Configuring MS Graph OAuth Provider
Microsoft Graph activities in Infor RPA support these two authorization models:
- Delegated Permissions: User-specific access where the application acts on behalf of a signed-in user.
- Application Permissions: Generic access to resources without requiring a specific user context (recommended for unattended automation).
These pre-requisites are required before you configure MS Graph OAuth Provider:
- Azure Account
Access to an Azure account with permissions to create and manage Azure App registrations. This task is typically managed by the IT Team.
- Permission to register applications in Azure Active Directory
- Global Administrator or Application Administrator role in Azure (required for granting admin consent)
- Microsoft 365 Account
An account with permissions to access emails (current) and other relevant Microsoft Graph resources (future).
- RPA Mastermind
Authentication and Token Management with Azure App to interact with MS Graph resources (related to emails).
- RPA Studio installed.
- SCIM Service
The IFS SCIM (System for Cross-domain Identity Management) process is used for managing RPA user provisioning and synchronization between existing Azure organizations and target systems such as IFS (Infor Federation Service).
The SCIM service is an optional but recommended configuration and is required if the organizations and specific users such as “rpa@acme.com or invoices@acme.com” are intended to be used for RPA flows.
To configure the SCIM service, navigate to .
You can use the SCIM Service option in the menu to enable or disable SCIM accounts. When disabled, the SCIM Service option is not displayed in the menu.
For more information, see https://docs.infor.com/inforos/2024.x/en-us/useradminlib_cloud/default.html?helpcontent=inforospag/mrh1493236771582.html&hl=scim
Configuring MS Graph OAuth Provider includes these steps:
- Azure App Registration
- Log on to the Azure portal (https://portal.azure.com/).
- Navigate to Microsoft Entra admin center.
- Select .
- Click .
- Provide this information:
- Name: The name of the application. For example, GraphAPI-App.
- Supported account type: Typically Accounts in this organizational directory only.
- Click . A new application registration is created.
- Open the newly created application.
- Navigate to Authentication.
- Click .
- Select and configure the required Redirect URI.
- Specify a name for your application.
- Select account or any other appropriate account.
- Specify the Redirect URI.
Note:
- The Redirect URI can be copied from the page.
- Note the Application (Client) ID, Directory (Tenant) ID, and generate a Client Secret
- MS Graph Permissions
- Navigate to Azure App registration.
- Click.
- Click .
- Select the appropriate permission type. Possible values:
- Delegated permissions: user required
- Application permissions: user not required
These are the minimum permissions that must be provided for the activities based on the functionality:
- OneDrive activity:
- Files.Read.All: Read files in all site collections
- Files.ReadWrite.All: Read and write files in all site collections
- Sites.Read.All: Read items in all site collections
- Sites.ReadWrite.All: Read and write items in all site collections
- Sites.Selected: Only applicable in case of Application permission. This permission covers Onedrive, Sharepoint and Excel
- Outlook or Email activities
- Mail.Read: Read mail in all mailboxes
- Mail.ReadWrite: Read and write mail in all mailboxes
- Mail.Send: Send mail as any user
- Mail.Send.Shared: This is required if you are using Delegated permissions and need to work shared or service mailboxes
- Mail.Read.Shared: This is required if you are using Delegated permissions and need to work shared or service mailboxes
- Mail.Read.Write.Shared: This is required if you are using Delegated permissions and need to work shared or service mailboxes
- SharePoint activities
- Sites.Read.All: Read items in all site collections
- Sites.ReadWrite.All: Read and write items in all site collections
- Excel Online activities
- Files.Read.All: Read files in all site collections
- Files.ReadWrite.All: Read and write files in all site collections
- Click .
Note: Administrator consent is mandatory for using application permissions.
All new permissions are listed with the Not Granted status.
- Confirm that a green check mark is displayed for all permissions marked as “Granted for [Your Organization]”.
Note: Administrator consent can only be granted by Global Administrators or Application Administrators. Contact your Azure AD administrator for these permissions.
- Navigate to Certificates & secrets.
- Click .
- Copy and securely store the secret value for use during authentication.
- Specify these details required for integration:
- Client ID
- Tenant ID
- Client Secret
- RPA Mastermind Configuration
Microsoft Graph API can be configured using one of these permission types:
-
When configured with application permissions, the Microsoft Graph API operates independently without requiring user sign-in. Permissions are granted directly to the application at the tenant level, enabling the application to access data based on the permissions assigned. This configuration requires tenant-level authorization.
-
When configured with delegated permissions, the Microsoft Graph API operates in context of the authenticated signed-in user. The application accesses Microsoft Graph APIs on behalf of the user. The application performs only the actions that the user is authorized to perform. This configuration requires explicit user authorization.
- Log on to RPA Mastermind.
- Navigate to on the Configuration page.
- Click and add Microsoft Office 365 application.
- Select .
- Specify the Information Name, ( Application (Client) ID, Directory (Tenant) ID, and Client Secret) displayed when registering the Azure App .
- Specify the TenantId in the Auth Host field. For example, https://login.microsoftonline.com/ %20%3CTenantId%3E/oauth2/v2.0/
Note: The TenantId (also known as DirectoryId) is displayed in the overview section of the Azure app. Replace “%3CTenantId%3E” with TenantId or DirectoryId.
- Select the required API Permissions to enhance security. Possible values:
- For Mail service
- Mail.Read
- Mail.ReadWrite
- Mail.Send
- For Files
- Sites.Selected
- For Mail service
- Logon to RPA Mastermind.
- Click page.
- Click and add Microsoft Office 365 application
- Select .
- Specify the information ( Application (Client) ID, Directory (Tenant) ID) displayed when registering the Azure App
- Specify the TenantId in the Auth Host field. For example, https://login.microsoftonline.com/ %20%3CTenantId%3E/oauth2/v2.0/.
Note: TheTenantId (also known as DirectoryId) is displayed in the overview section of the Azure app. Replace “%3CTenantId%3E” with TenantId or DirectoryId
- Specify the Redirect URL.
Note: TheRedirect URL can be copied from the page.
- Select the required API Permissions to enhance security. Possible values:
- ForMail service
- Mail.Read
- Mail.ReadWrite
- Mail.Send
- Offline_Access
- User.Read
- Mail.Read.Shared
- Mail.ReadWrite.Shared
- Mail.Send.Shared
- ForFiles or one drive access
- Files.Read
- Files.Read.All
- Files.ReadWrite
- Files.ReadWrite.All
- Sites.Read.All
- Sites.ReadWrite.All
- ForMail service
On the Authorization page, Microsoft Office 365 is disabled by default for Application Permissions and enabled by default for Delegated Permissions at the tenant level. Enabling Microsoft Office 365 with Application Permissions for a tenant makes the integration available to all users within that tenant. However, Delegated Permissions are granted at the individual user level.
Note: Additionally, you must also authorize the RPA application to perform action on your behalf. See, Authorize user for details -