/
Identity provider - Azure Active Directory
Identity provider - Azure Active Directory
Azure configuration
Step 1 - Log in to https://portal.azure.com
Step 2 - Navigate to Azure Active Directory - App registrations - New registration
Step 3 - Define the display name of the application, and the supported account types
Step 4 - Add the redirect URI in the format: https://hostname-of-server/verba/ssoAdal
Step 5 - After the application is created, note down the client and tenant ID
Step 6 - Open certificates & secrets and add a New client secret
Step 7 - Note the value of the new secret
Step 8 - Navigate to Azure Active Directory - App registrations - Created application - API permissions
Step 8 - Add the app the User.Read permission
Step 9 - Grant administrator consent to the application (Optional)
Verba configuration
Name | Description |
---|---|
Tenant ID | The identifier noted in step 5 or the yoursitehere.onmicrosoft.com |
Application ID | The identifier noted in step 5 |
Client Secret | The value noted in step 7 |
Authority | Default value is https://login.microsoftonline.com/ |
, multiple selections available,
Related content
Registering a Connector App for Microsoft Entra ID (formerly Azure AD)
Registering a Connector App for Microsoft Entra ID (formerly Azure AD)
More like this
Azure configuration for VFC SAML Identity Provider
Azure configuration for VFC SAML Identity Provider
More like this
Registering an App for Microsoft Teams chat and channel archiving in Azure
Registering an App for Microsoft Teams chat and channel archiving in Azure
More like this
Identity provider - SAML
Identity provider - SAML
More like this
Configuring the Verba Microsoft Teams Bot and Unified Call Recorder Services
Configuring the Verba Microsoft Teams Bot and Unified Call Recorder Services
More like this
API authentication
API authentication
More like this