Deploy Synchronization Application (Customer Subscription)

This section describes how to setup and configure the App registration for the Background registration with a Customer Azure subscription. The App Registration manages the automatic synchronization between the Live Platform Multitenant Portal and the customer’s Microsoft 365 platform. You must add the App registration under the Provider Tenant’s Azure subscription for each UMP device. In this procedure, a redirect URL is configured which is used as part of the token authentication for requesting email consent from the customer tenant to connect to their Microsoft Office 365 platform (see Running Token Authentication Invitation Wizard).

In this procedure, the Client ID and the Redirect URL must be configured in the Auth Tokens screen in the Multitenant interface (see Step below and Pending Invitations). Once this registration is finished, the details of the M365 user configured in this procedure are displayed in the Multitenant portal in the Microsoft 365 Settings screen (see Securing Microsoft 365 Service Provider Access).

Once you complete this registration, administrator roles must be assigned to the customer IT administrator who provides consent to Service Provider IT administrator for using the token authentication (see Grant Roles to Global admin Account).

If this procedure is performed by AudioCodes Professional Services, a Global-admin account should be provided by the managed customer. This global registration is used for all AudioCodes Live Direct Routing and Operator Connect customers.
The domain names shown in the procedure below are examples only.
For each customer, a unique redirect URL is defined.
This procedure must be performed by new customers running a clean installation. For existing customers, the registration must be updated as described in Post Upgrade Actions.
Do the following:
1. Access the Provider Azure Active Directory admin center/ app registration on the Azure portal with System Admin permissions.
2. Enter the following details:
Name: App registration name
Select account type: Accounts in any organizational directory (Any Azure AD directory - Multitenant)

Graphical user interface, text, application

Description automatically generated

3. Click Register.
4. In the Navigation pane, select Authentication.

Graphical user interface, text, application, email

Description automatically generated

5. Under Platform configurations/Redirect URLs, click Add URI.

6. Enter the HTTPS URL of the UMP installation VM (e.g. https://livecloud.finebak.com/authenticate/OAuth2Callback)

where:

“Finebak.com” is the FQDN of the Azure Virtual Machine where UMP is installed
“OAuth2Callback” is the name of the token authentication page inside the registered application
7. Copy the URL to notepad as it is required later in the configuration.
8. Under implicit grant and hybrid flows, select the following check boxes:
Access tokens (used for implicit flows)
ID tokens (used for implicit and hybrid flows)

Graphical user interface, text, application, email

Description automatically generated

9. Under Supported account types, select Accounts in any organizational directory (Any Azure AD directory – Multitenant).

Graphical user interface, text, application, email

Description automatically generated

Verify the MPN ID to ensure that the Consent dialog will automatically be set as a trusted application.

10. Under Advanced Settings, set to Yes.

Graphical user interface, text, application, email

Description automatically generated

11. In the Navigation pane, select API Permissions.
12. Set the permissions shown in the figures below.

Graphical user interface, application

Description automatically generated

Table

Description automatically generated

13. Navigate to the Overview page.
14. Copy the Application (client) ID value to notepad.

Graphical user interface, text, application

Description automatically generated

15. In the navigation pane, select Certificates & Secrets and then click New Client secret.

Table

Description automatically generated

Graphical user interface, application

Description automatically generated

16. Enter Description, set Expires to 24 months and then click Add.
17. Copy the newly generated secrets’ Value to notepad.

Graphical user interface, application

Description automatically generated

Graphical user interface, application

Description automatically generated

18. In the Multitenant Navigation pane, open the Auth Tokens page (Security > Auth Tokens) and do the following:
Paste the Application (client) ID and Client secret value to the respective fields.
Enter the RedirectUrl that you configured above.

For example https://livecloud.finebak.com/authenticate/OAuth2Callback

19. Click Apply Changes.