Deutsch
|
English

Set up Azure Active Directory login (OAuth)

FM-Portal

IC2610
FM-Portal

Your organization can sign in to the eTASK.FM portal using an existing Microsoft account. Click here to learn how to set up sign-in via Microsoft Entra ID (OAuth).

Prerequisites

  • You have administrative rights in both your Office account and the eTASK.FM portal.

Procedure in the FM Portal

  1. Log in to https://portal.azure.com using your Microsoft credentials.

  2. Click on Microsoft Entra ID.

Azure portal menu showing Microsoft Entra ID icon highlighted among other service icons like Storage accounts and Monitor
Azure portal menu showing Microsoft Entra ID icon highlighted among other service icons like Storage accounts and Monitor

  1. In the menu on the left, click App Registrations and then New Registration.

Azure portal app registrations page showing 6 applications and
Azure portal app registrations page showing 6 applications and "New registration" button highlighted

  1. Give the application a name of your choice. For supported account types, select the option "Accounts in
    any organizational directory (any Azure AD directory - multi-tenant capable)". Under "Redirect
    URI," select "Single-Page Application (SPA)" and enter the URL
    of your organization’s eTASK.FM portal in the right-hand pane. Add the
    text "/neon/App.Etask/default.aspx" as shown in the screenshot. Finally, click Register.

Application registration form with name input
Application registration form with name input "release.etask.de" and account type selection for Microsoft Entra ID tenant access

  1. Click on "Token Configuration" in the menu on the left. Under "Token Type," select "SAML" and "email" in the table
    below.

Screenshot of SAML token configuration interface with tokentyp selection and claim checkboxes for email and other attributes
Screenshot of SAML token configuration interface with tokentyp selection and claim checkboxes for email and other attributes

  1. Enable the "Enable the Microsoft Graph permission 'email'" option as shown in the
    screenshot, then click Add.

Checkbox to activate Microsoft Graph
Checkbox to activate Microsoft Graph "email" permission, with "Add" and "Cancel" buttons and info link for OpenID Connect configuration

  1. Log in to your eTASK.FM portal and go to Control Panel - Portal Options - Portal
    Management - System Configuration. Open the system parameters "AZURECLIENTID" and
    "AZURETENANT". Open the app you just created at http://portal.azure.com and go to the Overview.

  1. You can find the value for the system parameter "AZURECLIENTID" in the overview as
    "Application ID (Client)". Enter the ID listed there as the
    configuration value in the parameter and click Save in the toolbar.

  2. You can find the value for the system parameter "AZURETENANTID" in the overview as
    "Directory ID (Tenant)". Enter the ID stored there as the configuration value in the
    parameter and click Save in the toolbar.

  3. Open the system parameter "AZURELOGINAKTIV". Enter a 1 in the Value field. Click Save in
    the toolbar.

Note: If the value of this system parameter is 1 and a value is present in the "AZURECLIENTID" parameter, the Azure button will be displayed on the login screen.

All accounts stored in Microsoft Entra ID can now log in to the eTASK.FM portal using their Microsoft account.

For information on setting up email retrieval and Modern Authentication, see here: 📄 Mailabruf mit Daten aus Microsoft Entra ID konfigurieren IC2657

War dieser Artikel hilfreich?