Office 365

Office 365 integration allows you to authorize an Office 365 account for use with Jadu XFP (e.g. event booking) and your own custom developments.

Once the API client ID and secret have been saved you will be able to click 'Authorize account' button to add a new account.

Office 365 integration uses Azure Active Directory (Azure AD) to access web services provided by Microsoft such as Office 365. Azure AD exposes two sets of endpoints, Azure AD and Azure AD v2.0, Jadu Continuum supports both, the one you use depends on your Microsoft account.

Deciding which Azure AD version to use

If you are unsure which API version to use log into your Microsoft Azure Portal

  1. Login to your office.com admin portal https://portal.office.com/adminportal/home#/homepage
  2. Under 'Admin centers' in the menu on the left handside, click on 'Azure AD'

If your Azure Portal looks like this:

Azure AD

You should follow Generating Office 365 API Client ID and Secret (Azure AD) instructions.

However if your Azure Portal looks like this:

Azure AD v2.0

You should follow Generating Office 365 API Application ID and Key (Azure AD v2.0) instructions.

Generating Office 365 API Client ID and Secret (Azure AD)

To use the Office 365 integration a API Client ID and secret must be provided. These can be retrieved from Microsoft Azure portal.

  1. Login to your account on the Microsoft Azure portal https://manage.windowsazure.com
  2. Click on "Active Directory" in the menu.
  3. Click on the Activity Directory you would like to use.
  4. Click on "Applications" in the top menu.
  5. Click the "Add" icon at the bottom of the page and select "Add an application my organization is developing".
  6. Enter a name for your application, e.g. "Website" and Continue.
  7. Enter the OAuth end point URL (/jadu/integrations/office365/callback) in the "SIGN-ON URL" field, e.g. "https://www.jadu.net/jadu/integrations/office365/callback".
  8. Enter your website URL in the "APP ID URI" field, e.g. "https://www.jadu.net" and click Complete.
  9. Once the Application has created click "Configure" in the top menu.
  10. Make a note of the Client ID, this will be used as the client ID in the integrations hub.
  11. Create a new key by selecting a duration from the drop down (it will be visible after saving the application).
  12. Click "Save"
  13. Make a note of the key that is now shown, this will be used as the client secret in the integrations hub.
  14. Click "Add application" and select "Office 365 Exchange Online".
  15. Under "Office 365 Exchange Online" select "Read user calendars", "Read and write user calendars", "Read user and shared calendars" and "Read and write user and shared calendars" from the Delegated Permissions dropdown and "Read calendars in all mailboxes", "Read and write calendars in all mailboxes"
  16. Click the Save button.

Generating Office 365 API Application ID and Key (Azure AD v2.0)

Enabling Office 365 integration using Azure AD v2.0 (https://jadu.wistia.com/medias/ffqh4tsanz)

  1. Login to apps.dev.microsoft.com
  2. Click on the "Add an app" button
  3. Enter a name for your application, e.g. "Website" and Continue.
  4. Uncheck the "Let us help you get started" under "Guided Setup"
  5. Click "Create"
  6. Make a note of the "Application id", this will be used as the client ID in the integrations hub.
  7. Click on "Generate New Password" under "Application Secrets"
  8. Make a note of the generated key, this will be used as the Client secret in teh integrations hub.
  9. Click "Add Platform"
  10. Click "Web API"
  11. Click "Add Platform"
  12. Click "Web"
  13. Under the "Web" subsection enter the OAuth end point URL (/jadu/integrations/office365/callback) in the "Redirect URLs" field e.g. "https://www.jadu.net/jadu/integrations/office365/callback".
  14. Under "Microsoft Graph Permissions" remove any delegated permissions that are enabled and click "Add" to add delegated permissions.
  15. Choose "Calenders.Read", "Calenders.Read.Shared", "Calenders.ReadWrite", "Calenders.ReadWrite.Shared", "offline_access", "open_id" and "profile".
  16. Click "Ok"
  17. Click "Add" next to the Application Permissions
  18. Select "Calendars.Read" and "Calendars.ReadWrite"
  19. Click "Ok"
  20. Enter the OAuth end point URL (/jadu/integrations/office365/callback) in the "Home page URL" field e.g. "https://www.jadu.net/jadu/integrations/office365/callback".
  21. Uncheck "Live SDK support" under "Advanced Options"
  22. Click "Save"

To configure the Office365 integration

Once you have your Client ID and Secret (Azure AD) or Application ID and Key (Azure AD v2.0) you need to add them to the Integrations Hub page.

  1. Navigate to Utilities > Integrations
  2. Select "Office365" from the list
  3. Enter the client values and choose the correct Azure AD version
  4. Click the Save button
  5. The Connect account button is now visible and you can connect individual Office365 accounts to interact with using the integration.

To authorise an Office365 account

  1. Sign into Office365
  2. Navigate to Utilities > Integrations
  3. Select "Office365"
  4. Click the Connect account button
  5. After the page refreshes, the email address of the Office365 account you are currently logged into will be added to the authorised accounts list.

Note: Outbound connectivity from the server through your firewall will be necessary to login.microsoftonline.com, outlook.office365.com on port 443.

To unauthorise an Office365 account

  1. Sign into Office365
  2. Navigate to Utilities > Integrations
  3. Select "Office365"
  4. Click the cross icon next to the account email address in the list
  5. A new form will open
  6. Click the Remove button

results matching ""

    No results matching ""