432C"