Creating a Microsoft Teams Application for IdentityIQ in Azure
This Azure application defines the scope that can be used by the IdentityIQ Microsoft Teams Notifications feature. In this app, you define authentication parameters, set a client secret, and choose which Microsoft Graph API permissions to expose. You will use some values from this app in IdentityIQ, to ensure secure communication between IdentityIQ and Azure.
Important: Details on how to configure Azure components are provided in this guide as an aid to implementers; however, implementers should also consult Microsoft's documentation on Azure and Microsoft Teams to ensure that they have the most accurate and up-to-date information on these platforms. This guide only discusses actions in Azure that are required as part IdentityIQ's Microsoft Teams Notifications feature, and does not discuss more general Azure concepts or actions that may be part of setting up Microsoft Teams and SSO for your organization.
-
Navigate to your Azure Active Directory home.
-
In the left navigation, click App registrations.
-
Click New Registration.
-
Enter a Name for your application. When creating applications, it's a good idea to name them according to function; for example,
IdentityIQ Teams
. -
Under Supported account types, choose the Multitenant option.
-
Click Register.
-
Configure an Authentication redirect URI:
-
In the left navigation, click Authentication.
-
Click Add platform.
-
In the Configure Platforms panel that opens at right, click the Web tile.
-
Enter a Redirect URIs. Use this value for the redirct:
https://token.botframework.com/.auth/web/redirect
-
Under Implicit grant and hybrid flows, make sure both flows are checked.
-
Save your edits.
-
-
Create a client secret for the application:
-
In the left navigation, click Certificates and secrets.
-
Click New client secret.
-
Add a description and expiration date.
-
Click Add.
IMPORTANT: This is the only time the client secret is available to be copied. Use the copy icon to copy and save the secret. You will need the secret later, when creating your Azure bot, configuring the service code, and configuring IdentityIQ's integration properties.
-
-
Configure the API permissions for the application:
-
In the left navigation click API permissions.
-
Click Add a permission.
-
Under the Microsoft APIs tab, choose Microsoft Graph and select these options in the Delegated Permissions list:
-
email
-
offline_access
-
openid
-
profile
Then click Add permissions.
Note: If
User.Read
is present and selected, you can leave it selected. -
-
In the left navigation click API permissions.
-
Click Add a permission.
-
Under the My APIs tab, choose the API Application you created earlier (as described in the Creating an API Application in Azure section). Select your
GetToken
permission and click Add permissions. -
The API permissions page now shows a list of the API permissions you have created. Check the Grant admin consent for (MyTenant), where MyTenant is the name of your tenant. Then click Yes to confirm.
-
-
In the left navigation, click Expose an API .
-
Click Set for the Application ID URI.
-
Edit the URI to add
botid-
immediately after theapi://
in the URI. Be sure to include the dash afterbotid
. Click Save. -
Add an access_as_user scope:
-
Click Add a scope. Give it a Scope name and choose Admins and users. Provide Admin and user content descriptions – these are messages that will appear to users if they need to give authorization.
-
Enter a Scope name, for example,
access_as_user
. -
Add names and descriptions for Admin consent and User consent.
-
Make sure the state is Enabled.
-
Click Add Scope to save your changes.
-
-
Add a GetToken scope:
-
Click Add a scope. Give it a Scope name and choose Admins and users. Provide Admin and user content descriptions – these are messages that will appear to users if they need to give authorization.
-
Enter a Scope name, for example,
GetToken
. -
Add names and descriptions for Admin consent and User consent.
-
Make sure the state is Enabled.
-
Click Add Scope to save your changes.
-
-
Authorize desktop and mobile applications to use this application.
-
Click Add a client application
-
For a Microsoft Teams web client, enter this value as the Client ID:
5e3ce6c0-2b1f-4285-8d4b-75ee78787346
.
This value is provided by Microsoft; refer to Microsoft's documentation for details about the Client ID. -
Check the Authorized scopes option.
-
Click Add application.
-
Repeat steps 1-4 above, substituting this value in step 2: For a Microsoft Teams mobile and desktop clients, enter this value as the Client ID:
1fec8e78-bce4-4aaf-ab1b-5451cc387264
.
This value is provided by Microsoft; refer to Microsoft's documentation for details about the Client ID.
-
Once your Microsoft Teams application is configured, copy and save the Application (client) ID value. You will need this value later, when creating your Microsoft Teams bot and configuring IdentityIQ's integration with Microsoft Teams.
For more information, see: