Register CodeTwo application in Azure Active Directory
The Sent Items Update (SIU) service in CodeTwo Exchange Rules Pro connects to Microsoft 365 (Office 365) by using the secure OAuth 2.0 authorization protocol. To enable this connection, first you need to register the CodeTwo application in Azure AD for all Microsoft 365 tenants that will be used in your CodeTwo software. Next, to allow the CodeTwo application to access your data and perform the necessary tasks, you also need to grant the necessary permissions to that application.
Keep in mind that CodeTwo Exchange Rules Pro can perform the registration automatically (learn more). You simply need to provide an Office 365 global admin credentials in server connection wizard.
Use the links below for guidelines on how to register the CodeTwo application in Azure AD:
- Register a new application in Azure AD
- Configure application permissions
- Assign certificates / secrets to an app in Azure
Registering a new application in Azure AD
- Sign in to your Azure Active Directory admin center.
- Navigate to Azure Active Directory > App registrations (if you are signed in to the Microsoft Entra admin center, go to Applications > App registrations instead; the remaining steps are similar for both admin centers).
- Click New registration (Fig. 1.). This opens the Register an application page.
Fig. 1. The App registration page in Azure AD.
- Enter a name for the application and click Register (Fig. 2.). You can leave the other options to their defaults.
Fig. 2. Registering the CodeTwo application with Azure AD.
Configuring application permissions
- On the application Overview page, click View API permissions (Fig. 3.). The API permissions page will open.
Fig. 3. Accessing the API permissions page.
- Click the Add a permission button and in the pane that opens click APIs my organization uses (Fig. 4.).
Fig. 4. Listing all APIs available for your organization.
- Enter Office 365 in the search box and select Office 365 Exchange Online (Fig. 5.).
Fig. 5. Finding the Exchange Online API.
- Click Application permissions, expand Other permissions, select full_access_as_app and then click Add permission (Fig. 6.).
Fig. 6. Adding a new permission to an application in Azure AD.
- Back on the API permissions page, click the Grant admin consent button (once it becomes available) and then click Yes to confirm (Fig. 7.).
Fig. 7. Granting the necessary consents.
Assigning certificates / secrets in Azure AD
You need to assign a certificate or client secret (app password) to the newly added application. This will allow the OAuth protocol to prove the application’s identity. Follow the steps below to assign a certificate or add a client secret to the CodeTwo application registered in Azure AD.
- Navigate to Azure Active Directory > App registrations and select the newly added application.
- In the navigation menu, click Certificates & secrets (Fig. 8.). Now, you need to assign either a certificate or client secret to the CodeTwo application.
Fig. 8. Accessing the Certificates & secrets page.
- 3a To assign a certificate, click Certificates > Upload certificate, select your certificate file and click Add (Fig. 9.). The certificate needs to be signed with a key size of 2048 bits.
Fig. 9. Assigning a certificate in Azure AD.
- 3b To add a client secret, click Client secrets > New client secret, enter a short description, select the expiration time (whichever suites your needs) from the drop-down menu, and click Add (Fig. 10.).
Fig. 10. Creating a new client secret for an application registered in Azure AD.
Make sure to copy the client secret value to clipboard (Fig. 11.) or use it in your CodeTwo application straightaway, because once you refresh the page, you will not be able to view that value again. You will have to create another client secret.
Fig. 11. How to copy the client secret value to clipboard.
Once done, the application registration process is completed. You can now configure the SIU service by following these steps.