Creating and configuring an Azure App for the Email Dialogue Provider
Prerequisites
- Your company must have Azure
- The user account that creates the app must be present in the Microsoft Entra ID Formerly known as Azure Active Directory (or Azure AD, or AAD) directory of your company and have the rights to create apps (this is possible by default unless limited by an admin)
- A global admin will have to go to an admin consent url in order to allow accounts of this Microsoft Entra ID Formerly known as Azure Active Directory (or Azure AD, or AAD) directory to use it, since Teams requires permissions normally reserved for admins. By consenting a global admin allow regular users to have these permissions in the app.
Create an Azure App
Our first step is to create the App in Azure.
-
Navigate to https://portal.azure.com
-
Select Microsoft Entra ID From the Azure Portal Menu
(upper left).
-
From here collect your tenant domain for later use (e.g. domain.com or domain.onmicrosoft.com)
-
Select App registrations
-
Click New Registration and do the following:
-
Give the application a name (e.g. A365-Azure-Application)
-
Under Supported account types, select Accounts in this organizational directory only
-
Add the following redirect URI
Type: Public client (mobile & desktop)
Redirect URI: urn:ietf:wg:oauth:2.0:oob
-
Click Register
-
Select Authentication
-
Add Web as a platform
-
Under Web | Redirect URIs enter a url, for example http://localhost
-
Under Implicit grant select both options:
-
Access tokens
-
Id tokens
-
-
Under Mobile and desktop applications | Redirect URIs check all three options
-
msal<application_client_id>://auth
-
https://login.microsoftonline.com/common/oauth2/nativeclient
-
https://login.live.com/oauth20_desktop.srf
-
-
Double check if Supported account types is set to:
-
Accounts in this organizational directory only
-
-
-
Click Save
Configure API Permissions
Before the App can be used, the right permissions need to be assigned. This varies per use of the App.
-
Navigate to your Azure App
-
Click ‘API Permissions’
Add the following permissions:
-
Mail
-
Click ‘Add a permission’
-
Click ‘Microsoft Graph’
-
Click ‘Application permissions’
-
Open 'Mail'
-
If 'Mail.ReadWrite' is not selected, select it
-
If 'Mail.Send' is not selected, select it
-
click 'Add permissions'
-
-
User.Read.All
-
Click ‘Add a permission’
-
Click ‘Microsoft Graph’
-
Click ‘Application permissions’
-
Open 'User'
-
If 'User.Read.All' is not selected, select it
-
Click 'Add permissions'
-
-
Directory.Read.All
-
Click ‘Add a permission’
-
Click ‘Microsoft Graph’
-
Click ‘Application permissions’
-
Open 'Directory'
-
If 'Directory.Read.All' is not selected, select it
-
Click 'Add permissions'
-
-
Generate Client secret
-
Navigate to your App
-
Click ‘Certificates & secrets’
-
Click ‘New client secret’
-
Fill in a description (e.g. AnywhereNow Client Secret)
-
Select ‘Expires never’
-
-
Click ‘Add’
-
Copy the client secret value and paste it for later use
Using the app
-
Navigate to your App
-
Click ‘Overview’
-
Collect the following value to be used.
-
Application (client) id
-
Directory (tenant) id
-
-