Creating an Office 365 Association for Server Connections

Document created by user.oxriBaJeN4 Employee on Jan 17, 2017Last modified by user.oxriBaJeN4 Employee on Feb 8, 2017
Version 8Show Document
  • View in full screen mode

This guide describes the steps required to create an association between your Mimecast and Office 365 for cloud synchronization server tasks.

 

What You'll Need

 

  • Administrative access to the Azure Active Directory Management Portal.

 

Walkthrough

 

To create an Office 365 association:

  1. Log in to the Azure Active Directory Management Portal (e.g. https://manage.windowsazure.com)
  2. Click on the Active Directory | <DIRECTORY NAME> | Applications menu item.
    (where <DIRECTORY NAME> is the name of your Active Directory).
  3. Click on the Add button at the bottom of the page.



  4. Click on the Add an Application My Organization is Developing option.
  5. Complete the Add Application dialog as follows:

    Field / OptionDescription
    NameEnter a name for the application (e.g. Mimecast Cloud Synchronization).
    TypeSelect the Web Application and/or Web API option.
  6. Click on the Next icon icon in the bottom right hand corner.
  7. Complete the App Properties dialog as follows:

    Field / OptionDescription
    Sign-on URLEnter the sign on URL (e.g. http://localhost).
    App Id URLEnter the application id URL (e.g. http://localhost/app).
  8. Complete the wizard.
  9. Click on the Configure tab of the newly created application.
  10. Make a note of the:
    • Client ID displayed at the bottom of the page.

      Client Id
    • Tenant Domain displayed in the browser's URL bar (e.g. https://manage.windowsazure.com/tenant.onmicrosoft.com).
  11. Click on the Manage Manifest button at the bottom of the page.
  12. Click on the Download Manifest menu item.

    Manage Manifest
  13. Edit the manifest in a text editor.
  14. Replace the text in the keyCredentials section with the text below. This contains the public key corresponding to the private key used by the Mimecast application:
    "keyCredentials": [

            {

              "customKeyIdentifier": "1N9EZLBeqS9JkNwLr4JQX9VhrdI=",

              "keyId": "a2d4c31d-cca7-4262-9418-e1a9c1ee0492",

              "type": "AsymmetricX509Cert",

              "usage": "Verify",

              "value":                 "MIIDtTCCAp2gAwIBAgIEbvdztDANBgkqhkiG9w0BAQsFADCBijELMAkGA1UEBhMCR0IxEDAOBgNVBAgTB0VuZ2xhbmQxDzANBgNVBAcTBkxvbmRvbjEiMCAGA1UEChMZTWltZWNhc3QgU2VydmljZXMgTGltaXRlZDEQMA4GA1UECxMHVW5rbm93bjEiMCAGA1UEAxMZTWltZWNhc3QgU2VydmljZXMgTGltaXRlZDAeFw0xNTA4MDcxNTA3MDBaFw0yNTA4MDQxNTA3MDBaMIGKMQswCQYDVQQGEwJHQjEQMA4GA1UECBMHRW5nbGFuZDEPMA0GA1UEBxMGTG9uZG9uMSIwIAYDVQQKExlNaW1lY2FzdCBTZXJ2aWNlcyBMaW1pdGVkMRAwDgYDVQQLEwdVbmtub3duMSIwIAYDVQQDExlNaW1lY2FzdCBTZXJ2aWNlcyBMaW1pdGVkMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAtx+o812952m2gYkMxZ5e/j56IGPyaw62pZMJbkZ54K6ljARHg6bFWvW56ceY2UyYwA4G+tAI1eSRUSIRWAYLRe30TxuB4eUoxPG/4yDtmSRJXNoqzRfX1x2O+VWQRy9KLVh2FEUcWIYiBUn05lM7ku/xgJcKTPYkami4TaHZ1z07IjqStRGYYbGPa9udWJTQd8wRlrdP44GdJXCUa3P2jGeXG3LBkrdv1HH7PDAg/k0TJbCm4ObBJOMwR5wg2jkLWPd13wIG0oZy7qiCCz449Z2NqIh91NB+TaMROEhWTuf1hnAPPi3H7sVydYLFkG/QZT+z7YeDKukaPGpXlQ639QIDAQABoyEwHzAdBgNVHQ4EFgQUmm0e0xgGpZDapiW5Tb2C3PZnDvwwDQYJKoZIhvcNAQELBQADggEBAJ4OrFe770VLdzUf+cs3khWYb54vXNdjNqaL/mgnZ6fUqsyMGe6Yt8IBa1HoTnXgVhod7i+ikXvU0SA6LxqtyAw3zVDz82dUqkhU6ufLDwicYnZ5vqh22SYGkoQa9aVYFq9cq8vdKaJ1APfHxYrWsamnvXkAtipvYG2nnvGf7Sr/Xctr5Vtmrs3n0ZATVOh/zf1mAY0JwLPbMiQs/fIVgBsBbE73E1HcG1s8G8NiyLhMYy+l7FTUlfdZtRVdoBQKTvgwe2kMFdPq58XkJUqvQCkmlDkjw4N19PPi2+ok+eWZNjzkyoielhpjEi97GVnFPeQi5TeOdmyqOlhXrH36Jmo="

            }

         ],

                
  15. Save the edited manifest.
  16. Click on the Upload Manifest menu item.

    Upload Manifest
  17. Grant the following permission. This allows the Mimecast application to impersonate any user via the Exchange Web Services.
    Azure EWS Impersonation.png

 

See Also...

 

Attachments

    Outcomes