Skip to main content
Version: Cloud

Creating environment

This page explains how to create a new environment in the Cloud Management Portal and configure its initial settings.

Use this page to:

  • Create a new environment.
  • Choose the correct region, contract, and environment SKU.
  • Configure essential settings such as domain, authentication, and email delivery.

Before you start

Before creating an environment, make sure you know:

  • Which delivery region to use.
  • Which environment SKU fits your use case.
  • Which contract the environment should belong to.
  • Whether to use the default Omada domain or a custom domain.
  • Whether to use the default SMTP server or your own.
warning

Only one operation (creation, configuration, deletion) can be performed for an environment at a time. The configuration page is not accessible while a new configuration is being applied.

Create a new environment

Follow these steps to create a new environment:

  1. Go to the Environments tab.

  2. Click the NEW ENVIRONMENT button in the upper-right corner.

    Creating new environment
  3. The Environment details dialog is displayed.

    Environment details dialog
    Dialog window behavior

    The options displayed in this dialog depend on the customer’s environment and enabled features. Depending on the configuration, customers may see different fields, such as Application Gateway, Database SKU, or Product Version.

    Not all fields are available in every deployment scenario.

  4. Select the Contract under which the environment will be created. This determines:

    • Subscription scope

    • Available resources

    • Billing context

      warning

      Creating an environment may generate additional costs if not covered by your subscription.

  5. Select the Delivery region - Europe or US. The delivery region determines where your environment is hosted. This affects:

    • Location of your data - data remains in the selected region.

    • Latency for your end users - pick the delivery region which is closest to most of your users.

      important

      The delivery region cannot be changed after the creation of an environment.

  6. Select the Environment SKU that defines the capabilities and behavior of the environment. Depending on the selected SKU, the following aspects may vary:

    • High availability

    • Georedundancy of data

    • Disaster recovery

    • Backup retention

    • Scalability/elasticity

    • SLA

    • Deletion prevention

      Refer to the Environments documentation for more details.

    Select the Environment SKU based on your use case.

    Environment SKU list

    Available options:

    SKUDescriptionHow to choose
    ProductionFull SLA, high availability, geo-redundancyUse for live environments with real users and strict availability requirements.
    Production-NonGeoRedundantProduction-grade without geo-redundancyUse when you need production features but can accept reduced redundancy (cost optimization).
    Non-ProductionLimited SLA, reduced guaranteesUse for development and testing environments.
    Non-Production-ConfigurationConfiguration-only, no runtime usageUse when you only need to configure and prepare without running workloads.
    tip

    Most users should choose:

    • Production for live environments.
    • Non-Production for testing.
    important

    The environment level cannot be changed after the creation of an environment.

  7. The Application Gateway defines how the environment is exposed and connected.

    Application Gateway option in Cloud Management Portal

    Available options:

    • Self-hosted - use when integrating with your own infrastructure.
    • Hosted - use when relying on managed connectivity.

    For detailed information about configuration and use cases, refer to the Cloud Application Gateway documentation.

info

Environment provisioning can take up to 5 minutes.

Configuring environment

Once the environment is created, click the Configure button.

Configure environment option

Then, configure the environment using the available tabs.

Available configuration options

Configuration is divided into the following areas:

  • Core configuration (required)
  • Infrastructure and integration
  • Branding and localization
  • Advanced configuration
tip

Most environments only require configuration of:

  • General
  • Authentication
  • Email delivery

Other settings are optional or scenario-specific.

Core configuration

These settings are required for a functional environment.

General

Configure the domain and core environment settings.

Configuration options in General tab

Domain type

Decide if your Cloud product will be available with the default domain name from the Omada domain, or setup up your own by clicking the Customer domain radio button.

If you want to use your own top-level domain for the URL to, select Customer domain as the Domain type.

