REST api and breaking changes for authentication in v8
We have been using the onestream REST api for a couple years now.
In the past we had been using Open-ID-connect (OIDC) to authenticate against an Azure AD ("Entra") directory, and then generate reports from cubeviews or data adapters.
During our current upgrade to v8, we started receiving lots of mixed messages from onestream employees about whether OpenID is still supported. I'm assuming that the OS support team knows what they are talking about, but it seems to contradict the docs in substantial ways. Moreover, it contradicts common sense.
What they are telling me is that in the "hosted" version of Onestream v8 on Azure, we are NO LONGER allowed to use OIDC to authenticate a service principal (app registration) and connect to the REST api. Instead, they are saying that a new engineering team at onestream (called "OIS" team?) have rebuilt the authentication layers and they removed OIDC support in favor of PAT tokens. Supposedly the PAT tokens are the only way to use the REST api in onestream going forward.
This seems to be a massive step backwards - we lose our ability to connect with a normal service principal from Entra ID, and we must start using a custom login that originates in onestream (one that will not have consistent governance as various other services that are managed by our security team.)
NOTE: The docs talk a lot about both OIDC *and* PAT tokens, so it seems like both are allowable.... Whenever the terms are contrasted or are used in close proximity to each other, the docs will say that customers "may use" PAT tokens. They never say we "must use" PAT tokens.
Can anyone provide some more color to help customers understand this change? It feels like a regression. I suspect it may not have been intentional. In my opinion, these PAT tokens aren't appropriate for the back-end service integrations, and we would rather continue using our old service principals originating in Entra ID.
Any additional information would be very much appreciated.