Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 5 Next »

ON THIS PAGE

What it's about


XCALLY gives the possibility to use Modern Authentication for Email Accounts using Office365 as provider. 


Modern authentication is an umbrella term for a combination of authentication and authorization methods between a client and a server. It includes:

    • Authentication methods: Multi-factor authentication (MFA); smart card authentication; client certificate-based authentication
    • Authorization methods: Microsoft's implementation of Open Authorization (OAuth)
    • Conditional access policies: Mobile Application Management (MAM) and Azure Active Directory (Azure AD) Conditional Access

Very simplistic we can say, that with modern authentication, the client is talking to the service and getting redirected to Azure AD for authentication with the username and password or other methods like MFA.




How to set up


To activate the Modern Authentication for a new Email Account on XCALLY using Office365 as provider, you need to: 


A. Register an application in the Azure Portal, so the Microsoft identity platform can provide authentication and authorization services for your application and its users.

B. Configure a new Cloud Provider on XCALLY by choosing Microsoft Azure as a service and Outlook365 as the type.

C. Associate the Cloud Provider with the email accounts on XCALLY. 


Azure AD application registration 


Registering your application establishes a trust relationship between your app and the Microsoft identity platform. The trust is unidirectional: your app trusts the Microsoft identity platform, and not the other way around.

Follow these steps to create the app registration:

  1. Sign in to the Azure portal.

  2. If you have access to multiple tenants, use the Directories + subscriptions filter  in the top menu to switch to the tenant in which you want to register the application.

  3. Search for and select Azure Active Directory (AD).

  4. Under Manage, select App registrations > New registration.

  5. Enter a display Name for your application. Users of your application might see the display name when they use the app, for example during sign-in. You can change the display name at any time and multiple app registrations can share the same name. The app registration's automatically generated Application (client) ID, not its display name, uniquely identifies your app within the identity platform.

  6. Specify who can use the application, sometimes called its sign-in audience.



    Supported account typesDescription
    Accounts in this organizational directory onlySelect this option if you're building an application for use only by users (or guests) in your tenant.
    Often called a line-of-business (LOB) application, this app is a single-tenant application in the Microsoft identity platform.
    Accounts in any organizational directorySelect this option if you want users in any Azure Active Directory (Azure AD) tenant to be able to use your application. This option is appropriate if, for example, you're building a software-as-a-service (SaaS) application that you intend to provide to multiple organizations.
    This type of app is known as a multitenant application in the Microsoft identity platform.
    Accounts in any organizational directory and personal Microsoft accountsSelect this option to target the widest set of customers.
    By selecting this option, you're registering a multitenant application that can also support users who have personal Microsoft accounts.
  7. Don't enter anything for Redirect URI (optional). You'll configure a redirect URI in the next section.

  8. Select Register to complete the initial app registration.



When registration finishes, the Azure portal displays the app registration's Overview pane. You see the Application (client) ID. Also called the client ID, this value uniquely identifies your application in the Microsoft identity platform.

Your application's code, or more typically an authentication library used in your application, also uses the client ID. The ID is used as part of validating the security tokens it receives from the identity platform.


  1. Authentication Section
  2. Certificates & Secrets section
  3. API permission section
  • No labels