Deploy Sync App on Service Provider Azure Subscription
The Delegated Token Synchronization App registration is used to secure a Token invitation link to the Invitation wizard for performing customer Onboarding for Direct Routing and Operator Connect services. You must add this registration on the service provider tenant’s Microsoft Entra ID for each managed UMP-365 instance. The registration includes the configuration of an Authentication Portal URL (Token Invitation link) to the Invitation wizard that is sent to the customer M365 tenant global admin email account (also accessible from the Pending Invitations page, see figure below. In addition, the registration also includes the configuration of a Redirect (OAuth2Callback) URL which redirects the Microsoft authentication process back to Live Platform when the customer creates a new registration (Delegated Token or App registration) on their Microsoft Entra ID tenant from the Invitation wizard. This registration is then used to complete the Onboarding of the Direct Routing and Operator Connect services and for Background task replication synchronization in day-to-day operations.
|
●
|
This procedure is for creating the registration on the Service Provider Azure subscription. |
|
●
|
If this procedure is performed by AudioCodes Professional Services, a Global-admin account should be provided by the managed customer. This global registration is used for all AudioCodes Live Direct Routing and Operator Connect customers. |
|
●
|
The domain names shown in the procedure below are examples only. |
|
●
|
For each customer, a unique redirect URL is defined. |
|
1.
|
Sign-in to Microsoft Entra ID for the Service Provider operator tenant with Global Admin permissions. |
|
2.
|
Under Manage Azure Active Directory, select View. |
|
3.
|
In the Navigation pane, select Manage > App registrations. |
|
4.
|
Click New registration. |
|
5.
|
Enter the following details: |
|
●
|
Name: App registration name |
|
●
|
Select account type: Multiple Entra ID tenants |
|
7.
|
Navigate to the Overview page. |
|
8.
|
Copy the Application (client) ID value to notepad as it is configured later in this procedure. |
|
9.
|
Click the Add a Redirect URI link to add the Redirect URI. The Authentication (Preview) screen is displayed. |
|
10.
|
Click Add Redirect URI. |
|
11.
|
Select the Web option. |
|
12.
|
Enter the Redirect URL in the following format: https://<appname>.<serviceproviderFQDN>/authenticate/OAuth2Callback |
For example: " https://umptoken.finebak.com/authenticate/OAuth2Callback"
where:
|
●
|
<appname> is the name of the Delegated Token app. |
|
●
|
“OAuth2Callback” is the name of the Token Authentication page inside the registered application |
|
●
|
The "https://umptoken.finebak.com/authenticate/OAuth2Callback" Redirect (OAuth2Callback) URL is used by Microsoft to redirect back to Live Platform during the creation of a new registration on the M365 customer tenant. |
|
●
|
The "https://umptoken.finebak.com/authenticate" Authentication Portal URL is the Token Invitation link to the Invitation wizard that is sent to the global admin of the M365 customer tenant at the beginning of the onboarding process. |
|
13.
|
Copy the URL values to notepad as they are configured later in this procedure. |
|
14.
|
Under 'Implicit grant and hybrid flows', select the following: |
|
●
|
Access tokens (used for implicit flows) |
|
●
|
ID tokens (used for implicit and hybrid flows) |
|
16.
|
Click the Settings tab. |
|
17.
|
Enable Allow public client flows and then click Save. |
|
18.
|
Click the Supported accounts tab, select Multiple Entra ID tenants and then click Save. |
|
19.
|
In the Navigation pane, select Manage > API Permissions and set the following permissions: |
|
◆
|
AppCatalog.ReadWrite.All: Read and write to all app catalogs |
|
◆
|
offline_access:
Maintain access to data you have given it access to |
|
◆
|
profile:
View users' basic profile |
|
◆
|
User.Read: Sign in and read user profile |
|
◆
|
User.Read.All:
Read all users' full profiles |
|
◆
|
Directory.Read.All:
Read directory data |
|
◆
|
Directory.ReadWrite.All:
Read and write directory data |
|
◆
|
Group.ReadWrite.All:
Read and write all groups |
|
◆
|
User.ReadWrite.All:
Read and write all users' full profiles |
|
●
|
Skype and Teams Tenant Admin AP: |
|
◆
|
application_access_custom_sba |
|
●
|
Other Delegated Permissions (see figure below for details): |
|
◆
|
AuditLog.Read.All:
Read audit log data |
|
◆
|
Directory.AccessAsUser.All:
Access directory as the signed in user |
|
◆
|
IdentityProvider.ReadWrite.All:
Read and write identity providers |
|
◆
|
Policy.ReadWrite.TrustFramework:
Read and write your organization's trust framework policies |
|
◆
|
PrivilegedAccess.ReadWrite.AzureAD:
Read and write privileged access to Azure AD |
|
◆
|
PrivilegedAccess.ReadWrite.AzureResources:
Read and write privileged access to Azure resources |
|
◆
|
TrustFrameworkKeySet.ReadWrite.All:
Read and write trust framework key sets |
|
◆
|
User.Invite.All:
Invite guest users to the organization |
|
20.
|
In the navigation pane, select Manage > Certificates & Secrets and then click New Client secret. |
|
21.
|
Enter description, set Expires to 24 months and then click Add. |
|
22.
|
Copy the newly generated secrets’ Value to notepad. |
|
●
|
Copy the value immediately to notepad as it hashed after a short time. |
|
●
|
If you use the Application registration to create additional services, a new secret should be created for each new service. |
|
23.
|
In the Multitenant portal, open the System Settings page (Configuration > UMP > System Settings ). |
|
24.
|
Paste the Application (client) ID, Client secret and Redirect (OAuth2Callback) URL that you saved to notepad to the respective fields, and then click Apply Changes. |
|
25.
|
Paste the Authentication portal URL that you saved to notepad and then click Apply Changes. |