To Configure the Web.Config File for Integration with Microsoft Entra ID
After you have registered your MYOB Acumatica instance with Microsoft Entra and obtained the necessary credentials, you should enable the integration with Microsoft Entra ID for your MYOB Acumatica instance.
Before You Begin
- Register your MYOB Acumatica instance on the Microsoft Entra ID portal, as described in To Configure Microsoft Entra ID for Integration with Your MYOB Acumatica Instance.
- Be sure that you have a plain-text editor for editing the web.config file.
To Enable Microsoft Entra ID for the MYOB Acumatica Instance
- Open the web.config file, which is located in the folder that
contains the application instance website.Important: When you save changes to the web.config file, the website is automatically restarted. Make sure that all users have been warned about the restart so that they can save their work in advance.
- In the file, find the
activeDirectorysection within thesystem.websection, and modify it to be similar to the following example.<activeDirectory enabled="true" protocol="MicrosoftGraph" path="Azure_Instance_Tenant_ID" dc="Azure_Domain_Name" user="ApplicationClientID" password="ClientSecret" />Note the following about the code shown above:
Azure_Instance_Tenant_IDis the identifier of the Azure ID instance where your application is registered.Azure_Domain_Nameis the Active Directory primary domain name—for example, ad.domain. This value is specified in Active Directory by an administrator.ApplicationClientIDis the client ID that you obtained and copied when you registered your MYOB Acumatica application on the Azure instance.ClientSecretis the client secret that you obtained and copied when you configured your Azure instance for integration with your MYOB Acumatica instance.
The following example shows the code you would use with sample parameter values.
<activeDirectory enabled="true" protocol="MicrosoftGraph" path="6b780bc5-ae33-4d54-80c0-8a6c4da1bf86" dc="acumqahotmail.onmicrosoft.com" user="b3f59ed5-70af-41de-94a7-13fe296a79cb" password="AR97Q~tLWmFLUxUjkZe33yEGGWRAnctTOz0uh" /> - In the
audienceUriselement within thesystem.identityModelsection, specify the URL of your MYOB Acumatica instance, as shown in the following example.<audienceUris> <add value="Full_Acumatica_Instance_URL" /> </audienceUris>In the code shown above,
Full_Acumatica_Instance_URLis the full URL of your MYOB Acumatica instance—for example, https://app.site.net/instance_name, http://localhost/Acumatica192000078,or api://<Application_Client_ID>.Attention: The value of theaudienceUriselement should be the same as the Application ID URI that you have specified on the Microsoft Azure Portal. - In the
federationConfigurationelement within thesystem.identityModel.servicessection, modify its childwsFederationelement to be similar to the following example.
In the code shown above,<federationConfiguration> <wsFederation passiveRedirectEnabled="false" issuer="https://login.windows.net/Azure_Instance_Tenant_ID/wsfed" realm="Full_Acumatica_Instance_URL" requireHttps="false" PersistentCookiesOnPassiveRedirects="false"/> </federationConfiguration>Full_Acumatica_Instance_URLis the full URL of your MYOB Acumatica instance—for example, https://app.site.net/instance_name, http://localhost/Acumatica192000078,or api://<Application_Client_ID>.Attention: During the configuration of the application ID URI, you may have used the default scheme provided by Microsoft Entra ID, with the value ofFull_Acumatica_Instance_URLhaving theapi://<Application_Client_ID>format. In this case, you should also add the following line to thewsFederationelement:reply="Acumatica_Redirect_URI", whereAcumatica_Redirect_URIis the redirect URI that you have specified in the Microsoft Azure Portal. - Save the web.config file. The website restarts automatically.
After you have enabled integration with Microsoft Entra ID, you need to map its groups to MYOB Acumatica roles, as described in To Map Microsoft Entra ID Groups to Roles in MYOB Acumatica.
