Microsoft Graph provides access to data stored across Microsoft 365 services. It offers a unified programmability model that you can use to access the tremendous amount of data in Microsoft 365, Windows, and Enterprise Mobility + Security.
Microsoft Graph documentation: API guide
Currently, Celigo integrator.io does not offer a prebuilt connector to Microsoft Graph. However, you can integrate with the API by setting up a universal HTTP connection with OAuth 2.0 based authentication.
Start establishing an HTTP connection to Microsoft Graph in either of the following ways:
-
From the Resources menu, select Connections. Then, click + Create connection at the top right.
– or –
-
While working in a new or existing integration, you can add an application to a flow simply by clicking Add source or Add destination/lookup.
In the resulting Application list, select HTTP.
The Create connection panel opens with required and advanced settings.
Edit the General settings specific to your account and this connection resource.
Name (required): Provide a clear and distinguishable name. Throughout integrator.io imports and exports, you will have the option to choose this new connection, and a unique identifier will prove helpful later when selecting among a list of connections that you’ve created.
Application (required, non-editable): A reminder of the app you’re editing.
Mode (required): Select Cloud.
Note
This article is concerned only with the settings needed for the Microsoft Graph connection. For complete field documentation, see Set up an OAuth 2.0 based HTTP connection.
At this point, you’re presented with a series of options for providing HTTP authentication.
Base URI (required): Enter the Microsoft Graph base URI: https://graph.microsoft.com
.
Media type (required): Select JSON.
Override media type for success responses: Accept the default value, Do not override.
Override media type for error responses: Accept the default value, Do not override
In the Configure authentication section, select and configure the authentication.
Auth type (required): Select OAuth 2.0.
OAuth 2.0 client (required): Assuming you haven’t yet established a Microsoft Graph iClient (client ID and client secret). To add an iClient and configure your credentials, click the plus (+) button or Click the edit ( ) button to modify a selected Client and switch to the HTTP view in the Create/Edit iClient page:
-
Name (required): Enter an iClient name.
-
Grant type (required): Select Authorization code.
-
Client ID: Enter your Microsoft Graph application client ID.
-
Client secret: Enter your Microsoft Graph application client secret.Multiple layers of protection, including AES 256 encryption, are in place to keep your secret safe. When editing this connection, you must re-enter this value each time; it is stored only when the connection is saved and never displayed as text.
-
Send client credentials via (required): Accept the default value, HTTP body.
-
Authorization URL (required): Enter your Microsoft Graph authorization URL:
https://login.microsoftonline.com/organizations/oauth2/v2.0/authorize
. -
Access token URL (required): Enter your Microsoft Graphy access token URL:
https://login.microsoftonline.com/organizations/oauth2/v2.0/token
.
-
Valid domain names (required): Enter
microsoftonline.com
,microsoft.com
. -
Send token via (required): Select HTTP header.
-
Header name (required): Accept the default value, Authorization.
-
Header scheme: Select Bearer.
Scope: Enter your scope https://graph.microsoft.com/.default offline_access
.
App registration:
-
Sign in to your Azure portal.
-
Click App registrations.
-
Click + New registration.
-
Enter a Name.
-
Select an Account type.
-
Enter Celigo platform Redirect URL. For example:
https://integrator.io/connection/oauth2callback
. -
Click Register. The Application page appears.
Add API permissions:
-
Navigate to API permissions.
-
Click + Add a permission.
-
Navigate to Microsoft Graph > Delegated permissions.
-
Under Files, check all Permissions.
-
Click Add permissions. You will be redirected to the API permissions page.
-
Click + Add a permission.
-
Navigate to SharePoint > Delegated permissions.
-
Under My files, User, and Sites, check all Permissions.
-
Click Add permissions. You will be redirected to the API permissions page.
-
Click Grant admin consent for celigo.com and click Yes.
Add scopes:
-
Navigate to Expose an API.
-
Click + Add a scope.
-
Click Save and continue.
-
Enter a Scope name.
-
Select Who can consent.
-
Enter an Admin consent display name and Description.
-
Click Add scope.
Assign app roles:
-
Navigate to App roles.
-
Click + Create app role.
-
Enter a Display name.
-
Choose Allowed member types:
Both
. -
Enter a Value:
Graph_Access
. -
Enter a Description.
-
Click Apply.
Create client ID and client secret
-
Navigate to Overview.
-
Copy the Application (client) ID.
-
Navigate to Certificates and secrets > Client secrets.
-
Click + New client secret.
-
Enter a Description.
-
Click Add.
-
Copy the Value (client secret).
Comments
Article is closed for comments.