How to register NoSpamProxy in Microsoft Azure
To set up automatic user import via Azure Active Directory in NoSpamProxy, NoSpamProxy must be registered as an app in the Azure portal.
Registering NoSpamProxy
- Go to portal.nospamproxy.com.
- Go to Azure Active Directory > App Registrations.
- Click New registration.
- Enter a name for the app, for example NoSpamProxy.
- For the account type, select Accounts in any organizational directory (any Azure AD directory - Multitenant).
- Select Web as the type for the redirect URIs and enter the following URIs:
NoSpamProxy Server version 15.2 or lower:
https://www.nospamproxy.de/de/admin-consent-redirect/https://www.nospamproxy.de/en/admin-consent-redirect/
NoSpamProxy Server Version 15.4 oder höher:
https://NoSpamProxy_Web_App_Addresse:6061/odata/v4/AutomaticUserImports/ContinueAzureAdminConsenthttps://NoSpamProxy_Web_App_Addresse:6061/odata/v4/AutomaticUserImports/ConcludeAzureAdminConsentNOTE: Replace NoSpamProxy_Web_App_Addresse:6061 with the corresponding value of your NoSpamProxy Web App configuration. You can also query the necessary information via the Powershell with Get-NspWebApiConfiguration.
NOTE: It is not necessary to make these URIs publicly available.
- Click Register.
The app registration is now complete. The following overview page displays details of your app registration.
NOTE: You need the application ID (client ID) to establish the connection to the Azure Active Directory in NoSpamProxy.
Adding API permissions
In order to use the automatic user import, you must authorize NoSpamProxy to call certain APIs.
- Open the overview page of the app.
- Go to API permissions.
- Click Add a permission.
- Click Microsoft Graph.
- Click Application permissions.
- From the menu, select Group.Read.All, User.Read.All and User.Read.
- Click Grant admin consent for "YourCompany".
Importing the certificate into NoSpamProxy
- Import the TLS certificate and the private key into the Windows certificate store of the Intranet Role.
-
In the certificate store, right-click the imported TLS certificate and select All Tasks > Manage Private Key.
- Add the Intranet Role via Add > Object name "nt service\NoSpamProxyIntranetRole" and "nt service\NoSpamProxyWebApp" and give it read permission for the key.
Importing the certificate into the Azure AD
NoSpamProxy identifies itself to the authentication service when receiving tokens at a web addressable location (using an HTTPS scheme). You can upload the certificate required for authentication here.
- Open the overview page of the app.
- Go to Certificates and secrets.
- Click Upload certificate.
- Select the certificate you want to use. You can use the self-signed certificate that was created when NoSpamProxy was installed or another certificate that is suitable for client authentication.
- Click Add. After uploading the certificate, the fingerprint, start date and expiry date are displayed.