Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

In this article

...

Snaps in this Snap Pack use the Azure Active Directory OAuth2 account to access the Azure Active Directory (AAD). For the OAuth2 account to function without any issue, ensure to (create and) configure an application corresponding to the account as explained in the steps below. These steps also contain the information required to create/define a new OAuth2 account for use with this Snap Pack.

Create/Access your Azure Portal Application

Insert excerpt
Application Configuration in Azure Portal for OAuth2 Account to use in SharePoint Online
Application Configuration in Azure Portal for OAuth2 Account to use in SharePoint Online
nameCreate Application in Azure Portal
nopaneltrue

Image Added

Locate/Define Information Required to Create your Snap Account

  1. Specify the values required to create a successful Snap account connection.
  2. Enter the application (Client) ID  for the new account.
    Image Removed
  3. Click Endpoints to locate the OAuth 2.0 authorization endpoint (v2) and OAuth 2.0 token endpoint (v2).
  4. Under Manage, click Authentication → Add a platform → Web to define the trusted redirect/callback/reply URLs from your SnapLogic platform that connect/transact with the Azure Active Directory application. 
  5. Under Redirect URIs, enter the new Redirect URI and click Configure.
  6. Configure the Logout URL to: https://elastic.snaplogic.com/
    Image Removed

  7. Click Certificates & secrets → New client secret to add the client secret description that can be used for the new account.
  8. Under Add a client secret, enter the description of the client secret and click Add.
    Image Removed
  9. Copy the value of the generated Client Secret. You will need this Client Secret to configure the Azure Active Directory in SnapLogic.
    Image Removed
  10. Under Manage, click API permissions to grant permissions to the application for the endpoint in context.

  11. Click Add permissions to add permissions. 
    Image Removed

13. Click Microsoft Graph, select Delegated permissions and choose the following permissions from the respective category. 

  1. OpenId permissions offline_access

  2. Files > Files.ReadWrite.All
    Image Removed

14. Click API permissions to grant permissions to the application for the endpoint in context

...

Account                                                                                      

  1. Under Essentials, make a note of Application (client) ID and Tenant ID.
    Image Added
  2. Under Manage, click Certificates and Secrets.
  3. On Certificates and Secrets page, click +New client secret
  4. On the Add a client secret page, enter the Description and Expires and click Add. 
    Image Added
    The client secret value is generated. 
    Image Added

  5. Under Manage, click API Permissions → Add a Permission
    Image Added

  6. On the Request API permissions page, select Microsoft Graph → Delegated Permissions for the OAuth2 User account and Application Permissions for the OAuth2 application Account.
  7. You can select the permissions from Files, Users, and Sites. Choose all the required API permissions for Exchange Online listed below:
  8. Click Add Permissions. You can see all the permissions added under Configured Permissions.
    Image Added
  9. Click Grant admin consent for SnapLogic Inc and select Yes
    Image Added

  10. Click Overview and Add a Redirect URls.
    Image Added
  11. Under Platform Configurations, click Add a platform.
  12. Select Web and enter a valid redirecting URI and click Configure
  13. Under Implicit grant and hybrid flows, select Access tokens (used for implicit flows) and ID tokens (used for implicit and hybrid flows) checkbox and click Save.
    Image Added

Scopes and Permissions Required for Azure Active Directory

  1. Navigate to the Snap of your choice and set up the account with the following details noted in the previous steps.:
  • Client ID

...

  • Tenant

...

...

...

...

  • To get the OAuth2 Endpoint and OAuth2 Token, click Overview → Endpoints and copy the (V2)  endpoints 
  • Token Endpoint Config:
    • Token endpoint parameter:

...

    •  response-type

...

    • Token endpoint parameter value: code
  • Auth Endpoint configuration:
    • Authentication parameter: scope
    • Authentication parameter value

...

    • https://graph.microsoft.com/.default 
  • Click Authorize.

...

  •  You will be redirected to the login page of Microsoft

...

  • Azure Portal.
  • Login and accept the permissions.

...

  • The Access token and the Refresh Token will be generated.
  • Check

...

  • the Auto-refresh

...

  • token checkbox

...

  • in the account settings and click Apply.
  1. See Also