Articles in this section

Set up an OAuth 2.0 HTTP connection to Microsoft Graph

Microsoft Graph provides access to data stored across Microsoft 365 services. It offers a unified programmability model that you can use to access the tremendous amount of data in Microsoft 365, Windows, and Enterprise Mobility + Security.

Microsoft Graph documentation: API guide

Currently, Celigo integrator.io does not offer a prebuilt connector to Microsoft Graph. However, you can integrate with the API by setting up a universal HTTP connection with OAuth 2.0 based authentication.

A. Set up an HTTP connection

Start establishing an HTTP connection to Microsoft Graph in either of the following ways:

  • From the Resources menu, select Connections. Then, click + Create connection at the top right.

    – or –

  • While working in a new or existing integration, you can add an application to a flow simply by clicking Add source or Add destination/lookup.

In the resulting Application list, select HTTP.

1.png

The Create connection panel opens with required and advanced settings.

B. Describe the general HTTP connection settings

Edit the General settings specific to your account and this connection resource.

Name (required): Provide a clear and distinguishable name. Throughout integrator.io imports and exports, you will have the option to choose this new connection, and a unique identifier will prove helpful later when selecting among a list of connections that you’ve created.

Application (required, non-editable): A reminder of the app you’re editing. 

Mode (required): Select Cloud.

C. Provide required HTTP account information

Note

This article is concerned only with the settings needed for the Microsoft Graph connection. For complete field documentation, see Set up an OAuth 2.0 based HTTP connection.

At this point, you’re presented with a series of options for providing HTTP authentication.

2.png

Base URI (required): Enter the Microsoft Graph base URI: https://graph.microsoft.com.

Media type (required): Select JSON.

Override media type for success responses: Accept the default value, Do not override.

Override media type for error responses: Accept the default value, Do not override

D. Configure authentication settings

In the Configure authentication section, select and configure the authentication. 

Auth type (required): Select OAuth 2.0.

OAuth 2.0 client (required): Assuming you haven’t yet established a Microsoft Graph iClient (client ID and client secret). To add an iClient and configure your credentials, click the plus (+) button or Click the edit ( ) button to modify a selected Client and switch to the HTTP view in the Create/Edit iClient page:

  • Name (required): Enter an iClient name.

  • Grant type (required): Select Authorization code.

  • Client ID: Enter your Microsoft Graph application client ID.

  • Client secret: Enter your Microsoft Graph application client secret.Multiple layers of protection, including AES 256 encryption, are in place to keep your secret safe. When editing this connection, you must re-enter this value each time; it is stored only when the connection is saved and never displayed as text.

  • Send client credentials via (required): Accept the default value, HTTP body.

  • Authorization URL (required): Enter your Microsoft Graph authorization URL: https://login.microsoftonline.com/organizations/oauth2/v2.0/authorize.

  • Access token URL (required): Enter your Microsoft Graphy access token URL: https://login.microsoftonline.com/organizations/oauth2/v2.0/token.

3.png
  • Valid domain names (required): Enter microsoftonline.com, microsoft.com.

  • Send token via (required): Select HTTP header.

  • Header name (required): Accept the default value, Authorization.

  • Header scheme: Select Bearer.

Scope: Enter your scope https://graph.microsoft.com/.default offline_access.

Configure and retrieve your Microsoft Graph required information

App registration:

  1. Sign in to your Azure portal.

  2. Click App registrations.

  3. Click + New registration.

  4. Enter a Name.

  5. Select an Account type.

  6. Enter Celigo platform Redirect URL. For example: https://integrator.io/connection/oauth2callback.

  7. Click Register. The Application page appears.

4.png

Add API permissions:

  1. Navigate to API permissions.

  2. Click + Add a permission.

  3. Navigate to Microsoft Graph > Delegated permissions.

  4. Under Files, check all Permissions.

  5. Click Add permissions. You will be redirected to the API permissions page.

5.png
  1. Click + Add a permission.

  2. Navigate to SharePoint > Delegated permissions.

  3. Under My files, User, and Sites, check all Permissions.

  4. Click Add permissions. You will be redirected to the API permissions page.

  5. Click Grant admin consent for celigo.com and click Yes.

6.png

Add scopes:

  1. Navigate to Expose an API.

  2. Click + Add a scope.

  3. Click Save and continue.

  4. Enter a Scope name.

  5. Select Who can consent.

  6. Enter an Admin consent display name and Description.

  7. Click Add scope.

7.png

Assign app roles:

  1. Navigate to App roles.

  2. Click + Create app role.

  3. Enter a Display name.

  4. Choose Allowed member types: Both.

  5. Enter a Value: Graph_Access.

  6. Enter a Description.

  7. Click Apply.

8.png

Create client ID and client secret

  1. Navigate to Overview.

  2. Copy the Application (client) ID.

  3. Navigate to Certificates and secrets > Client secrets.

  4. Click + New client secret.

  5. Enter a Description.

  6. Click Add.

  7. Copy the Value (client secret).

9.png

E. Save and authorize

  1. Click Save and authorize to commit your changes and proceed to sign in with Microsoft Graph.

  2. After signing in, review the permissions for the integration and click Accept.

Was this article helpful?
0 out of 0 found this helpful

Comments

0 comments

Article is closed for comments.