Skip to content

Azure AD Connection

Azure AD application on Connect iPaaS uses OAuth authorization. By linking your Azure AD account with Connect iPaaS, you can authorize RoboMQ to have a delegated access on your behalf. RoboMQ needs the following permissions on your account to provide a seamless integration experience:

Scopes Explanation
openid If an app performs sign-in by using OpenID Connect, it must request the openid scope.
User.ReadWrite.All Read and Write User Permission
Group.ReadWrite.All Read and Write Group Permission
User.Read.All Read the profiles of all of the users in a directory.
Group.Read.All Read the resources of all of the groups in a directory.
offline_access This scope value requests that an OAuth 2.0 Refresh Token be issued that can be used to obtain an Access Token that grants access to the End-User's UserInfo Endpoint even when the End-User is not present.

Please refer to Microsoft Graph permissions reference to know more about Azure AD OAuth permissions used by Connect iPaaS.

We at RoboMQ pay utmost attention to keep your account secure. See our Security and Privacy Policy to learn more about how RoboMQ handles your account access.

Create a Connection

You need to have an Azure Active Directory admin account before using Azure AD application on Connect iPaaS.

On clicking the 'Link Account' button, you will be redirected to Microsoft Account Authorization screen. Choose the relevant user from the list of accounts present and enter the password for the authorized account.

Azure AD Sign In

Figure 1. Azure AD Sign In

By allowing access, you are authorizing RoboMQ to access your AzureAD account.

After successfully creating an Azure Active Directory Connection, you will be able to use all triggers and actions supported by this application.