Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

The Exchange Online microservice requires a key vault

...

with a certificate for certificate-based authentication between the microservice and the service principal registered for it.

Create the key vault and

...

certificate

  1. In Azure, create a Key vault if you do not already have one or want to create a new one.

  2. Navigate to the Certificate page for the

...

  1. key vault and click Generate/Import.

    Image Added

  2. Enter a Certificate Name and Subject and then click Create.

    Image Added

     

  3. After Azure creates the certificate, click the record for it and then download the certificate in CER format. You will add this to the service principal you created for the Exchange Online app service.

    Image Added

     

Add an access policy

  1. Navigate to the Access policies blade for the key vault.

  2. Click + Add Access Policy.

...

  1. Image Added

  2. Click the

...

...

  1. Certificate permissions drop-down and select

...

  1. Get

...

  1. .

...

  1. Image Added

  2. Under Select principal, click None Selected.

...

  1. Image Added

  2. Search for and select the Managed Identity for the Exchange Online App Service. Please note that the Managed Identity you select is the System Assigned Managed Identity you

...

  1. enabled for the app service.

    Image Added

  2. Click Select to select the principal.

  3. On the Add access policy blade, click Add.

...

...

On the navbar for the Key Vault, under Settings, click Secrets.

...

On the Secrets page, click Generate/Import.

...

On the Create a secret blade, do the following to create the first secret:

...

Name – Enter EIDExchangeAdminUser.

...

Click Create.

...

...

Back on the Secrets blade, click Generate/Import again.

...

On the Create a secret blade, do the following to create the second secret:

  1. Name — Enter EIDExchangeUserPassword.

  2. Value — Secret values should follow username:password format, such as eiduser@<YourAzureTenant>:TestPass123.

  3. Click Create.

...

Back on the Secrets blade, click the record for the Exchange Admin User secret.

...

...

Click the Current Version to go to the Properties blade for the secret.

...

...

On the Properties blade, copy the Secret Identifier. You will use this value later.

...

...

Return to the Secrets blade and repeat steps 16, 17 and 18 for the Exchange User Password secret.

...

Navigate to the Exchange Online App Service you created earlier.

...

On the navbar for the App Service, under Settings, click Configuration.

...

Under Application settings, click New application setting.

...

...

In the Add/Edit application setting pane, do the following:

  1. Name – Enter the name you gave the to the first secret.

  2. Value – Enter @Microsoft.KeyVault(SecretUri={The_Secret_Identifier_For_The_Exchange_Admin_Secret}), replacing {The_Secret_Identifier_For_The_Exchange_Admin_Secret} with the actual Secret Identifier for the secret.

  3. Click OK.

    Image Removed

...

Back in the Application settings tab of the Configuration blade, click New Application setting.

...

In the Add/Edit application setting pane, do the following:

  1. Name – Enter the name you gave the to the second secret.

  2. Value – Enter @Microsoft.KeyVault(SecretUri={The_Secret_Identifier_For_The_Exchange_User_Password_Secret}), replacing {The_Secret_Identifier_For_The_Exchange_User_Password_Secret} with the actual Secret Identifier for the secret.

  3. Click OK.

...

Click Save on the Configuration blade.

...

Click Continue to confirm that you want to save changes.

...

Div
stylefloat: left; position: fixed;padding: 5px;

IN THIS ARTICLE

Table of Contents
maxLevel4
minLevel2
stylenone

Insert excerpt
IL:External Stylesheet
IL:External Stylesheet
nopaneltrue