Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

As part of the process for deploying MyTasks, To manage SharePoint, the EmpowerID SharePoint Online (SPO) microservice requires a service principal application used to authenticate the MyTasks backend App Service be registered in the SharePoint tenant to provide Azure AD authentication to the app service that hosts the SPO microservice must be registered in Azure.

Register

...

a service principal

...

Log in to your Azure portal as a user with the necessary permissions to create an application in Azure AD.

for app service auth

...

  1. In Azure, navigate to your Azure Active Directory.

  2. On the Azure Active Directory navbar, click App registrations.

  3. On the App registrations page, click New registration.

    Image RemovedImage Added

  4. Name the application, select the scope for the application (single or multitenant) and click Register.

  5. Once the application is registered, copy the Application (client) ID , and Directory (tenant) ID and Object ID from the Overview page. These values are used later to configure AD authentication for the MyTasks App service. The next step is to .

  6. Navigate to the Certificates & secrets blade for the application and upload the base-64 encoded certificate that you have selected to authenticate to the application.
    Insert excerptIL:Azure Cert RequirementsIL:Azure Cert Requirementsnopaneltrue

  7. Under Manage, click Certificates & secrets.

  8. Under Certificates, click Upload certificate and upload the base-64 encoded certificate.

  9. Under Client secrets, click New client secret. The secret is used by the application to prove its identity when requesting a token.

  10. Enter a Description for the client secret, select when the secret Expires and then click Add.

  11. Under Manage, select Branding and update the settings accordingly. The Home page URL should be set to the URL for the MyTasks Front-End app service you created earlier.

  12. Save the settings.

  13. Under Manage, select Authentication and click Add a platform.

  14. Click Add a platform.

  15. Select Web.

  16. In the Configure Web pane do the following:

    1. In the Redirect URIs field, enter the URL for the MyTasks UI Web Service appended with /callback, such as https://{{mytasks-ui-url}}/callback, where {{mytasks-ui-url}} is the URL for the MyTasks UI App Service you created.

    2. Under Implicit grant, select both Access tokens and ID tokens.

    3. Click Configure.

  17. After the application configuration completes, click Add URI and enter the URL for the MyTasks UI Web Service appended with /.auth/login/aad/callback, such as https://{{mytasks-ui-url}}/.auth/login/aad/callback, where {{mytasks-ui-url}} is the URL for the MyTasks UI App Service you created.

  18. Click Save.

  19. Under Manage, select Expose an API and then click the Application ID URI Set link.

  20. In the Application ID URI field of the Set the App ID URI dialog, enter the URL for the My Tasks API App Service you created earlier and then click Save. The URI should look similar to https://mytasks-api-app.azurewebsites.net, where mytasks-api-app is the name of the MyTasks API app service.

  21. Under Scopes defined by this API, click Add a scope and enter the following information:

    • Scope name — Enter mytasks.all

    • Who can consent? — Select Admins and users.

    • Admin consent display name — Enter a desired display name.

    • Admin consent description — Enter a desired description.

    • State — Select Enabled.

    • Click Add Scope.

  22. Under Manage, select API Permissions and click Add a permission.

  23. Select APIs my organization uses and then search for and select the MyIdentity-API-AD application you created above.

  24. Select Delegated permissions and then select the myidentity.all scope.

  25. Click Add permissions.

...

  1. are using to secure HTTP traffic between EmpowerID and the microservice. The public key certificate that you upload to Azure must have a corresponding private key in the EmpowerID certificate store; otherwise, an error will occur when calling Azure’s API.

  2. Add a client secret and copy the value. You add this value to the Key Vault in your EmpowerID tenant.

    Image Added

...

Next steps

Register Service Principal with SharePoint API Permissions

Create an app service for the SharePoint Online Microservice

Create a key vault

Provision a Cosmos DB Account for SharePoint Online

Create a Function app to Update User Profiles

Add application settings to the app service

Add Secret to Key Vault in EmpowerID Tenant

Publish the SharePoint Online Microservice

Configuration of SharePoint Online Inventory - Not Applicable if using EmpowerID SaaS