OAuth 2.0 Configuration for MS Exchange
This support article provides instructions for configuring EMS Exchange Integration Web Service (EIWS) to access 365 mailboxes using OAuth with Microsoft Exchange Web Services.
Until now, Provar had been using basic authentication for Microsoft Exchange Web Service (EWS). Provar users can now access Microsoft Emails using OAuth 2.0 using Microsoft (EWS) by creating a new connection or updating an existing connection. And, they can use Send, Subscribe and Receive Message Test APIs with Microsoft Exchange for emails.
Provar Application registration in Azure Active Directory (AD)
To register an application in Azure AD:
- Log into aad.portal.azure.com with the appropriate admin account.
- Click Azure Active Directory in the menu.
- Under the Manage section, click App registrations.
- Click New registration.
- In the Name field, enter a name to register the new application.
- Set Supported account types as appropriate.
- Click Register.
The Provar Application is registered.
Configure permissions in Azure Active Directory
To configure permissions in the Azure Active Directory:
1. In App registrations, select the application registered in the previous section.
2. Under Manage, click API Permissions.
3. Click Add a permission.
4. Under APIs my organization uses, type “office” in the search box and select Office 365 Exchange Online.
5. Under Applications permissions select full_access_as_app (Application) and EWS.AccessAsUser.ALL (Delegated).
If you previously created an application for Exchange-to-EMS Synchronization for EMS for Microsoft Exchange (formerly Exchange Room Integration), you can add the full_access_as_app and EWS.Access.AsUser.ALL permission to your existing application.
6. Click Done.
7. Under Grant Consent, select Grant admin consent for (your domain here).
8. Select Yes. The permissions are displayed in a list.
9. Under Manage, click Certificates & secrets.
10. Select New Client Secret. In the Expire field, select an appropriate expiration duration. Click Save.
11. A value is displayed. Copy this value and make a note since this is the only time this value is displayed.
12. From the Overview section, copy the Application ID and Tenant ID to add to the EMS configuration.
13. To get the Redirect URI, click on Redirect URIs as shown in the above screenshot.
14. Click Add a Platform.
15. Select Web from the Web Application section.
16. Enter the Redirect URI for e.g. https://oauth.pstmn.io/v1/browser-callback
18. Click Configure. The screenshot given below shows the Redirect URI.
- General information
- Licensing Provar
- Provar trial guide and extensions
- Using Provar
- API testing
- Behavior-driven development
- Creating and importing projects
- Creating test cases
- Custom table mapping
- Functions
- Debugging tests
- Defining a namespace prefix on a connection
- Defining proxy settings
- Environment management
- Exporting test cases into a PDF
- Exporting test projects
- Override auto-retry for Test Step
- Managing test steps
- Namespace org testing
- Provar desktop
- Provar Test Builder
- Refresh and Recompile
- Reload Org Cache
- Reporting
- Running tests
- Searching Provar with find usages
- Secrets management and encryption
- Setup and teardown test cases
- Tags and Service Level Agreements (SLAs)
- Test cycles
- Test plans
- Testing browser options
- Tooltip testing
- Using the Test Palette
- Using custom APIs
- Callable tests
- Data-driven testing
- Page objects
- Block locator strategies
- Introduction to XPaths
- Creating an XPath
- JavaScript locator support
- Label locator strategies
- Maintaining page objects
- Mapping non-Salesforce fields
- Page object operations
- ProvarX™
- Refresh and reselect field locators in Test Builder
- Using Java method annotations for custom objects
- Applications testing
- DevOps
- Introduction to test scheduling
- Apache Ant
- Configuration for Sending Emails via the Provar Command Line Interface
- Continuous integration
- AutoRABIT Salesforce DevOps in Provar Test
- Azure DevOps
- Running a Provar CI Task in Azure DevOps Pipelines
- Configuring the Provar secrets password in Microsoft Azure Pipelines
- Parallel Execution in Microsoft Azure Pipelines Using Multiple build.xml Files
- Parallel Execution in Microsoft Azure Pipelines using Targets
- Parallel execution in Microsoft Azure Pipelines using Test Plans
- Bitbucket Pipelines
- CircleCI
- Copado
- Docker
- Flosum
- Gearset DevOps CI/CD
- GitHub Actions
- Integrating GitHub Actions CI to Run Provar CI Task
- Remote Trigger in GitHub Actions
- Parameterization using Environment Variables in GitHub Actions
- Parallel Execution in GitHub Actions using Multiple build.xml Files
- Parallel Execution in GitHub Actions using Targets
- Parallel Execution in GitHub Actions using Test Plan
- Parallel Execution in GitHub Actions using Job Matrix
- GitLab Continuous Integration
- Travis CI
- Jenkins
- Execution Environment Security Configuration
- Provar Jenkins Plugin
- Parallel Execution
- Running Provar on Linux
- Reporting
- Salesforce DX
- Git
- Team foundation server
- Version control
- Salesforce testing
- Adding a Salesforce connection
- Assert Page Error Messages on Add/Edit Product
- Dynamic Forms
- Internationalization support
- List and table testing
- Salesforce Release Updates
- Salesforce Lightning Testing
- Salesforce Lightning Web Component (LWC) locator support
- Salesforce console testing
- Visualforce Testing
- Performance Best Practices
- Testing best practices
- Troubleshooting
- Browsers
- Configurations and permissions
- Connections
- DevOps
- Error messages
- Administrator has blocked access to client
- JavascriptException: Javascript error
- macOS Big Sur Upgrade
- Resolving failed to create ChromeDriver error
- Resolving Jenkins license missing error
- Resolving metadata timeout errors
- Test execution fails – Firefox not installed
- Update to Opportunity field validation behaviour
- Licensing, installation and firewalls
- Memory
- Test Builder and test cases
- Release notes