Manual Microsoft 365 tenant configuration
If the automatic configuration was not successful due to permission issues, the tenant must configured manually. To do that, select Click here to configure with an already existing Azure AD application. Please note that you can also opt to configure manually and skip the automatic configuration altogether with the option provided.
Prerequisite: A service user account with at least View-Only Organization Management, View-Only Audit Logs, and Service Administrator permissions. Click here to learn how to create a Microsoft 365 service account.
Manual tenant configuration involves the following three steps:
- Create an Azure AD application
- Configure the Azure AD application in M365 Security Plus
- Configure a service account in M365 Security Plus
Steps to create an Azure AD application
- Sign in to the Azure AD portal using the credentials of a Global Administrator account.
- Select Azure Active Directory from the left pane.
- Select App registrations.
- Click New registration.
- Provide a Name for the M365 Security Plus application to be created.
- Select a supported account type based on your organizational needs.
- Leave Redirect URI (optional) blank; you will configure it in the next few steps.
- Click Register to complete the initial app registration.
- You will now see the Overview page of the registered application.
- Click Add a Redirect URI.
- Click Add a platform under Platform configurations.
- In the Configure platforms pop-up, click Web under Web applications.
- In the Redirect URI field, enter http://localhost:port_number/webclient/VerifyUser. For example, http://localhost:8366/webclient/VerifyUser or https://192.345.679.345:8366/webclient/VerifyUser.
- You can leave the Logout URL and Implicit grant fields empty. Click Configure.
- On the Authentication page, under Redirect URIs, click Add URI.
- Enter http://localhost:port_number/webclient/ GrantAccess as the Redirect URI. For example, http://localhost:8366/webclient/GrantAccess or https://192.345.679.345:8366/webclient/GrantAccess.
- Similarly, using the Add URI option add http://localhost:port_number/AADAppGrantSuccess.do and http://localhost:port_number/AADAuthCode.do as URIs as well.
- Again click Add URI to add the below REDIRECT URIs in the subsequent rows. Please note that for users with M365 Manger Plus build 4409 or higher, REDIRECT URIs (b) and (c) are optional.
- https://identitymanager.manageengine.eu/api/public/v1/oauth/redirect
- https://demo.o365managerplus.com/oauth/redirect
- https://manageengine.com/microsoft-365-management-reporting/redirect.html
Note: The REDIRECT URI must adhere to the following:
- It must be fewer than 256 characters in length.
- It should not contain wildcard characters.
- It should not contain query strings.
- It must start with HTTPS or http://localhost.
- It must be a valid and unique URL. Based on the connection type (http/https) you have configured in M365 Security Plus, the REDIRECT URI format varies.
- For http, the URI value is http://localhost:8366. Machine name or IP address cannot be used in place of localhost if http is used.
- For https, the URI value is https://192.345.679.345:8366 or https://testmachine:8366.
To find your machine's IP, open the Command Prompt, type ipconfig, and click enter. You can find your IPv4 Address in the results shown.
- Click Save.
- Click Manifest from the left pane.
- Look for requiredResourceAccess array in the code.
- Copy the entire contents from this file and paste them into the section highlighted in the image below. If you want to modify the permissions to be provided, skip this step and follow the steps mentioned in this section.
Application scopes mentioned in the file
Microsoft Graph scopes
- Application.ReadWrite.All
- Directory.ReadWrite.All
- Mail.ReadWrite
- Sites.ReadWrite.All
- Reports.Read.All
- AuditLog.Read.All
- User.ReadWrite.All
- RoleManagement.ReadWrite.Directory
- ServiceHealth.Read.All
- Policy.Read.All
- Calendars.Read
- AdministrativeUnit.ReadWrite.All
Office 365 management API scopes
- ActivityFeed.Read
- ActivityFeed.ReadDlp
To know more about minimum scopes, click here.
Note:
- If your tenant is being created in Azure China, copy the entire contents from this file and paste them into the section highlighted in the image below.
Note: Copy-paste content only from the open square bracket to the closed square bracket. Ensure that all punctuation marks are retained correctly. Once you have pasted the file, it should look like the image below.
- Click Save.
- Click API permissions from the left pane.
- In the Configured permissions section, click ✓ Grant admin consent for <your_company_name>.
- Click Yes in the pop-up that appears.
- Click Certificates & secrets from the left pane.
- Under the Client secrets section, click New client secret.
- This section generates an app password for M365 Security Plus. In the Description field of the pop-up, provide a name to identify the app to which the password belongs.
- Choose when the password should expire.
- Click Add.
- Copy the string under Value and save it. This is the Application Secret Key, which you will require later.
- Go to Certificates and click Upload certificate. Upload your application certificate as a .cer file.
- If the user has an SSL certificate, the same can be used here. Otherwise, click here for steps to create a self-signed certificate.
Note: Certificate-based authentication is used to contact Microsoft 365 securely and fetch data. During manual configuration, you will be asked to enter your Application Secret and upload the Application Certificate.
- Now go to the Overview section in the left pane.
- Copy the Application (client) ID and Object ID values and save them. You will need these values to configure your tenant in the M365 Security Plus portal.
- Refer to this table to learn about the roles that must be assigned to the application.
- Return to the M365 Security Plus console where you have the pop-up.
- Enter your Tenant Name. For example, test.onmicrosoft.com.
- Paste the Application ID and Application Object ID values copied in Step 33 into the respective fields.
- For the Application Secret Key, paste the value copied in Step 32.
- Upload a .pfx file of the certificate that has been uploaded in the Azure portal. Refer to Step 34 in the Steps to create an Azure AD application section.
- Enter your certificate password.
- If you have an SSL certificate, you can upload the same in the appropriate field.
- Click Add Tenant.
- You should now see that REST API access is enabled for the account you configured.
- Now the service account must be configured. To do this, click the edit option under the Actions column.
- Click the edit icon found near Service Account Details.
- Enter the credentials of the service account you need to configure in the respective fields.
- Click Update, and close the pop-up window.
Note: If your service account is MFA-enabled, please check
this section.
Steps to create a self-signed certificate
- Run the following command in Windows PowerShell as an administrator:
Set-ExecutionPolicy -ExecutionPolicy RemoteSigned -Force -Scope process
- Go to <Installation Directory>\bin folder and run the Create-selfsignedcertificate.ps1 script as an administrator.
- While running the script, you will be asked to add a common name for the certificate, start and end date (yyyy-MM-dd) for the certificate's validity and a private key to protect it.
- Once you enter the values, the script will create a .pfx file (contains both public and private key) in the bin folder
- The .pfx file needs to be uploaded in M365 Security Plus, while the .cer file should be uploaded in the Azure portal of your application.
Don't see what you're looking for?
-
Visit our community
Post your questions in the forum.
-
Request additional resources
Send us your requirements.
-
Need implementation assistance?
Try onboarding