Deploy Sync App on Service Provider Azure Subscription

The Delegated Token Synchronization App registration is used to secure a Token invitation link to the Invitation wizard for performing customer Onboarding for Direct Routing and Operator Connect services. You must add this registration on the service provider tenant’s Microsoft Entra ID for each managed UMP-365 instance. The registration includes the configuration of an Authentication Portal URL (Token Invitation link) to the Invitation wizard that is sent to the customer M365 tenant global admin email account (also accessible from the Pending Invitations page, see figure below. In addition, the registration also includes the configuration of a Redirect (OAuth2Callback) URL which redirects the Microsoft authentication process back to Live Platform when the customer creates a new registration (Delegated Token or App registration) on their Microsoft Entra ID tenant from the Invitation wizard. This registration is then used to complete the Onboarding of the Direct Routing and Operator Connect services and for Background task replication synchronization in day-to-day operations.

This procedure is for creating the registration on the Service Provider Azure subscription.
If this procedure is performed by AudioCodes Professional Services, a Global-admin account should be provided by the managed customer. This global registration is used for all AudioCodes Live Direct Routing and Operator Connect customers.
The domain names shown in the procedure below are examples only.
For each customer, a unique redirect URL is defined.

Do the following:
1. Sign-in to Microsoft Entra ID for the Service Provider operator tenant with Global Admin permissions.
2. Under Manage Azure Active Directory, select View.

3. In the Navigation pane, select ManageApp registrations.

4. Click New registration.

5. Enter the following details:
Name: App registration name
Select account type: Multiple Entra ID tenants
6. Click Register.
7. Navigate to the Overview page.

8. Copy the Application (client) ID value to notepad as it is configured later in this procedure.
9. Click the Add a Redirect URI link to add the Redirect URI. The Authentication (Preview) screen is displayed.

10. Click Add Redirect URI.

11. Select the Web option.

12. Enter the Redirect URL in the following format: https://<appname>.<serviceproviderFQDN>/authenticate/OAuth2Callback

For example: " https://umptoken.finebak.com/authenticate/OAuth2Callback"

where:

<appname> is the name of the Delegated Token app.
<serviceprovidername.com> is the FQDN and registered Sub domain of the Service Provider (see Setting up Fully Automatic DNS Provisioning).
“OAuth2Callback” is the name of the Token Authentication page inside the registered application
The "https://umptoken.finebak.com/authenticate/OAuth2Callback" Redirect (OAuth2Callback) URL is used by Microsoft to redirect back to Live Platform during the creation of a new registration on the M365 customer tenant.
The "https://umptoken.finebak.com/authenticate" Authentication Portal URL is the Token Invitation link to the Invitation wizard that is sent to the global admin of the M365 customer tenant at the beginning of the onboarding process.
13. Copy the URL values to notepad as they are configured later in this procedure.
14. Under 'Implicit grant and hybrid flows', select the following:
Access tokens (used for implicit flows)
ID tokens (used for implicit and hybrid flows)
15. Click Configure.

16. Click the Settings tab.

17. Enable Allow public client flows and then click Save.
18. Click the Supported accounts tab, select Multiple Entra ID tenants and then click Save.

19. In the Navigation pane, select Manage > API Permissions and set the following permissions:
Delegated:
AppCatalog.ReadWrite.All: Read and write to all app catalogs
offline_access: Maintain access to data you have given it access to
openid: Sign users in
profile: View users' basic profile
User.Read: Sign in and read user profile
User.Read.All: Read all users' full profiles
Application:
Directory.Read.All: Read directory data
Directory.ReadWrite.All: Read and write directory data
Group.ReadWrite.All: Read and write all groups
User.ReadWrite.All: Read and write all users' full profiles
Skype and Teams Tenant Admin AP:
application_access
application_access_custom_sba
user_impersonation
Other Delegated Permissions (see figure below for details):
AuditLog.Read.All: Read audit log data
Directory.AccessAsUser.All: Access directory as the signed in user
IdentityProvider.ReadWrite.All: Read and write identity providers
Policy.ReadWrite.TrustFramework: Read and write your organization's trust framework policies
PrivilegedAccess.ReadWrite.AzureAD: Read and write privileged access to Azure AD
PrivilegedAccess.ReadWrite.AzureResources: Read and write privileged access to Azure resources
TrustFrameworkKeySet.ReadWrite.All: Read and write trust framework key sets
User.Invite.All: Invite guest users to the organization

Graphical user interface, application

Description automatically generated

Table

Description automatically generated

20. In the navigation pane, select ManageCertificates & Secrets and then click New Client secret.

Table

Description automatically generated

Graphical user interface, application

Description automatically generated

21. Enter description, set Expires to 24 months and then click Add.
22. Copy the newly generated secrets’ Value to notepad.

Copy the value immediately to notepad as it hashed after a short time.
If you use the Application registration to create additional services, a new secret should be created for each new service.
23. In the Multitenant portal, open the System Settings page (Configuration > UMPSystem Settings ).
24. Paste the Application (client) ID, Client secret and Redirect (OAuth2Callback) URL that you saved to notepad to the respective fields, and then click Apply Changes.
25. Paste the Authentication portal URL that you saved to notepad and then click Apply Changes.