iService includes two integrations to Microsoft that require separate configurations: Sign in with Microsoft and Graph API. The Sign in With Microsoft configuration is an OpenID Connect integration that support single sign-on using your Microsoft login credentials. The Graph API configuration is used for any mailboxes that use the Microsoft Graph API protocol for reading and sending email.
The Microsoft OpenID integration supports two methods for authentication: personal accounts or Azure accounts. In both cases, add your Azure Client ID here (Azure Client Id is the Active Directory Application Id). The Azure Client Id is the unique identifier of an application created in Active Directory. You can have many applications create within Active Directory, and each application will have a different access level that is defined in your Azure tenant. This is a required field for using both methods of Microsoft OpenID authentication. When the Azure Client ID is used without the Azure Tenant ID, agents can use any Microsoft account for authentication (including personal accounts like Hotmail).
Add the Azure Tenant ID to limit access to your Azure users
You can limit agents to their Azure login by adding your Azure Tenant ID.
Creating Azure credentials for iService
Microsoft Graph API mailboxes are configured differently from other protocols. For other protocols, user credentials are entered for each mailbox configuration. For Graph API mailboxes, however, you enter your security credentials in the External APIs page only. The credentials are not entered in the Segment Mailbox configurations pages. When using Graph API, the first step is to create an application within your Azure configuration that will contain the various mailboxes. You will use the values created from that setup to complete the settings shown above.
The Graph API integration values must be entered before any of your Graph API mailboxes may be configured.
Creating your Microsoft Graph API credentials
Locking down Microsoft Graph API for security