Azure AD Connection¶
Azure AD application on Connect iPaaS uses OAuth authorization. By linking your Azure AD account with Connect iPaaS, you can authorize RoboMQ to have a delegated access on your behalf. RoboMQ needs the following permissions on your account to provide a seamless integration experience:
|openid||If an app performs sign-in by using OpenID Connect, it must request the openid scope.|
|User.ReadWrite.All||Read and Write User Permission|
|Group.ReadWrite.All||Read and Write Group Permission|
|User.Read.All||Read the profiles of all of the users in a directory.|
|Group.Read.All||Read the resources of all of the groups in a directory.|
|offline_access||This scope value requests that an OAuth 2.0 Refresh Token be issued that can be used to obtain an Access Token that grants access to the End-User's UserInfo Endpoint even when the End-User is not present.|
Please refer to Microsoft Graph permissions reference to know more about Azure AD OAuth permissions used by Connect iPaaS.
Create a Connection¶
You need to have an Azure Active Directory admin account before using Azure AD application on Connect iPaaS.
On clicking the 'Link Account' button, you will be redirected to Microsoft Account Authorization screen. Choose the relevant user from the list of accounts present and enter the password for the authorized account.
By allowing access, you are authorizing RoboMQ to access your AzureAD account.
After successfully creating an Azure Active Directory Connection, you will be able to use all triggers and actions supported by this application.