You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
In the app registrations under *Owned applications* we can list all applications that we registered under our account, in my case this is still empty, and under *All applications* as the name implies all application registered tenant wide.
Click on the **New Registration** and fill the various fields accordingly, unless you have specific needs all default values should suffice for most configurations/deployments. I am assuming a single tenant deployment in the following example
**Note:** The only field really needed in the *Name* one just be sure to chose a descriptive name that is easy for you to remember.
52
59
{: .notice--danger}
@@ -55,19 +62,30 @@ Once done click on the **Register** button, provision will only take a couple of
55
62
56
63
Once the application has been registered we need to configure/grant API permissions that will define what our application can and cannot do. Either select *API Permissions* from the left blade or from the link directly below the API properties and select **Add permission**
From the **Request API Permissions** scroll all the way down the *Supported Legacy APIs* and select **Exchange**, **Application Permissions** and finally tick **Exchange.ManageAsApp** under the *Exchange* section
61
71
62
72
**Note:** I will not go into much detail as much has already been written about this but Exchange does not natively support new *Graph* API that's why Exchange is listed under *Legacy API*.
## Exchange Online Certificate Based authentication - Configure Authentication
73
91
@@ -100,7 +118,10 @@ Open *Certificate Manager* MMC console and under *Certificates Current User / Pe
100
118
101
119
In the Azure Portal select *Certificates and Secretes* from the left blade and *Upload certificate* navigating to the path where the certificate has been expoted/stored
**Note:** Write down the certificate thumbprint displayed in the Azure page as we will need this later on.
106
127
{: .notice--primary}
@@ -112,19 +133,33 @@ What we can do is granting a **[AzureAD Directory Role](https://docs.microsoft.c
112
133
113
134
With the *Azure AD* blade selected go to **Roles and administrators** and select **Exchange Administrator** confirming with the *Add Assignment* button
114
135
115
-

0 commit comments