Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

The Exchange Online microservice requires a key vault with a certificate for certificate-based authentication between the microservice and the service principal registered for it. Additionally, the key vault needs to be configured with an access policy that grants key, secret, and certificate permissions to assigned applications. These permissions will be granted to the Exchange Online app service hosting the microservice.

Create the key vault and certificate

  1. In Azure, create a Key vault if you do not already have one or want to create a new one.

  2. Navigate to the Certificate page for the key vault and click Generate/Import.

  3. Enter a Certificate Name and Subject and then click Create.

     

  4. After Azure creates the certificate, click the record for it and then download the certificate in CER format. You will add this to the service principal you created for the Exchange Online app service.

     

Add an access policy

to the key vault

  1. Navigate to the Access policies blade for the key vault.

  2. Click + Add Access Policy.

    Image Removed

  3. Click the Key Permissions drop-down and select the Get, Decrypt, Unwrap Key, and Verify operations.

    Image Removed

  4. Click the Secret permissions drop-down and select the Get and List operations.

    Image Removed

  5. Click the Image Added

  6. Click the Certificate permissions drop-down and select Get.

    Image RemovedImage Added

  7. Under Select principal, click None Selected.

    Image RemovedImage Added

  8. Search for and select the Managed Identity for the Exchange Online App Service. Please note that the Managed Identity you select is the System Assigned Managed Identity you assigned in Step 12 of Configure Exchange Online App Service Authentication.

    Image Removed

    enabled for the app service.

    Image Added

  9. Click Select to select the principal.

  10. On the Add access policy blade, click Add.

    Image Removed

Add secrets to the key vault

  • On the navbar for the Key vault, under Settings, click Secrets.

  • On the Secrets page, click Generate/Import.

    Image Removed

  • On the Create a secret blade, do the following to create the first secret:

  • Name – Enter EIDExchangeAdminUser.

  • Value – Secret values should follow username:password format, such as eiduser@<YourAzureTenant>:TestPass123.
    Insert excerptIL:Exchange Online Admin User NoteIL:Exchange Online Admin User Notenopaneltrue
  • Click Create.

    Image Removed

  • Back on the Secrets blade, click Generate/Import again.

  • On the Create a secret blade, do the following to create the second secret:

    1. Name – Enter EIDExchangeUserPassword.

    2. Value – Secret values should follow username:password format, such as eiduser@<YourAzureTenant>:TestPass123.

    3. Click Create.

  • Back on the Secrets blade, click the record for the Exchange Admin User secret.

    Image Removed

  • Click the Current Version to go to the Properties blade for the secret.

    Image Removed

  • On the Properties blade, copy the Secret Identifier. You will use this value later.

    Image Removed

  • Return to the Secrets blade and repeat steps 16, 17 and 18 for the Exchange User Password secret.

  • Add secrets to the Exchange App service

    1. Navigate to the Exchange Online App Service you created earlier.

    2. On the navbar for the App Service, under Settings, click Configuration.

    3. Under Application settings, click New application setting.

      Image Removed

    4. In the Add/Edit application setting pane, do the following:

      1. Name – Enter the name you gave the to the first secret.

      2. Value – Enter @Microsoft.KeyVault(SecretUri={The_Secret_Identifier_For_The_Exchange_Admin_Secret}), replacing {The_Secret_Identifier_For_The_Exchange_Admin_Secret} with the actual Secret Identifier for the secret.

      3. Click OK.

        Image Removed

    5. Back in the Application settings tab of the Configuration blade, click New Application setting.

    6. In the Add/Edit application setting pane, do the following:

      1. Name – Enter the name you gave the to the second secret.

      2. Value – Enter @Microsoft.KeyVault(SecretUri={The_Secret_Identifier_For_The_Exchange_User_Password_Secret}), replacing {The_Secret_Identifier_For_The_Exchange_User_Password_Secret} with the actual Secret Identifier for the secret.

      3. Click OK.

    7. Click Save on the Configuration blade.

      Image Removed

    8. Click Continue to confirm that you want to save changes.

      Image Removed

    Insert excerptIL:External StylesheetIL:External StylesheetnopaneltrueUpload the certificate to the service principal
    1. Navigate to the Certificates & Secrets blade for the service principal you created for the Exchange Online app service.

    2. Upload the certificate you downloaded from the key vault.

    1. Image Added


    Next Steps

    Grant API Permissions to the service principal

    Div
    stylefloat: left; position: fixed;padding: 5px;

    IN THIS ARTICLE

    Table of Contents
    maxLevel4
    minLevel2
    stylenone

    Insert excerpt
    IL:External Stylesheet
    IL:External Stylesheet
    nopaneltrue