At line 1 removed 2 lines |
It requires Microsoft Graph Application registration. Start at the Microsoft Azure portal:\\ |
[https://azure.microsoft.com/en-us/features/azure-portal/]\\ |
At line 4 changed one line |
__Application registration__: Go to the App registrations and click on New registration:\\ |
Start at the __Microsoft Azure Portal__: [Link|https://azure.microsoft.com/en-us/features/azure-portal/]\\ |
At line 6 changed one line |
[attachments|SMTP Microsoft Graph XOAUTH 2 Integration/new_registration.png]\\ |
__Application registration:__ Navigate to App registrations in the Azure Portal. Click on __New registration__ to create a new application.\\ |
At line 8 changed one line |
Name it. Select __Single-page Application__ as a platform. The redirect URL must end with__WebInterface/login.html__. Then click on register.\\ |
[SharePoint Integration/new_registration.png]\\ |
At line 10 changed one line |
[CrushOAuth/app_reg_config.png]\\ |
In the Redirect URI section, for Platform configuration, select __Web__. The Redirect URL must end with __SSO_OIDC/__.\\ |
At line 12 changed one line |
Make sure that MSAL.js 2.0 and Implicit grant (Access Token, ID Token) grant types are permitted.\\ |
{{{ |
|
http://localhost:9090/SSO_OIDC/ |
|
}}}\\ |
or |
{{{ |
|
https://your.crushftp.domain.com/SSO_OIDC/ |
|
}}}\\ |
At line 14 changed one line |
[CrushOAuth/app_reg_auth_config.png]\\ |
__Secret key__: A new client secret must be created. Go to __Certificates & secrets__, and generate a new client secret by clicking on __New client secret__. Ensure you copy over the __value__ immediately!\\ |
At line 16 changed one line |
Configure the API permissions:\\ |
[SharePoint Integration/new_secret.png]\\ |
At line 26 added 11 lines |
[SharePoint Integration/secret_value.png]\\ |
\\ |
\\ |
Configure the __API Permissions__:\\ |
\\ |
Ensure the application has the following __Delegated Permissions__ assigned:\\ |
\\ |
__a.) User.Read__: This permission allows an application to access basic profile information (Like: Name,Email address,User ID (object ID), User principal name (UPN), Tenant ID) of the signed-in user.\\ |
\\ |
__b.) GroupMember.Read.All__ (Optional): This permission allows the application to read the members of all groups in the directory. List the users, devices, service principals, and other groups that are members of: Microsoft 365 groups, Security groups, Distribution groups. It requires an admin to consent—ordinary users cannot approve it.\\ |
\\ |
At line 20 changed one line |
Get Client ID and Tenant ID from App registration -> Overview.\\ |
Grant __Admin consent__ for the newly added permission.\\ |
At line 41 added 4 lines |
[SharePoint Integration/app_permission_admin_consent.png]\\ |
\\ |
Get __Client ID__ and __Tenant ID__ from App registration -> Overview.\\ |
\\ |
At line 26 changed one line |
You can add groups claim to the token.\\ |
You can add the groups claim to the authorization token. Including group claims in tokens allows applications to determine a user’s group memberships immediately upon login, without the need for additional API calls.\\ |
At line 29 changed one line |
|
\\ |
Copy and securely store the __Client ID__ and __Client Secret__ as these will be required for the [CrushOIDC] plugin configuration.\\ |