BindHQ can be configured to allow login via a Microsoft account, then enabling access to the associated outlook.com email account from within the application.
Applies to:
- Agency Owners
- Administrators
This article explains how to configure this integration, and how to use it after login.
You can begin integrating this by creating an application in Azure to use. Login to the Azure portal and to the "Azure Active Directory" section in the left-hand pane.
Next, proceed to “App registrations.”
The value for this field should be https://CLIENT.bindhq.com/login/check-microsoft (where CLIENT is your BindHQ client name). You may also need to add the following permission to the application, depending on if permission can be granted for the organization by an admin when logging in.
- offline_access
- openid
- profile
- User.Read
- Mail.Send
- Mail.ReadWrite
Next, you will need to create some authentication secrets for the Client Details.
Navigate to “Certificates & secrets”.
In the "Client secrets" section choose "New client secret"
Ensure the name is descriptive enough to be able to identify its purpose. This should be a description that will be familiar to you, (the client), such as an integration with BindHQ.
NOTES:
- Copy this secret value to a secure location now, this is the only time it will be visible.
- Set an expiration based on your best practices (180 or 365 days) but also set a reminder to update these secrets BEFORE they expire.
BINDHQ Details:
-
Directory (tenant) ID (BindHQ tenant ID)
-
Application (client) ID (BindHQ client ID)
-
Secret value (BindHQ client secret)
In BindHQ, navigate to the O365 credentials page in the settings area.
From here you can proceed to edit the details you created in the Azure portal.
After clicking save, you should be able to log out (or use a different browser) and test the configuration using the "Sign In with Microsoft" button on the login page.
Keywords for Search:
- Office365
- Integration
- Azure Portal
Comments
0 comments
Please sign in to leave a comment.