Create an Azure Active Directory App
- Go to the Azure Active Directory Admin Portal and log in with a Microsoft account (Note: This does not need to be the same account that we are going to use on the Service Desk queue. It is an account that will administer the Azure App)
- Go to "Azure Active Directory" (now called Microsoft Entra ID).
- In the secondary navigation under Manage select "App Registrations".
- Click on "New Registration".
- Give the App a display Name (The name is not important but it should be something recognizable to be used later).
- Select "Accounts in any organizational directory - Multitenant".
- Provide a Redirect URI
- Click the dropdown menu "Select a platform" and select "Web".
- The redirect UI format must be: https://”KACESMAWEBSERVERNAME”/common/authorize.php
- The URL must be https.
- The hostname provided must be the same one that will be used to access the Kace SMA admin UI when requesting a new access code.
- The hostname does not have to be externally accessible.
- Click "Register" to save.
- Note the "Application (client) ID"; we are going to need it later.
- Select "Certificates & Secrets" in the “Manage” section to the left of the screen.
- Click the “New Client Secret” Button.
- Enter a Description.
- Select an expiration (selecting an option other than Never will require the OAuth credentials to be update in the SMA when the secret expires).
- Click "Add".
- Copy the new client secret Value to be used later (Note: This can only be copied right after creating the secret).
Additional configuration required for outbound email sending (SMA 14.1 and up)
- In Azure, navigate to the application you created for the inbound OAUTH in the SMA.
https://portal.azure.com | Microsoft Entra ID | (left menu) Manage | App registrations | Click the name of your APP - Next click (left menu) Manage | API permissions
- In the API permissions screen click Add a permission and add: Microsoft Graph: Mail.Send
-
In certain environments,
configuring the API type as 'delegated' may be necessary. For additional information on MS Graph mail.send permissions, refer to the Microsoft documentation
here.
- Once the new permission has been added, admin consent must be granted for it to be enabled.
Use the App Client ID and Client Secret Value to create an OAuth token Credential in the SMA
- Navigate the SMA Admin UI (https://”KACESMAWEBSERVERNAME”/adminui)
- On a multi org system select the ORG required.
- In the navigation panel on the left select Settings | Credentials.
- Select “Choose Action” in the dropdown select “New”.
- In the Add Credential dialog, give the new Credential a Name.
- Select "Office365 OAuth" as the Type.
- Enter the Client ID from the Azure portal.
- Enter the Client Secret Value from the Azure portal.
- Select the Tenant type. Make sure the Tenant Type matches what is configured on Azure AD (Multitenant).
- Click on "Authorize Credential".
- A new window will open.
- Log in with the email address that is going to be used on the Service Desk queue.
- Verify the app asking for permission matches the name of the app configured above.
- Verify that "Read and write access" permission is being requested.
- Click "Accept".
- The authorization will show on Status with "Stored As Token: queueemailaddress@domain.com" .
- Click "Save".
- The new credential can now be used for a Service Desk Queue with Office365 OAuth.
NOTE: As an initial setup in Office 365, multiple email accounts might be required for the KACE SMA appliance depending on the number of queues in use. These should be full standard mailboxes accounts and not shared mailboxes or just contacts. Kace SMA will be using one email account for network settings, and one per helpdesk queue.
Troubleshooting