Configuring MS Graph OAuth Provider
These pre-requisites are required before you configure MS Graph OAuth Provider:
- Azure Account
Access to an Azure account with permissions to create and manage Azure App registrations. This task is typically managed by the IT Team.
- Microsoft 365 Account
An account with permissions to access emails (current) and other relevant Microsoft Graph resources (future).
- RPA Mastermind
Authentication and Token Management with Azure App to interact with MS Graph resources (related to emails).
- RPA Studio installed.
- SCIM Service
The IFS SCIM (System for Cross-domain Identity Management) process is used for managing RPA user provisioning and synchronization between existing Azure organizations and target systems such as IFS (Infor Federation Service).
The SCIM service is an optional but recommended configuration and is required if the organizations and specific users such as “rpa@acme.com or invoices@acme.com” are intended to be used for RPA flows.
To configure the SCIM service, navigate to .
You can use the SCIM Service option in the menu to enable or disable SCIM accounts. When disabled, the SCIM Service option is not displayed in the menu.
For more information, see https://docs.infor.com/inforos/2024.x/en-us/useradminlib_cloud/default.html?helpcontent=inforospag/mrh1493236771582.html&hl=scim
Configuring MS Graph OAuth Provider includes these steps:
- Azure App Registration
- Log on to the Azure portal (https://portal.azure.com/).
- Navigate to Microsoft Entra ID.
- Click .
- Select .
- Specify a name for your application.
- Select account or any other appropriate account.
- Specify the Redirect URI.
Note:
- The Redirect URI can be copied from the page.
- Note the Application (Client) ID, Directory (Tenant) ID, and generate a Client Secret
- MS Graph Permissions
- Navigate to Azure App registration.
- Click .
- Click .
- Select the required permissions with appropriate scope for email automation For example, Mail.Read, Mail.ReadWrite, Mail.Send and so on.
- Grant admin consent.
- RPA Mastermind Configuration
Microsoft Graph API can be configured using one of these permission types:
- Application Permissions
When configured with application permissions, the Microsoft Graph API operates independently without requiring user sign-in. Permissions are granted directly to the application at the tenant level, enabling the application to access data based on the permissions assigned. This configuration requires tenant-level authorization.
- Delegated Permissions
When configured with delegated permissions, the Microsoft Graph API operates in context of the authenticated signed-in user. The application accesses Microsoft Graph APIs on behalf of the user. The application performs only the actions that the user is authorized to perform. This configuration requires explicit user authorization.
Configuring with Application Permissions
- Log on to RPA Mastermind.
- Navigate to on the Configuration page.
- Click and add Microsoft Office 365 application.
- Select Application Permissions.
- Specify the Information Name, ( Application (Client) ID, Directory (Tenant) ID, and Client Secret) displayed when registering the Azure App .
- Specify https://login.microsoftonline.com/%3CTenantId%3E/oauth2/v2.0/ in the Auth Host field.
Note: The TenantId (also known as DirectoryId) is displayed in the overview section of the Azure app. Replace “%3CTenantId%3E” with TenantId or DirectoryId.
- Select the required API Permissions to enhance security. Possible values:
- For Mail service
- Mail.Read
- Mail.ReadWrite
- Mail.Send
- For Files
- Sites.Selected
- For Mail service
Configuring with Delegated Permissions- Logon to RPA Mastermind.
- Click page.
- Click AddOauth Provider and add Microsoft Office 365 application
- Select Delegated Permission.
- Specify the information ( Application (Client) ID, Directory (Tenant) ID) displayed when registering the Azure App
- Specify https://login.microsoftonline.com/%20%3CTenantId%3E/oauth2/v2.0/ in the Auth Host field.
Note: TheTenantId (also known as DirectoryId) is displayed in the overview section of the Azure app. Replace “%3CTenantId%3E” with TenantId or DirectoryId
- Specifythe Redirect URL.
Note: TheRedirect URL can be copied from the page.
- Select the required API Permissions to enhance security. Possible values:
- ForMail service
- Mail.Read
- Mail.ReadWrite
- Mail.Send
- Offline_Access
- User.Read
- Mail.Read.Shared
- Mail.ReadWrite.Shared
- Mail.Send.Shared
- ForFiles or one drive access
- Files.Read
- Files.Read.All
- Files.ReadWrite
- Files.ReadWrite.All
- Sites.Read.All
- Sites.ReadWrite.All
- ForMail service
On the Authorization page, Microsoft Office 365 is disabled by default for Application Permissions and enabled by default for Delegated Permissions at the tenant level. Enabling Microsoft Office 365 with Application Permissions for a tenant makes the integration available to all users within that tenant. However, Delegated Permissions are granted at the individual user level.
Note: Additionally, you must also authorize the RPA application to perform action on your behalf. See, Authorize user for details - Application Permissions