Configure Microsoft Identity

The OAuth 2.0 protocol is the authentication and authorization method used with the Application identity to access the API permission(s) granted by the tenant administrator.

To configure the Microsoft Identity on MSL, and administer access to the Microsoft resources using the Application identity created in your tenant directory, perform the following on the Microsoft Azure portal:
  1. Register an application, see Microsoft help.

  2. Obtain the unique Application ID and Tenant ID assigned by Azure Active Directory.

Note:

The customer's firewall settings should allow access to the following Microsoft resources:

  • outlook.office365.com
  • login.microsoftonline.com
  • graph.microsoft.com
Perform the following steps under Cloud Service Provider to complete the authorization related configuration at MSL:
  1. Log in to MSL Server Manager as administrator.

  2. Under Configuration, click Cloud Service Provider > Microsoft.

  3. Complete the Configuration form:

    • Tenant directory

      1. Tenant Name (Optional): Enter a descriptive name for the tenant directory. This field is optional.

      2. Tenant ID: Enter Directory (tenant) ID from the Azure Active Directory. This field is mandatory.

    • Application Identity

      1. Application Name (Optional): Enter the descriptive name for the application created during application registration. This field is optional.

      2. Application ID: Enter the Application (client) ID from the Azure Active Directory. This field is mandatory.

      3. Application Secret: Enter the client secret obtained from the application Certificates & Secrets page. This field is mandatory.

        Note:
        • Certificate-based authentication is not supported at this time.

        • Once the secret is copied, it cannot be retrieved again; if the secret is lost, another one needs to be created.

        • The admin can revoke the secret by deleting it, in which case a new secret is required.

  4. Click Save.

    Note: After a backup restore, the Application Secret will remain intact in the MiCollab if server is restored from an Encrypted backup in the Enterprise. In Google Cloud Platform (GCP), the Application secret will be restored after a backup/restore.