Hi Community Members,
I am facing issue in generating authorization code for office365 application in azure. I am following official fortisoar documents for O365 connector but their is something wrong with the provided URL, upon providing tenant id and client id its showing error. Can someone pass me the correct URL for generating the code. thanks in advance.
Solved! Go to Solution.
Hello @khanchand
Thank you for reaching out. You can use the same URL as shared in the connector guide.
This is a complete URL that needs to be submitted in the browser after replacing the tenant and client ID. It will return a different URL, use the same redirected URL, and copy the code as mentioned in the below guide.
Connector document Guide:
https://docs.fortinet.com/document/fortisoar/4.2.1/exchange/618/exchange-v4-2-1
Link to generate Auth code:
https://login.microsoftonline.com/<tenantid>/oauth2/v2.0/authorize?response_type=code&scope=offline_access https://outlook.office365.com/EWS.AccessAsUser.All&client_id=<client-id>&response_mode=query&grant_type=authorization_code
Hello @khanchand
Thank you for reaching out. You can use the same URL as shared in the connector guide.
This is a complete URL that needs to be submitted in the browser after replacing the tenant and client ID. It will return a different URL, use the same redirected URL, and copy the code as mentioned in the below guide.
Connector document Guide:
https://docs.fortinet.com/document/fortisoar/4.2.1/exchange/618/exchange-v4-2-1
Link to generate Auth code:
https://login.microsoftonline.com/<tenantid>/oauth2/v2.0/authorize?response_type=code&scope=offline_access https://outlook.office365.com/EWS.AccessAsUser.All&client_id=<client-id>&response_mode=query&grant_type=authorization_code
Thanks Jankit,
It worked, appreciate you support.
Created on 10-08-2023 09:53 AM
Here are the general steps to generate an authorization code:
Register Your Application in Azure Portal:
Configure Authentication Settings:
Generate Authorization Code:
To generate an authorization code, you typically need to construct an authorization URL, which includes your client ID, the required permissions (scope), and the authorization endpoint. The URL should look something like this (but may vary depending on your specific configuration):
{tenant_id}
: Replace with your Azure AD tenant ID.{client_id}
: Replace with your application's client ID.{redirect_uri}
: Replace with your specified redirect URI.{scopes}
: Specify the necessary scopes or permissions required for your application.Access the URL:
Please let us know if this helps.
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.