How to register NoSpamProxy in Microsoft Azure
To set up automatic user import via Azure Active Directory in NoSpamProxy, NoSpamProxy must be registered as an app in the Azure portal.
Registering NoSpamProxy
- Go to portal.nospamproxy.com.
- Go to Azure Active Directory > App Registrations.
- Click New registration.
- Enter a name for the app, for example NoSpamProxy.
- For the account type, select Accounts in any organizational directory (any Azure AD directory - Multitenant).
- Select Web as the type for the redirection URIs and enter the following URIs:https://www.nospamproxy.de/de/admin-consent-redirect/https://www.nospamproxy.de/en/admin-consent-redirect/
- Click Register.
The app registration is now complete. The following overview page displays details of your app registration.
NOTE: You need the Application ID (Client ID) and the Directory ID (Tenant ID) to connect to the Azure Active Directory in NoSpamProxy.
Adding API permissions
In order to use the automatic user import, you must authorize NoSpamProxy to call certain APIs.
- Open the overview page of the app.
- Go to API permissions.
- Click Add a permission.
- Click Microsoft Graph.
- Click Application permissions.
- From the menu, select Group.Read.All, User.Read.All and User.Read.
- Click Grant admin consent for "YourCompany".
Uploading the certificate
NoSpamProxy identifies itself to the authentication service when receiving tokens at a web addressable location (using an HTTPS scheme). You can upload the certificate required for authentication here.
- Open the overview page of the app.
- Go to Certificates and secrets.
- Click Upload certificate.
- Select the certificate you want to use. You can use the self-signed certificate that was created when NoSpamProxy was installed or another certificate that is suitable for client authentication.
- Click Add. After uploading the certificate, the fingerprint, start date and expiry date are displayed.
NOTE: The certificate that you upload in the Azure Active Directory must be imported in NoSpamProxy under Identities > Certificates. The certificate must not additionally be present in the Windows certificate store. See Importing certificates.