Authentication for Microsoft365

In this document, we will create an authKey that will allow Pliant to perform system management tasks in Azure Active Directory via the Graph API (Microsoft 365 Pliant blocks).

The authKey created here may not work for user impersonation (view my schedule, share my calendar, etc) level functions, but is intended to create a "service account" for Pliant in Azure AD.



1. Sign in to: https://aad.portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/Overview


2. Click on the "App registrations" under the Manage list


 


3. Click on "New Registration"


 


4. Give your application a name, leave other settings at defaults. Click "Register" when you're done.


 


5. Hold down the Crtl key and click on "API permissions" to open the API Permissions page in a new tab



6. Click "Add a permission"



7. Choose the "Microsoft Graph" option. Microsoft Graph is the name of the API used by the Pliant Microsoft365 integration


8. Choose the option for "Application permissions", as we are effectively setting up this Azure AD application as a kind of "service account" to use with Pliant. 

9. Select the permissions that you will need to use to carry out the desired operations in your Pliant workflow. For example if you are doing user provisioning operations, you would likely want to include the "" permission from the User section:


10. When all desired permissions are added, click the "Ad permissions" button


11. Review the selected permissions and click the "Grant admin consent for (your environment)" button. Click the confirm button when it comes up.

Note: If you have selected a very large number of permissions to grant, the grant may fail. In this case, you will need to de-select permissions until the grant can be successful.


12. Click the "Certificates & secrets" option in the menu on the left


13. Click the "New client secret" link


14. Give your secret a description and choose an expiration, then click the Add button.

Note: You will need to remember to generate a new secret on this page and update your Pliant authKey when or before this secret expires or your workflows will not be able to authenticate.


15. Open Pliant in a new tab or window and create a new Microsoft365 authKey, you may want to mention the name of your Azure AD App in your description for reference at a later date. Set the "Access Type" property to be "Enterprise App"


16. Copy the value of the Client secret you just created, then paste it into the Pliant authKey in the Client Secret field


17. Click the "Overview" link in the left hand navigation


18. From the dashboard page, copy the "Application (client) ID" into the "Client ID" field of the Pliant authKey,then copy the "Directory (tenant) ID" into the "Tenant ID" field of the Pliant authKey


19. Leave the "Username" and "Password" fields blank and save your authKey