Customer domain configuration
  • Create a CNAME record in your DNS pointing to the DNS name shown in the CNAME field.
  • Provide a Public and Private Key (in a PFX file) that is issued for the "fully qualified domain name" (fqdn) of your choice.
    • The wizard validates that the certificate is issued to the selected fqdn as well as the existence of a CNAME record in your DNS that is pointing to the correct environment CNAME.

Governance

Decide whether you want to activate the Governance for Omada Identity feature.

The Enable Governance for Omada Identity setting is disabled by default for existing environments; however, it is enabled by default for new environments of new customers.

info

Once the Enable Governance for Omada Identity setting is enabled, it cannot be reversed at the environmental level.

Horizons

Enable Horizons to activate additional platform capabilities and features. Horizons extends the functionality of the environment and enables access to advanced features.

For more information about Horizons and its capabilities, refer to the Horizons documentation.

Authentication

In the Authentication tab, configure how users authenticate and sign in to the Cloud environment. This includes defining the primary administrator, selecting the authentication protocol, and configuring the identity provider.

Authentication tab

To configure the authentication, follow these steps:

  1. Specify the Primary administrator account for the environment:

    • User name – the username of the primary administrator.
    • Email address – the email address associated with the administrator account.
  2. Define the Identity provider, that is, the authentication method and provider used for user sign-in:

    • Authentication type – select the authentication protocol:

      • OpenID Connect – Code flow (recommended for server-side applications)

      • OpenID Connect – Implicit flow

      • SAML

        Authentication type for Identity Provider
    • Provider – Select a predefined provider or choose Generic for custom configuration. Available options include:

      • Entra ID

      • Google

      • Okta

      • PingFederate

      • Generic

        Identity Provider

      For more information on authentication, refer to the Authentication and Single Sign-on Configuration section.

  3. In the Identity provider configuration section, configure the connection details for the selected identity provider:

    • IdP endpoint - the authorization or metadata endpoint of the identity provider.
    • IdP audience - the intended audience (client/application ID) registered with the identity provider.
    • OpenID Claim Types - the claims retrieved from the identity provider (for example, email, upn, given_name, preferred_username, azp, sub).
  4. In the Environment info (calculated) section, the following values are automatically generated based on the configuration:

    • Logon URL - the URL used to initiate login.
    • Logoff URL - the URL used to log out of the environment.

Email delivery

Configure how emails are sent from the environment.

By default, emails sent to the users of Cloud are using the default Omada SMTP server. This is the option recommended by Omada.

Email delivery configuration

To send emails via your own company SMTP, follow these steps:

  • Select the radio button Own SMTP server.

  • Fill in the necessary details:

    Email delivery configuration
    • Email sender information:

      • Email address (sender)
      • Display name
    • SMTP server details:

      • DNS name
      • Port number
  • Choose the authentication type:

    • Basic

      Basic authentication type
      • Provide the username and password.
    • Entra ID Password Grant with the following fields:

      Entra ID Password Grant
      • Instance - read-only, with the default value https://login.onmicrosoftonline.com.
      • Application ID - the Application (client) ID that the Azure portal - App registrations page assigned to your app.
      • Tenant ID - the directory tenant that you want to log the user into.
      • Scopes - default value is https://outlook.office365.com/.default.
      • Username - the user name associated with the credentials.
      • Password - password for the user name associated with the credentials.
    • Entra ID Client Credentials with the following fields:

      Entra ID Client Credentials
      • Instance - read-only, with the default value https://login.onmicrosoftonline.com.
      • Application ID - the Application (client) ID that the Azure portal - App registrations page assigned to your app.
      • Tenant ID - the directory tenant that you want to log the user into.
      • Scopes - default value is https://outlook.office365.com/.default.
      • Username - the user name associated with the credentials.
      • Client secret - the client secret associated with the registered application in Microsoft Entra ID.
    • Google Service Account with the following fields:

      Google Service Account
      • Application ID - ID of the service account, available in the JSON file or in the Google console.
      • Key ID - the private key ID from the JSON file created and downloaded from the Google console.
      • Private key - the service account private_key created and downloaded in the JSON format from the Google console, encrypted through StringEncrypter.
      • Scopes - by default, the required scope is https://mail.google.com.
      • User name - the service desk email address that the service will use to send the mails
tip

