You are viewing an earlier version of the admin guide. For the latest version, please visit EmpowerID Admin Guide v7.211.0.0.

Setting up the Microsoft App ID

You will have to do the Microsoft app registration to establish a trust relationship between the EmpowerID Bot and the Microsoft identity platform. Registration of the Application will facilitate authentication and authorization to be done in the Bot. After the app is registered, you can find the Microsoft App ID and Password to update settings in the App Service. Follow the steps below to set up the Microsoft App ID.


  1. Sign in to the Azure portal.

    1. Search for and select Azure Active Directory.

    2. Under Manage, select App registrations > New registration.

  2. Select the “Accounts in any organizational directory (Any Azure AD directory - Multitenant)” as the supported account type.

     

  3. Delete the Service Principal associated with the Application, if any.

    1. Navigate to the application you created, and click on the Managed application in local directory.

       

    2. Find the properties tab and click on delete.



  4. Create a secret for the new application and set the expiration as 24 months or more. We will store the created secret in the configuration in the following steps, so please copy the created secret.


     

  5. Navigate to the App Service (Linux web app) you created, and set the following settings in the Configuration section.

    1. Copy the Application (Client) ID just created and paste it into MicrosoftAppId Key.

    2. Copy the Secret ID, paste it into the MicrosoftAppPassword.

 

In the next step, we will verify Configurations & Publish the Bot Microservice to Azure.

https://dotnetworkflow.jira.com/wiki/spaces/EAGV22/pages/2809026742

All steps in Deployment & Configuration of EID Bot