Calling the Microsoft Graph REST API from Boost.space IntegratorPart of the Boost.space system, where you can create your connections and automate your processes.‘s HTTP > Make an OAuth 2.0 request requires you to:
Both the Azure portal and Boost.space Integrator require information to create a connectionUnique, active service acces point to a network. There are different types of connections (API key, Oauth…).:
Values entered in Boost.space Integrator created or found in the Azure portal:
Value required in Boost.space Integrator | Value as named in Azure portal UI |
---|---|
Client ID | Application ID |
Client secret | Secret ID Value |
Authorize URI | OAuth 2.0 authorization endpoint (v2) |
TokenA secure code used to authenticate and authorize access to API endpoints, enabling users to connect with third-party applications. URI | OAuth 2.0 token endpoint (v2) |
Values entered in the Azure portal related to Boost.space Integrator:
Value required in the Azure portal | Value to enter |
---|---|
Redirect URI (Web) | https://integrator.boost.space/oauth/cb/oauth2 |
To create your OAuth connection for Microsoft, complete these steps in the Azure portal:
When you create and register a web application in the Azure portal, Azure automatically creates your Client ID. This procedure only creates the web application. You still need to create your client secret and grant any required permissions.
- Log in to your Azure portal account.
- Under Manage Azure Active Directory, click View.
- In the left sidebar, click App registrations, and then click New registration.
- Enter a name for your application.
- Under Redirect URI, click Web and enter the redirect URL:
https://integrator.boost.space/oauth/cb/oauth2
- Click Register.
- Save your Application (client) ID in a safe place. You need to enter in the module configuration on Boost.space Integrator.
After registering your app, you can create a client secret in the Azure portal. Keep your client credentials in a safe place. If you lose your client secret, you can use this procedure to create a new one.
- In the Azure AD B2C – App registrations page, click the application you created in the above procedure.
- In the left sidebar, under Manage, click Certificates & secrets.
- Click New client secret.
- In the Description box, enter a description for the client secret.
- Under Expires, select a duration for which the secret is valid, then click Add.
- Your client secret appears in the Value field. Save your client secret in a safe place. Enter this client secret in the module configuration on Boost.space Integrator. You cannot retrieve this client secret once you leave this page.
After registering a web application and getting your OAuth credentials, you need to grant the required permissions.
- Click App registrations.
- Select the app you created in the above procedure and open its Overview page.
- Under Manage, click API permissions.
- Click + Add a permission.
- Select the required Microsoft API.
- Click Delegated permissions and use the search bar to find and select the permissions required by the app you are configuring.
- Click Add permissions. The selected permissions now appear under Configured permissions.
- Click Grant admin consent for {your Azure AD tenant name}.
- A pop-up prompts you to confirm. Click Yes.
You can verify success by checking the Status column. A green checkmark appears with the text Granted for {your Azure AD tenant name}.
Boost.space Integrator‘s HTTP > Make an OAuth 2.0 request requires URIs to authorize your API calls and obtain a token. You can find these URIs in the Azure portal:
- Click App registrations.
- Select the app you created in the above procedure and open its Overview page.
- Click Endpoints.
- In the pop-up, use the Copy to clipboard button to copy and save or enter the following in the module configuration on Boost.space Integrator:
Value required in Boost.space Integrator Value as named in Azure portal UI Authorize URI OAuth 2.0 authorization endpoint (v2) Token URI OAuth 2.0 token endpoint (v2)
- In Boost.space Integrator dashboard, go to Create a new scenarioA specific connection between applications in which data can be transferred. Two types of scenarios: active/inactive..
- Insert the HTTP > Make a OAuth 2.0 request module.
- Open the module’s configuration and click Add next to the Connection field to create a new connection.
- Click Show advanced settings.
- Fill the connection setup as follows:
Flow type Select Authorization Code. Authorize URI Enter the OAuth 2.0 authorization endpoint (v2) URI you found previously. Token URI https://login.microsoftonline.com/common/oauth2/v2.0/token Scope Click + to add each permission you granted previously. Check that:
- All necessary permissions are listed.
- Each permission is a separate item.
Scope separator Select SPACE. Client ID Enter the Application ID from the app you created in the Azure portal. Client Secret Enter the client secret you created previously. Authorize parameters Enter the following keys and values: Key response_mode
Value query
Key prompt
Value consent
Refresh token parameters Enter the following key and value Key scope
Value Enter all scopes you have in the Scopes field separated spaces. Example:
offline_access opened profile User.Read
Token placement Select In the header. Header token name Select Bearer. - Click Continue.
- A window pops up. Review the permissions and click Accept.
The connection is successfully created. You can perform your API call.