Manual Microsoft 365 tenant configuration

If the automatic configuration was not successful, the tenant must be configured manually. To do that, navigate to Account Configuration > Microsoft 365 tab > Add new tenant and select Click here to configure with an already existing Azure AD application.

Prerequisites:

  1. A service user account with at least Exchange Administrator privileges. Click here to learn how to create such a service account.
  2. If the account you use to configure your tenant to RecoveryManager Plus has MFA enabled, you need to use either the Conditional Access or Trusted IP feature in Microsoft 365 to bypass MFA. Once you have configured one of these features, proceed to configure the service account in RecoveryManager Plus.
  3. Create a self-signed X.509 certificate. Download the PowerShell script from this link. Open PowerShell and run the downloaded script using the following command:

    .\Create-SelfSignedCertificate.ps1 -CommonName "CertificateName" -StartDate YYYY-MM-DD -EndDate YYYY-MM-DD.

    The certificate will be created with the name provided in the CertificateName position. In the YYYY-MM-DD field, provide the start and end date for the certificate. Once you run the PowerShell script, you will be requested to provide a password for the PFX file, and the PFX and CER files will be exported to the current folder. The password you provided and the certificate files will be required in the later steps.

There are two steps to configure a tenant manually.

  1. Create an Azure AD application.
  2. Configure the Azure AD application in RecoveryManager Plus.

Create an Azure AD application

To create an Azure AD application,

  1. Sign in to the Azure AD portal using the credentials of a Global Administrator account.
  2. Select Azure Active Directory from the left pane.
  3. Select App registrations.
  4. Click New registration.
  5. Provide a Name for the RecoveryManager Plus application to be created.
  6. Select a supported account type based on your organizational needs.
  7. Leave the RedirectURL(optional) field blank. You will configure it in the next few steps.
  8. Click Register to complete the initial app registration.
  9. You will now see the Overview page of the registered application.
  10. Click Add a Redirect URL.
  11. Click Add a platform under Platform configurations.
  12. In the Configure platforms pop-up, click Web under Web applications.
  13. In the RedirectURL field, enter http://localhost:port_number/webclient/GrantAccess. For example, http://localhost:8090/webclient/GrantAccess or
    https://192.345.679.345:8090/webclient/GrantAccess.
  14. You can leave the Logout URL and Implicit grant fields empty. Click Configure.
  15. In the Authentication page, under Redirect URLs, click Add URL. and add the following URLs.
    • http://localhost:port_number/AADAppGrantSuccess.do
    • http://localhost:port_number/AADAuthCode.do
    • https://identitymanager.manageengine.com/api/public/v1/oauth/redirect
  16. Create an Azure AD application

    Note: The REDIRECT URL must adhere to the following criteria:

    • It must be fewer than 256 characters in length.
    • It should not contain wildcard characters.
    • It should not contain query strings.
    • It must start with HTTPS or http://localhost.
    • It must be a valid and unique URL. Based on the connection type (http/https) you have configured in RecoveryManager Plus, the REDIRECTURL format varies.
      • For http, the URL value is http://localhost:8090. Machine name or IP address cannot be used in place of localhost if http is used.
      • For https, the URL value is https://192.345.679.345:8090 or https://testmachine:8090.
    • To find your machine's IP, open the Command Prompt, type ipconfig, and click Enter. You can find your IPv4 Address in the results shown.
  17. Click Save.
  18. Click Manifest from the left pane.
  19. Look for requiredResourceAccess array in the code.
  20. Copy the entire content from this file and paste them into the section highlighted in the image below. If you want to modify the permissions to be provided, skip this step and follow the steps mentioned in this section.
  21. Note:
    • If your tenant is being created in Azure Germany, copy the entire content from this file and paste them into the section highlighted in the image below.
    • If your tenant is being created in Azure China, copy the entire content from this file and paste them into the section highlighted in the image below.

    Create an Azure AD application

    Note: Copy and paste content only from the open square bracket to the closed square bracket. Ensure that all punctuation marks are retained correctly. Once you have pasted the file, it should look like the image below.

    Create an Azure AD application

  22. Click Save.
  23. Click API permissions from the left pane.
  24. In the Configured permissions section, click ✓ Grant admin consent for <your_company_name>.
  25. Click Yes in the pop-up that appears.
  26. Click Certificates & secrets from the left pane.
  27. Under the Client secrets section, click New client secret.
  28. This section generates an app password for RecoveryManager Plus. In the Description field of the pop-up, provide a name to identify the app to which the password belongs.
  29. Choose when the password should expire.
  30. Click Add.
  31. Copy the string under Value and save it. This is the Application Secret Key, which you will require later.
  32. Create an Azure AD application

  33. In the Certificates section, click Upload certificate and upload the .CER file generated in the prerequisites section.
  34. Create an Azure AD application

  35. Now, navigate to the Overview section in the left pane.
  36. Copy the Application (client) ID and Object ID values and save them. You will need these values to configure your tenant in the RecoveryManager Plus portal.
  37. Create an Azure AD application

  38. Refer this table to learn about the roles that must be assigned to the application.

Steps to configure an Azure application in RecoveryManager Plus

  1. Return to the RecoveryManager Plus console where you have the pop-up.
  2. Create an Azure AD application

  3. Enter your Tenant Name. For example, test.onmicrosoft.com.
  4. Paste the Application ID and Application Object ID values copied in Step 35 of the previous section into the respective fields.
  5. For the Application Secret Key, paste the value copied in Step 32 of the previous section.
  6. In the Application Certificate field, click Browse and select the .PFX file generated in the prerequisites section. In the Certificate Password field, enter the password used in the prerequisites section.
  7. Enter the Service account name and Password of the user service account you had created for RecoveryManager Plus.
  8. Click Add Tenant.
  9. You should now see that AAD Application Status is successful for the account you configured.
Note: If your service account is MFA-enabled, please check this section.

Copyright © 2023, ZOHO Corp. All Rights Reserved.