Make sure that the SMTP server that you’re configuring supports receiving email via TLS protocol.

info

Some situations (Sandbox environments, merger/acquisitions, User Acceptance Testing, and such) require the email delivery to be temporarily paused. You can therefore select Disabled and the environment will not send out any emails. Emails which are in the queue will remain there for 10 days (and will also be sent once you re-enable the delivery of email again in that timeframe). If you want to remove emails from the email queue, raise a service request with the Omada Cloud Operations team.

Infrastructure and integration

These settings are required for hybrid or advanced setups.

OnPrem connection

The OnPrem tab allows you to setup conditional forwards for our integration components enabling you to use your OnPrem DNS names just as if you were in your local network.

warning

If you are using a self‑hosted environment, the On‑Prem connection option is hidden.

OnPrem connection
tip

We recommend putting at least two DNS server IP addresses per domain for better fault tolerance.

When you select the connection from the left-side menu in the OnPrem connection tab, you can also use the buttons to:

  • Configure conditional forwards.
  • View security associations.
  • Capture logs.
  • Reset VPN connection.

DNS forwarders

The DNS forwarders tab allows you to set up conditional forwards for our integration components enabling you to use your OnPrem DNS names just as if you were in your local network.

DNS forwarders
tip

We recommend putting at least two DNS server IP addresses per domain for better fault tolerance.

Trusted certificates

The Trusted certificates tab allows you to configure certificates trusted by our integration components. This enables secure SSL/TLS communication with your on-premises or cloud systems that use certificates issued by private certificate authorities.

Trusted certificates

A common use case is importing Active Directory information via LDAPS (Lightweight Directory Access Protocol over SSL). The certificates securing communication between the integration components and the domain controller are typically issued by a private, Active Directory–integrated certificate authority.

Branding and localization

Logo & colors

The Logo & colors tab allows you to configure your environment’s branding, including the logo and primary and secondary application colors.

Logo & colors

First, upload your desired logo. The color pickers will then automatically suggest colors based on the uploaded image. If these suggestions do not meet your requirements, you can manually enter HEX color codes from your organization’s corporate design guidelines.

info

You can also enable the new user interface from this tab. Note that once enabled, it is not possible to revert to the legacy user interface.

Cultures

The Cultures tab provides a list of all available cloud translations along with their corresponding XML files. If needed, you can download a file, customize it, and upload it in the Custom file column to override the default translations.

Cultures

Languages

The Languages tab allows you to register and enable the languages defined in the Cultures tab. These settings determine which language options are available in user profile settings in the Cloud.

Languages

Advanced configuration

Role mining access

The Role mining access tab allows you to connect to and read data from SQL databases, specifically the Omada Data Warehouse and RoPE databases. This enables you to extract and consolidate roles within your environment.

Role mining access

To configure access, enable the Enabled toggle, provide the required credentials, and, if necessary, add firewall rules to restrict access to specific IP addresses.

Logging

The Logging tab let's you configure where Cloud logs are stored.

Logging

Password synchronization

The encryption key is used to securely transmit password changes from your on-premises environment to the Cloud. You may need to generate a new key during the initial setup, when rotating keys as part of your security policy, or if you suspect that the existing key has been compromised.

Password synchronization

Click Generate new key to create a new encryption key for the Password Synchronization feature (Password Filter).

RoPE configuration

The RoPE configuration tab allows you to view and manage the extensions and keys of the Role and Policy Engine (RoPE), which is responsible for calculating roles and identities.

RoPE configuration

Two views are available: Extensions view and XML view. In both views, you can add comments, reorder items, disable extensions, and make changes.

The views are not synchronized. Any changes made in one view will disable editing in the other.

info

The XML executor, which is owned by the Cloud Management team, is provided for completeness only and cannot be modified by users.