Skip to end of banner
Go to start of banner

Create a key vault for the Exchange Online Microservice

Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 8 Next »

The Exchange Online microservice requires a key vault with a certificate for certificate-based authentication between the microservice and the service principal registered for it. Additionally, the key vault needs to be configured with an access policy that grants key, secret, and certificate permissions to assigned applications. These permissions will be granted to the Exchange Online app service hosting the microservice.

Create the key vault and certificate

  1. In Azure, create a Key vault if you do not already have one or want to create a new one.

  2. Navigate to the Certificate page for the key vault and click Generate/Import.

  3. Enter a Certificate Name and Subject and then click Create.

     

  4. After Azure creates the certificate, click the record for it and then download the certificate in CER format. You will add this to the service principal you created for the Exchange Online app service.

     

Add access policy to the key vault

  1. Navigate to the Access policies blade for the key vault.

  2. Click + Add Access Policy.

  3. Click the Key Permissions drop-down and select the Get, Decrypt, Unwrap Key, and Verify operations.

  4. Click the Secret permissions drop-down and select the Get and List operations.

  5. Click the Certificate permissions drop-down and select Get.

  6. Under Select principal, click None Selected.

  7. Search for and select the Managed Identity for the Exchange Online App Service. Please note that the Managed Identity you select is the System Assigned Managed Identity you assigned in Step 12 of Configure Exchange Online App Service Authentication.

  8. Click Select to select the principal.

  9. On the Add access policy blade, click Add.

Add secrets to the key vault

  1. On the navbar for the Key vault, under Settings, click Secrets.

  2. On the Secrets page, click Generate/Import.

  3. On the Create a secret blade, do the following to create the first secret:

    1. Name – Enter EIDExchangeAdminUser.

    2. Value – Secret values should follow username:password format, such as eiduser@<YourAzureTenant>:TestPass123.

      The user entered here should have the Exchange Admin role assigned to them in Azure. EmpowerID uses this identity to authenticate to Exchange Online PowerShell.

    3. Click Create.

  4. Back on the Secrets blade, click Generate/Import again.

  5. On the Create a secret blade, do the following to create the second secret:

    1. Name – Enter EIDExchangeUserPassword.

    2. Value – Secret values should follow username:password format, such as eiduser@<YourAzureTenant>:TestPass123.

    3. Click Create.

  6. Back on the Secrets blade, click the record for the Exchange Admin User secret.

  7. Click the Current Version to go to the Properties blade for the secret.

  8. On the Properties blade, copy the Secret Identifier. You will use this value later.

  9. Return to the Secrets blade and repeat steps 16, 17 and 18 for the Exchange User Password secret.

Add secrets to the Exchange App service

  1. Navigate to the Exchange Online App Service you created earlier.

  2. On the navbar for the App Service, under Settings, click Configuration.

  3. Under Application settings, click New application setting.

  4. In the Add/Edit application setting pane, do the following:

    1. Name – Enter the name you gave the to the first secret.

    2. Value – Enter @Microsoft.KeyVault(SecretUri={The_Secret_Identifier_For_The_Exchange_Admin_Secret}), replacing {The_Secret_Identifier_For_The_Exchange_Admin_Secret} with the actual Secret Identifier for the secret.

    3. Click OK.

  5. Back in the Application settings tab of the Configuration blade, click New Application setting.

  6. In the Add/Edit application setting pane, do the following:

    1. Name – Enter the name you gave the to the second secret.

    2. Value – Enter @Microsoft.KeyVault(SecretUri={The_Secret_Identifier_For_The_Exchange_User_Password_Secret}), replacing {The_Secret_Identifier_For_The_Exchange_User_Password_Secret} with the actual Secret Identifier for the secret.

    3. Click OK.

  7. Click Save on the Configuration blade.

  8. Click Continue to confirm that you want to save changes.

IN THIS ARTICLE

  • No labels