User AD attributes & Tokens
CodeTwo Email Signatures for Office 365 allows you to add Active Directory attributes of your users to their email signatures.
The program supports all the single-value attributes available in Office 365 (Azure AD) and Azure AD Graph API. Multivalue attributes are not supported (learn more). Custom attributes may require additional configuration, as described later in this article.
You can manage how attributes are synchronized with the program on the User AD attributes & Tokens page of your tenant (Fig. 1.). This page is divided into several sections - use the links below to learn more about each section.
The application stores required user attributes in an internal cache and automatically synchronizes them with your tenant's Azure Active Directory every 60 minutes. This is necessary both to quickly add signatures with placeholders to emails sent by specific users based on current rules, and to keep Azure AD load at a minimum. If necessary, you can manually update the Azure AD cache via the Update cache manually now button (Fig. 2.). Learn more about the Azure AD cache
|Fig. 2. The Azure AD cache section.|
To read users' Active Directory attributes, the program accesses them via OAuth 2.0 access tokens. These tokens are generated by Microsoft’s trusted OAuth servers for global admin accounts of your tenant.
Your credentials are completely safe as they are passed directly and only to Microsoft servers, which is ensured by the Azure's OAuth 2.0 authorization. CodeTwo does not store, copy or have access to your global admin credentials.
Access tokens can be valid up to 90 days. You need to refresh them periodically or the application won't be able to read the values of user AD attributes. This may lead to outdated user information appearing in your signatures.
You will receive several email notifications before, when and after your tokens expire. These messages will contain a link to a website that allows you to refresh your tokens.
You can refresh the tokens (anytime and for any of your tenants) directly on the User AD attributes & Tokens page of a tenant (Fig. 3.). When refreshing tokens, the Microsoft sign-in screen appears and you need to log in. Be sure to select the work account that belongs to a global admin of this tenant.
|Fig. 3. The OAuth 2.0 tokens section.|
CodeTwo Email Signatures for Office 365 lets you use your own Active Directory attributes when composing signatures. These custom attributes (also known as Directory extension attributes) include, for example: CustomAttribute1-15, Initials, HomePhone, Notes, Pager, WebPage, etc.
If you want to use custom AD attributes in email signatures, you have to make sure they are in sync with the program. Correct synchronization depends on your environment.
Custom attributes can only be used in email signatures. These attributes are not available when defining conditions (such as an Azure AD filter for message senders) of an email signature rule.
In hybrid environments (which synchronize from on-premises to the cloud) it is essential to correctly configure Microsoft Azure Active Directory Connect. By default, custom attributes defined in your on-premises Active Directory are not synced to your Azure Active Directory. Therefore, they are not available to CodeTwo Email Signatures for Office 365 and you are not able to add custom placeholders in the signature editor.
Our program lets you verify if custom attributes are synchronized. To do that, open CodeTwo Admin Panel, enter the management pages of a chosen tenant by clicking the Manage tenant () button next to the tenant's name, then select User AD attributes & Tokens from the left menu. If your custom attributes are not synced, the section will look like below (Fig. 4.).
|Fig. 4. The Custom attributes section in a hybrid environment before the configuration of Azure AD Connect.|
If you do not see the Custom attributes subsection in User AD attributes & Tokens (Fig. 3.), contact CodeTwo Support.
|Fig. 5. Configuration of Azure AD Connect, step 1.|
Second, navigate to the Directory Extensions section (Fig. 6.) by clicking Next, select your custom attributes (e.g. extensionAttribute[1-15], initials or homePhone) from the Available Attributes list on the left and move them to the Selected Attributes list on the right. Finally, complete the wizard by clicking Next.
|Fig. 6. Configuration of Azure AD Connect, step 2.|
When you finish the configuration, your custom attributes will be synchronized with Azure AD (Fig. 7.) and the corresponding custom placeholders will be available in the signature editor. See this article to learn how to add them to your signatures.
|Fig. 7. The Custom attributes section in a hybrid environment after successful configuration of Azure AD Connect.|
By default, in environments that do not use MS Azure AD Connect (non-hybrid/cloud-based environments) custom attributes are not synced to CodeTwo Email Signatures for Office 365. PowerShell commands have to be used to access these attributes. That is why our program features a ClickOnce application called CodeTwo Email Signatures for Office 365 - Custom Attributes Sync App. The app is installed locally on your computer and lets you quickly synchronize custom attributes by using a simple wizard.
To install the application, open CodeTwo Admin Panel, go to the Tenants tab, and enter the management pages of your tenant by clicking the Manage tenant () button next to the tenant name. Select User AD attributes & Tokens from the left menu and click the Synchronize attributes button located at the bottom (Fig. 8.). This will allow you to download and run the installer.
If you work in a non-hybrid/cloud environment but the Synchronize attributes button is not displayed in the Custom attributes section, contact CodeTwo Support.
After the Custom Attributes Sync App is installed, it starts automatically (you can also launch it directly from the Windows Start menu at any time). A simple wizard guides you through the configuration process (Fig. 9.).
In the Azure AD login step, provide your Office 365 admin credentials (Fig. 10.). The application will use these credentials to access the Azure AD attributes you want to synchronize. Make sure the admin account has appropriate roles assigned in order to access your Office 365 users and mailboxes. If this account has multi-factor authentication (MFA), you need to temporarily disable it.
CodeTwo does not store, copy or have access to your admin credentials. This personal data is used to access your Azure AD via PowerShell, using standard Microsoft procedures. If you select the option to store your credentials in the program, they will be encrypted and kept only locally.
Now, you need to allow the app to connect to CodeTwo Email Signatures for Office 365 in order to synchronize your Azure AD data. To do so, move on to the next step (CodeTwo login) and click Log in with Office 365 account (Fig. 11.). The Office 365 sign-in page opens. Provide the credentials of an Office 365 account that is authorized to access the Manage Signatures App, and sign in. Click Next to proceed to the last step of the wizard.
In the Synchronization step, click Synchronize. Your custom attributes will be synchronized to the Azure AD cache (Fig. 12.). The application tells you when the process is complete and how many users have been synchronized. Click Close to complete the wizard.
You need to run the Custom Attributes Sync App each time you modify your custom attributes and want to make them available to CodeTwo Email Signatures for Office 365. Such a solution protects your data - you enter your admin credentials only when they are required for the synchronization.
Remember to enable your MFA after the synchronization in case it has been disabled earlier.
Shared mailboxes are currently not supported by the Custom Attributes Sync App.