From e07feba58af8e8590972c5e039fb8dfecfae19ea Mon Sep 17 00:00:00 2001 From: michal-dagan <109464765+michal-dagan@users.noreply.github.com> Date: Sun, 12 Nov 2023 12:28:41 +0200 Subject: [PATCH] updated docs (#1418) * updated docs * Apply suggestions from code review * Update content-repo/extra-docs/articles/microsoft-auth-guide.md Co-authored-by: ShirleyDenkberg <62508050+ShirleyDenkberg@users.noreply.github.com> * Apply suggestions from code review --------- Co-authored-by: ShirleyDenkberg <62508050+ShirleyDenkberg@users.noreply.github.com> --- content-repo/extra-docs/articles/microsoft-auth-guide.md | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/content-repo/extra-docs/articles/microsoft-auth-guide.md b/content-repo/extra-docs/articles/microsoft-auth-guide.md index f3ee8943c..14170296b 100644 --- a/content-repo/extra-docs/articles/microsoft-auth-guide.md +++ b/content-repo/extra-docs/articles/microsoft-auth-guide.md @@ -76,13 +76,14 @@ Alternatively, instead of providing the *Client Secret*, you can authenticate us * Private Key - The private key of the registered certificate -### Authorize on Behalf of a User +### Authorization Code flow Some Cortex XSOAR-Microsoft integrations (e.g., Microsoft Graph Mail Single User) require authorization on behalf of a user (not admin consent). For more information about this authorization flow, refer to the [authorization code flow](https://learn.microsoft.com/en-us/azure/active-directory/develop/v2-oauth2-auth-code-flow). To configure a Microsoft integration that uses this authorization flow with a self-deployed Azure application: 1. Make sure the needed permissions are granted for the app registration, e.g., for Microsoft Graph User: API/Permission name `Directory.AccessAsUser.All` of type `Delegated`. -2. The Redirect URI can direct any web application that you wish to receive responses from Azure AD. If you are not sure what to set, you can use `https://localhost`. +2. In your app. click **Authentication** > **Platform configurations** > **Add a platform.** Choose **Web** and add [Redirect URI](https://learn.microsoft.com/en-us/entra/identity-platform/quickstart-register-app#add-a-redirect-uri). +The Redirect URI can direct any web application that you wish to receive responses from Azure AD. If you are not sure what to set, you can use `https://localhost`. 3. Enter your client ID in the *ID* parameter field. 4. Enter your client secret in the *Key* parameter field. 5. Enter your tenant ID in the *Token* parameter field.