Internet registrations/portal leads set-up via Microsoft Entra ID (formerly Azure Active Directory - AAD)
This guide has been reviewed against our global client base and classed as relevant to all regions
For portal leads to be imported into Reapit via a mailbox within Office 365, authentication via Microsoft Entra ID is required
This guide covers how to create an app within Microsoft Entra ID, along with the details required for Reapit to connect, including:
Create new registration in Microsoft Entra ID
1. Access Azure Services page Microsoft Entra ID is accessed from the Azure Services page
|
2. Add new registration
|
3. Register application From the Register an application screen:
|
4. Application created The Overview page for the newly created application is displayed |
Create a secret key
1. Add a certificate or secret From the Overview page:
|
2. Add description & expiry date In the Add a client secret section:
|
3. Copy client secret details
Keep the copied information safe as you will need to provide it to your PM and/or Reapit |
Create permissions
1. Create API permissions To create API permissions:
|
2. Permission created but not granted
|
Grant app permissions
1. Authentication
|
2. Note Application (client) ID
|
3. Navigate to URL
|
4. Grant permission
|
5. Provide Reapit with required information Provide Reapit/your PM with the following information:
|
Restrict access via PowerShell (optional)
The account shown in this guide, with the current setup, has access to all mailboxes
The process Reapit runs to retrieve emails by default will not attempt to scrape information from other mailboxes - however, if you would like to restrict access via PowerShell, the steps below demonstrate how to do this
1. Create application access policy
|
2. Test if the policy has been updated Test if the policy has been updated, by using PowerShell to run the following:
|
Related articles