Loading...

Registering the Application for Exchange Online (Through Azure Active Directory)

When you use Exchange Online (Through Azure Active Directory) to archive messages, you must register the application with Microsoft Azure Active Directory (Azure AD). Azure AD manages the connection between Office 365 with Exchange and the Exchange Mailbox. You use information that you generate in Azure AD to configure your the Exchange Mailbox.

When you perform this procedure, record the following values of the new application. You will use these values later when you configure your Commvault environment.

  • Application ID
  • Key value
  • Directory ID

Disclaimer: This procedure is performed using the Microsoft Azure Active Directory (Azure AD) Web application. The Azure AD application is subject to change without notice. Consult Microsoft documentation, for example "Azure Active Directory Documentation" (https://docs.microsoft.com/en-us/azure/active-directory/).

Important: Commvault software supports Microsoft Azure for public clouds only. Sovereign clouds, such as in Germany or China, are not supported. For more information, consult Microsoft documentation. For example, “App Service Regional Details”, https://azure.microsoft.com/en-us/pricing/details/app-service/regional-details/.

Procedure

  1. Access the Azure portal (https://portal.azure.com/) using your global admin user account.
  2. In the Microsoft Azure dashboard, in the left navigation pane, go to Azure Active Directory > App registrations, and then click New Registration.
  3. On the Register an application blade, do the following:
    1. In the Name box, type a name for your application.
    2. Under Supported account types, select the accounts that you want to give access to this application API.
    3. The Redirect URI (optional) box, enter the URL.

      For most authentication scenarios, you need to enter this value. However, in some cases, you do not need to enter a value. Also, you can change this value later.

    4. Click Register.

      The Overview screen appears.

  4. On the Overview tab, go to View API Permissions > Add a permission > Microsoft Graph, and then click Application Permissions.

    The permissions screen appears.

  5. Expand Directory, and then select the Directory.Read.All permission.
  6. Click Add Permission.
  7. On the API Permissions tab, under Grant consent, click Grant admin consent for tenant name.

    A confirmation dialog box appears.

  8. Click Yes.

    A message states that admin consent is granted for the requested permissions.

  9. On the preview screen, click Overview, and then record the application ID and the directory ID.
  10. Click Certificates and secrets, and then complete the following steps:
    1. Click New client secret.
    2. To add an application key value, type a description, and then select Never Expires.
    3. Click Add.
    4. Record the client secret key value.

Last modified: 12/18/2019 4:10:26 PM