Skip to main content
Matrix42 Self-Service Help Center

OneDrive Tenant Configuration for Microsoft 365 Service Connection

To register DWP for Microsoft 365 Service Connections integration, start with registering DWP at the Microsoft identity platform.

  1. On the Microsoft Azure Portal home page, go to the Azure services section or use the Search resources search bar and open App registrations:
    01Azure_app_registration.png
    Microsoft Azure Portal: App registrations

  2. Provide a Name for the application. The DWP users will see the display name when applying the Setup Authentication for the configured Service Connection.
  3. Choose the Supported account types
  4. Add a Redirect URI: select Web and enter Redirect URI, for instance, https://{your_domain_name}/wm/externalAuth/redirect.html.
  5. Click Register.
    02_register_an_app.png
    Microsoft Azure Portal: Name, Supported account types, and Redirect URI
     
  6. Click on your new App Registration, for instance, DWP App, go to the Overview section. Here you can find the following data for the OneDrive Tenant configuration in DWP Service Connections:
    Microsoft Azure Portal Application Overview field name DWP Tenant configuration field name
    Application (client) ID Tenant
    Directory (tenant) ID  Client ID

    03_client_tenant_ids1.png
    Enter the data to the corresponding fields in the Administration application → Integration → Service Connections → Tenants configuration:
    tenants_tenant_client_ids.png
  7. Add Client Secret: in your registered application, go to the Certificates & secrets section → click + New client secret → provide a Description → copy the Value of the generated Client secret, as it will be encrypted and shown on the Certificates & secrets section as suggested on the image below.
    04_client_secret1.png
  8. Enter the copied Client secret value in the OneDrive Tenant configuration in DWP Service Connections:
    tenants_tenant_client_ids.png
  9. Add API permissions: in your registered application, go to the API permissions section → click + Add a permission → choose Microsoft Graph Delegated permissions → select necessary permissions from the suggested list → click Add permissions:
    05_access_web_api.png
  10. Add the corresponding permissions to the Scope area for your Service provider configuration: open Administration application → Integration → Service Connections → Services → Microsoft 365 → Capabilities section → Scope:
    06_scope_onedrive.png

For more information on how to add a scope, see also Microsoft Documentation Quickstart: Configure an application to access a web API.