Note: Microsoft has announced that RBAC using ApplicationImpersonation is being deprecated. As of May 2024, new assignments of the ApplicationImpersonation role will no longer be supported and the role will be appreciated at the end of 2025. To learn more about Microsoft's end of support for RBAC/ApplicationImpersonation please read this Microsoft article. |
Step 1: Ensure That You Have Prepared Office 365
Step 2: In Azure, Create and Configure an Application Registration
Step 3: In Riva, Enter the OAuth Client Secret-Based Connection Details
-
In the Riva Manager application, on the menu bar, select Setup.
-
In the left pane, under Connection Wizards, select Microsoft Office 365.
-
On the wizard's Welcome page, select Next.
-
On the Connection Details page that appears, select OAuth Client Secret.
- If you select User Credentials, follow the instructions at Create a user credentials-based Office 365 connection.
-
If you select OAuth Certificate, refer to the instructions at Create a certificate-based Office 365 OAuth connection.
-
Enter the connection details required by the OAuth Client Secret-based connection.
- E-mail Address: The primary email address for the Riva connection account.
- Tenant ID: The Directory ID obtained from Azure.
- Application ID: The ID of the Azure Application Registration that was created for the connection.
- Reply URL: The Home page URL obtained from Azure.
- Client Secret: The security key generated in Azure.
-
Use Proxy: Required only if you need to deploy proxy services. For more information, see Configure "Use Proxy" settings in email connections.
-
Select Next.
-
If the Office 365 connection has been successfully created, select Finish. If not, contact the Riva Success Team.
Step 4: Test the Connection
For instructions, see Testing the Office 365 connection.