OWACurrent en:Setting up MS Graph: Unterschied zwischen den Versionen
Kunzw (Diskussion | Beiträge) (Änderung 44078 von Kunzw (Diskussion) rückgängig gemacht.) Markierung: Rückgängigmachung |
Kunzw (Diskussion | Beiträge) Keine Bearbeitungszusammenfassung |
||
Zeile 15: | Zeile 15: | ||
#* You may choose the supported account types according to your requirements. Depending on your selection, you will need additional information found after you've finalized the app registration in order to finalize the set-up on the Cryptshare Server. | #* You may choose the supported account types according to your requirements. Depending on your selection, you will need additional information found after you've finalized the app registration in order to finalize the set-up on the Cryptshare Server. | ||
#* You must add a redirect URI, configured as a "Single-Page Application (SPA)". The redirect URI must exactly match the one that is displayed on the '''Add-on products -> Cryptshare for OWA''' configuration page of your Cryptshare Server. [[File:EntraFindRedirectUrl.png|border|none|500px]] | #* You must add a redirect URI, configured as a "Single-Page Application (SPA)". The redirect URI must exactly match the one that is displayed on the '''Add-on products -> Cryptshare for OWA''' configuration page of your Cryptshare Server. [[File:EntraFindRedirectUrl.png|border|none|500px]] | ||
# Once you've created the application, copy/store the "Application (client) ID". [[File:EntraClientID.png|border|none|500px]] | # Once you've created the application, copy/store the "Application (client) ID". [[File:EntraClientID.png|border|none|500px]]{{InfoBox|title=To enable the use of MS Graph, the add-in requires two permissions: User.Read and Mail.ReadWrite. There are two ways to grant these permissions:|content=* Add-In users can confirm these permissions via a dialog when launching the add-in. In this case, no further configuration is required in Azure Entra and you can proceed with the configuration on the Cryptshare server. | ||
* The required permissions can be granted by the administrator for all users. In this case, the dialog for granting permissions will no longer appear for users. The following steps describe how the administrator can grant permissions.}} | |||
# In the sidebar of the registered application, select "API permissions." | # In the sidebar of the registered application, select "API permissions." | ||
# Click on "Add a permission", in order to add the '''Microsoft Graph -> Mail.Read''' permission. [[File:EntraAddingPermissions.png|border|none|500px]] | # Click on "Add a permission", in order to add the '''Microsoft Graph -> Mail.Read''' permission. [[File:EntraAddingPermissions.png|border|none|500px]] |
Version vom 26. September 2024, 15:03 Uhr
Introduction
The add-in utilizes Microsoft Graph to provide some of its functionality. Specifically, the add-in requests access to reading your users mailbox, to provide functionality regarding client verification and retrieving transfers.
Registering an app in the Azure Entra Platform
- Sign in to the Microsoft Entra Admin Center as an account that is a Cloud Application Administrator or greater.
- If you have access to multiple tenants/directories, ensure you've selected the tenant that you wish to use Cryptshare for OWA with by clicking on the Settings cogwheel at the top.
- Using the sidebar, navigate to Identity -> Applications -> App registrations.
- Create a new registration by clicking on "New registration".
- Register your app with the following parameters:
- The application name may be chosen freely.
- You may choose the supported account types according to your requirements. Depending on your selection, you will need additional information found after you've finalized the app registration in order to finalize the set-up on the Cryptshare Server.
- You must add a redirect URI, configured as a "Single-Page Application (SPA)". The redirect URI must exactly match the one that is displayed on the Add-on products -> Cryptshare for OWA configuration page of your Cryptshare Server.
- Once you've created the application, copy/store the "Application (client) ID". To enable the use of MS Graph, the add-in requires two permissions: User.Read and Mail.ReadWrite. There are two ways to grant these permissions:* Add-In users can confirm these permissions via a dialog when launching the add-in. In this case, no further configuration is required in Azure Entra and you can proceed with the configuration on the Cryptshare server.
- The required permissions can be granted by the administrator for all users. In this case, the dialog for granting permissions will no longer appear for users. The following steps describe how the administrator can grant permissions.
- In the sidebar of the registered application, select "API permissions."
- Click on "Add a permission", in order to add the Microsoft Graph -> Mail.Read permission.
- Ensure that the application you have just created has access to the following delegated permissions: User.Read and Mail.Read.
- Continue with configuring the newly registered app in your Cryptshare Server.
OWA Add-ins use the Microsoft Entra application information that is configured within the associated Cryptshare Server.
To get started, open the Add-on products -> Cryptshare for OWA configuration page in the admin interface.
In the Application (client) ID field, enter the application ID you have retrieved from the Entra portal after registering your application.
The authority setting depends on the supported account types you have selected when registering your application on Microsoft Entra.
- If you've chosen "Accounts in this organizational directory only (Single tenant)", choose "Bound to tenant" and enter your tenant ID. You can find your tenant ID on the Overview screen of the Microsoft Entra Identity Portal.
- If you've chosen "Accounts in any organizational directory (Any Microsoft Entra ID tenant - Multitenant)", select "Custom" and enter https://login.microsoftonline.com/organizations/
- If you've chosen "Accounts in any organizational directory (Any Microsoft Entra ID tenant - Multitenant) and personal Microsoft accounts (e.g. Skype, Xbox)", select "https://login.microsoftonline.com/common"
- If you've chosen "Personal Microsoft accounts only", select "Custom" and enter https://login.microsoftonline.com/consumers/
Make sure that you save your changes by using the Save Changes button below before exiting the webinterface.