As one of the devs responsible for the VTScada implementation of OAuth I take some of the blame for this. In my defence the subject matter is quite complex.
There are two things here, the redirect URI(s) and the TLS certificates associated with those redirect URI(s).
The redirect URI(s) are a list of endpoints on your VTScada Servers that the identity provider, e.g. MS365, can use to return the authorization code after the user has consented (authenticated and approved usage) to the OAuth request.
For each VTScada server you want to use as a possible recipient of the redirect message from the identity provider, it MUST have a TLS certificate (with the appropriate info) and the redirect URI for each VTScada server MUST be listed both in the identity provider configuration (step 8 of the MS365 setup here) and the VTScada OAuth 2.0 Configuration (Part 2, Step 10 here)
As an example, imagine you have a VTScada Server with the FQDN of "scada1.mycompany.com". You would need a TLS certificate with the FQDN appearing in either the "Subject" field or as a DNS entry in the "Subject alternative Name" field. The certificate has to be acceptable to the identity provider, which for MS365 means that it MUST be a publicly Certificate Authority (CA) issued certificate, e.g. from a pay-for provider, or a free CA such as Let's Encrypt. Additional VTScada servers, e.g. "scada2.mycompany.com" would require their own certificate with their respective FQDN in the appropriate fields.
The certificate(s) (and associated private key(s)) would be installed on the VTScada server(s). See the help section starting here for info about certificates.
The redirect URI for the VTScada server is then formed from the server FQDN and the fixed element of the redirect URL, e.g. "https://scada1.mycompany.com//vtscada/oauth/return" and is added as above to both the MS365 and VTScada configuration.
As one of the devs responsible for the VTScada implementation of OAuth I take some of the blame for this. In my defence the subject matter is quite complex.
There are two things here, the redirect URI(s) and the TLS certificates associated with those redirect URI(s).
The redirect URI(s) are a list of endpoints on your VTScada Servers that the identity provider, e.g. MS365, can use to return the authorization code after the user has consented (authenticated and approved usage) to the OAuth request.
For each VTScada server you want to use as a possible recipient of the redirect message from the identity provider, it MUST have a TLS certificate (with the appropriate info) and the redirect URI for each VTScada server MUST be listed both in the identity provider configuration (step 8 of the MS365 setup [here](https://www.vtscada.com/help/Content/D_Customize/OA2_MicrosoftSetup.htm)) and the VTScada OAuth 2.0 Configuration (Part 2, Step 10 [here](https://www.vtscada.com/help/Content/D_Customize/OA2_OAuth2Settings.htm))
As an example, imagine you have a VTScada Server with the FQDN of "scada1.mycompany.com". You would need a TLS certificate with the FQDN appearing in either the "Subject" field or as a DNS entry in the "Subject alternative Name" field. The certificate has to be acceptable to the identity provider, which for MS365 means that it MUST be a publicly Certificate Authority (CA) issued certificate, e.g. from a pay-for provider, or a free CA such as Let's Encrypt. Additional VTScada servers, e.g. "scada2.mycompany.com" would require their own certificate with their respective FQDN in the appropriate fields.
The certificate(s) (and associated private key(s)) would be installed on the VTScada server(s). See the help section starting [here](https://www.vtscada.com/help/Content/D_Customize/Dev_SSLCerts.htm) for info about certificates.
The redirect URI for the VTScada server is then formed from the server FQDN and the fixed element of the redirect URL, e.g. "https://scada1.mycompany.com//vtscada/oauth/return" and is added as above to both the MS365 and VTScada configuration.
Software Developer with Trihedral