Microsoft Configuration Setup

VOSS-4-UC provides management and administration for Microsoft 365 and Microsoft Team’s cloud assets. This document outlines the required authentication steps needed to configure a connection between a Microsoft 365 and Teams Tenant and VOSS-4-UC.

You will need to be a Global Administrator of the Microsoft 365 and Teams Tenant to complete the following steps:

Step 1: Register An Application Object (Access to Microsoft Azure AD)

The application objects describe the VOSS-4-UC application to Azure AD and can be considered the definition of the VOSS-4-UC application, allowing the Azure AD service to know how to issue tokens to the VOSS-4-UC application based on its settings.

To register your application and add the app’s registration information to your solution, follow these steps:

Note

If you have access to multiple tenants, use the Directory + subscription filter in the top menu to select the tenant in which you want to register an application.

  1. Sign in to the Azure portal (portal.azure.com) using your administrator credentials.

    Important

    Manage the Security defaults for the tenant as follows:

    • Set Access management for Azure resources to No.

      ../../_images/ms-config-manage-security-defaults.png
    • Set Enable Security defaults to No.

      ../../_images/ms-config-enable-security.png

    These settings are required since API access does not cater for 2-step authentication

  2. Search for and select Azure Active Directory.

  3. Under Manage, select App registrations > New registration.

    ../../_images/ms-config-new-reg.png
  4. Enter a Name for your application, for example VOSS4UC. Users of your application might see this name, and you can change it later.

  5. Select Accounts in this organization only

  6. Ignore the Redirect URI section

  7. Select Register.

  8. Under Manage, select Certificates & secrets.

    ../../_images/ms-config-cert-secrets.png
  9. Under Client secrets, select New client secret, enter a name, and then select Add. The add actions opens the Add a client secret pane. Record the secret value in a safe location for use in a later step. The secret is used in the MS Connection configuration in VOSS-4-UC.

    Important

    The secret value is only available when the secret is created and not later. If the value is not copied on time, a new secret will be required.

    ../../_images/ms-config-client-secret.png
  10. Under Manage, select API Permissions > Add a permission. Select Microsoft Graph.

    ../../_images/ms-config-ms-graph-permissions.png
  11. Select Application permissions.

  12. Select Grant Admin Consent to allow User.Read.All

  13. Under User node, select:

    • User.Read.All
    • Directory.Read.All
  14. Select Add permissions

Step 2: Create a Service Account (Access to Microsoft Teams)

  1. Sign in to the Azure portal (portal.azure.com)
  2. On the Admin home page, go to Users > Active users and  click on button Add a user
  3. Enter a Display Name
  4. Enter a User Name
  5. Ensure that the domain is the company.onmicrosoft.com one
  6. Select Let me create a password and enter a strong one
  7. Ensure Require this user to change their password when they first sign in is not ticked
  8. Once the user is created, assign the Global Administrator role from the Assigned Roles menu option.

Important

Take note of the Username and Password - it will be needed to configure the VOSS-4-UC connection.

Step 3: Configure the MS Connection in V4UC

The Microsoft 365 information required to set up a MS Tenant app in VOSS-4-UC is found as follows:

Field Source
Client ID Overview > Essentials > Application (client) ID
Tenant ID Overview > Essentials > Directory (tenant) ID
Secret The secret value is shown during the app registration only once, and should be recorded at that point.
../../_images/MS365-info.png

Use this information to set up a MS Tenant app in VOSS-4-UC. For steps to do this, see: Configure Microsoft Tenant on VOSS-4-UC