Skip to content

Commit

Permalink
updated docs (#1418)
Browse files Browse the repository at this point in the history
* updated docs

* Apply suggestions from code review

* Update content-repo/extra-docs/articles/microsoft-auth-guide.md

Co-authored-by: ShirleyDenkberg <[email protected]>

* Apply suggestions from code review

---------

Co-authored-by: ShirleyDenkberg <[email protected]>
  • Loading branch information
michal-dagan and ShirleyDenkberg authored Nov 12, 2023
1 parent 08b227d commit e07feba
Showing 1 changed file with 3 additions and 2 deletions.
5 changes: 3 additions & 2 deletions content-repo/extra-docs/articles/microsoft-auth-guide.md
Original file line number Diff line number Diff line change
Expand Up @@ -76,13 +76,14 @@ Alternatively, instead of providing the *Client Secret*, you can authenticate us
* Private Key - The private key of the registered certificate


### Authorize on Behalf of a User
### Authorization Code flow
Some Cortex XSOAR-Microsoft integrations (e.g., Microsoft Graph Mail Single User) require authorization on behalf of a user (not admin consent). For more information about this authorization flow, refer to the [authorization code flow](https://learn.microsoft.com/en-us/azure/active-directory/develop/v2-oauth2-auth-code-flow).

To configure a Microsoft integration that uses this authorization flow with a self-deployed Azure application:

1. Make sure the needed permissions are granted for the app registration, e.g., for Microsoft Graph User: API/Permission name `Directory.AccessAsUser.All` of type `Delegated`.
2. The Redirect URI can direct any web application that you wish to receive responses from Azure AD. If you are not sure what to set, you can use `https://localhost`.
2. In your app. click **Authentication** > **Platform configurations** > **Add a platform.** Choose **Web** and add [Redirect URI](https://learn.microsoft.com/en-us/entra/identity-platform/quickstart-register-app#add-a-redirect-uri).
The Redirect URI can direct any web application that you wish to receive responses from Azure AD. If you are not sure what to set, you can use `https://localhost`.
3. Enter your client ID in the *ID* parameter field.
4. Enter your client secret in the *Key* parameter field.
5. Enter your tenant ID in the *Token* parameter field.
Expand Down

0 comments on commit e07feba

Please sign in to comment.