Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

After you have published the The Exchange Online microservice to Azure, you need to create a Key Vault in Azure (if needed), adding secrets to the Key Vault and configuring the App Service Application settings with those secrets.

...

requires a key vault configured with an access policy that grants key and secret permissions to assigned applications. These permissions will be granted to the Exchange Online app service hosting the microservice.

Create the key vault and access policy

  1. In Azure, create a Key Vault vault if you do not already have one or want to create a new one.

  2. Navigate to the Key Vault vault blade for the appropriate Key Vaultvault.

  3. On the navbar for the Key Vaultvault, under Settings, click Access Policies.

  4. Click + Add Access Policy.

    Image RemovedImage Added

  5. Click the Key Permissions drop-down and select the Get, Decrypt, Unwrap Key, and Verify operations.

    Image RemovedImage Added

  6. Click the Secret permissions drop-down and select the Get and List operations.

    Image RemovedImage Added

  7. Under Select principal, click None Selected.

    Image RemovedImage Added

  8. Search for and select the Managed Identity for the Exchange Online App Service. Please note that the Managed Identity you select is the System Assigned Managed Identity you assigned in Step 12 of Configure Exchange Online App Service Authentication.

    Image RemovedImage Added

  9. Click Select to select the principal.

  10. On the Add access policy blade, click Add.

    Image RemovedImage Added

  11. On the navbar for the Key Vault, under Settings, click Secrets.

  12. On the Secrets page, click Generate/Import.

    Image RemovedImage Added

  13. On the Create a secret blade, do the following to create the first secret:

    1. Name – Enter EIDExchangeAdminUser.

    2. Value – Secret values should follow username:password format, such as eiduser@<YourAzureTenant>:TestPass123.

      Insert excerpt
      IL:Exchange Online Admin User Note
      IL:Exchange Online Admin User Note
      nopaneltrue

    3. Click Create.

      Image RemovedImage Added

  14. Back on the Secrets blade, click Generate/Import again.

  15. On the Create a secret blade, do the following to create the second secret:

    1. Name — Enter EIDExchangeUserPassword.

    2. Value — Secret values should follow username:password format, such as eiduser@<YourAzureTenant>:TestPass123.

    3. Click Create.

  16. Back on the Secrets blade, click the record for the first Exchange Admin User secret.

    Image RemovedImage Added

  17. Click the Current Version to go to the Properties blade for the secret.

    Image RemovedImage Added

  18. On the Properties blade, copy the Secret Identifier. You will use this value later.

    Image RemovedImage Added

  19. Return to the Secrets blade and repeat steps 16, 17 and 18 for the second Exchange User Password secret.

  20. Navigate to the Exchange Online App Service you created earlier.

  21. On the navbar for the App Service, under Settings, click Configuration.

  22. Under Application settings, click New application setting.

    Image RemovedImage Added

  23. In the Add/Edit application setting pane, do the following:

    1. NameEnter the name you gave the to the first secret.

    2. Value Enter @Microsoft.KeyVault(SecretUri={The_Secret_Identifier_For_The_FirstExchange_Admin_Secret}), replacing {The_Secret_Identifier_For_The_FirstExchange_Admin_Secret} with the actual Secret Identifier for the secret.

    3. Click OK.

      Image RemovedImage Added

  24. Back in the Application settings tab of the Configuration blade, click New Application setting.

  25. In the Add/Edit application setting pane, do the following:

    1. NameEnter the name you gave the to the second secret.

    2. Value Enter @Microsoft.KeyVault(SecretUri={The_Secret_Identifier_For_The_SecondExchange_User_Password_Secret}), replacing {The_Secret_Identifier_For_The_Exchange_SecondUser_Password_Secret} with the actual Secret Identifier for the secret.

    3. Click OK.

  26. Click Save on the Configuration blade.

    Image RemovedImage Added

  27. Click Continue to confirm that you want to save changes.

    Image Added

Insert excerpt
IL:External Stylesheet
IL:External Stylesheet
nopaneltrue