Microsoft Azure Active Directory
The Microsoft Azure Active Directory connector is authenticated with the OAuth2.0 protocol. You will need to register an application and provide the connector with that application's Client ID (Application ID) and Client Secret.
Please follow Microsoft's official guide to registering an application in Azure Active Directory. That documentation can be found here.
For "Supported account types" you should select "Accounts in any organizational directory (Any Azure AD directory - Multitenant)"
Redirect URI should be {% raw %}https://{{Your Cyclr service domain e.g. http://app-h.cyclr.com }}/connector/callback{% endraw %}
Client ID (Application ID) is displayed in the overview of your created app
Generate a Client Secret by following these steps
Permissions must be set for the application. The following table details the permissions required for each method category in the connector.
Category | Permissions |
---|---|
Groups | Group.Read.All, GroupMember.Read.All |
Organization | Organization.Read.All |
People | People.Read.All |
Places | Place.Read.All |
Users | User.Read.All |
In addition to the category specific permissions, you should add permissions for offline_access and Directory.Read.All.
To add these permissions in Azure Active Directory:
From App registrations in the Azure portal select your application
Select API permissions from the menu on the left
Click + Add a permission. This will open the permissions menu
From Microsoft APIs select Microsoft Graph and then Delegated permissions
You will be presented with a series of permissions categories
Select the checkboxes for the appropriate permissions and click Add permissions
You must then Grant admin consent for organization
Connector Setup
To allow your clients to access their own data through your Active Directory App, you must save the Client ID and Client Secret values in your Cyclr Console.
Locate the Microsoft Azure Active Directory connector
Cyclr Console > Connectors > Application Connector Library > Microsoft Azure Active Directory
From the Edit Connector interface click 'Setup'
Enter your Client ID and Client Secret then click 'Save Changes'
The Microsoft Azure Active Directory Connector can now be installed and the user will only be asked to authenticate your App.