All Collections
Oloid Workflow
Set up 3rd party Applications
Set up Azure AD for Oloid Workflow Integration
Set up Azure AD for Oloid Workflow Integration
Updated over a week ago

Connecting to Azure Active Directory (Azure AD) on Oloid Workflow is a multistep process involving configuration steps in the Microsoft Active Directory and Oloid Workflow.

Steps to create Oloid Workflow on Azure AD

Creating Oloid Workflow Application on Azure AD consists of the following steps:

Step 1: Register your application

Register your Oloid Workflow application with Azure AD.

  1. Select App registrations.

  2. On the resulting page, click + New registration.

  3. Name your application. This is the user-facing display name for this application. Microsoft allows you to change this name later.

  4. In Supported account types, select the first option, Accounts in this organizational directory only.

  5. In the Redirect URI field, set the platform type to Web and provide the redirect URI.

  6. The next page displays the details of the newly-created application. Pay attention to the Application (client) ID and the Directory (tenant) ID. You will need these values later to authenticate in Oloid Workflow.

Step 2: Assign permissions to your application

Now it's time to assign permissions to our Oloid Workflow application.

These instructions demonstrate how to grant the minimum permissions necessary to establish a connection with Oloid Workflow. The permissions you need are variable and based on your use case.

  1. Select API permissions from the left navigation sidebar.

  2. Click + Add a permission.

  3. Click Microsoft Graph to open the permissions interface.

  4. Select Application permissions.

  5. Scroll to User. Add the User.Read.All and User.ReadWrite.All permissions, along with any other necessary permissions.

  6. Click Add permissions.

  7. You will see these permissions added to Microsoft Graph. However, you will need admin approval to grant them to your application officially.

    If you are logged in with an administrator account, click Grant admin consent for Default Directory.

  8. Once admin consent is granted, Microsoft updates the Status column to Granted.

Step 3: Generate a client secret for your application

  1. Select Certificates & secrets from the left navigation sidebar.

  2. Click + New client secret.

  3. In the interface that appears, provide a description of the secret and determine when the secret will expire.

  4. Copy and save the Value in a safe place. This is the only time Azure AD displays this value.


    โ€‹

Did this answer your question?