Microsoft Dynamics 365 Business Central

Version 24.3.9120


Microsoft Dynamics 365 Business Central


You can use the Microsoft Dynamics 365 Business Central connector from the CData Sync application to capture data from Microsoft Dynamics 365 Business Central and move it to any supported destination. To do so, you need to add the connector, authenticate to the connector, and complete your connection.

Add the Microsoft Dynamics 365 Business Central Connector

To enable Sync to use data from Microsoft Dynamics 365 Business Central, you first must add the connector, as follows:

  1. Open the Connections page of the Sync dashboard.

  2. Click Add Connection to open the Select Connectors page.

  3. Click the Sources tab and locate the Microsoft Dynamics 365 Business Central row.

  4. Click the Configure Connection icon at the end of that row to open the New Connection page. If the Configure Connection icon is not available, click the Download Connector icon to install the Microsoft Dynamics 365 Business Central connector. For more information about installing new connectors, see Connections.

Authenticate to Microsoft Dynamics 365 Business Central

After you add the connector, you need to set the required properties.

  • Connection Name - Enter a connection name of your choice.

  • Organizational URL - Enter the URL to your Dynamics 365 organization (for example, https://businesscentral.dynamics.com/YourAccount/).

CData Sync supports authenticating to Microsoft Dynamics 365 Business Central in several ways. Select your authentication method below to proceed to the relevant section that contains the authentication details.

Access Key

To connect with an access key, specify the following properties:

  • Auth Scheme - Select AcessKey.

  • User - Enter the username that you use to authenticate to your Microsoft Dynamics 365 Business Central account.

  • Access Key - Enter the access key that you use to authenticate to Microsoft Dynamics 365 Business Central.

Azure Active Directory

To connect with an Azure Active Directory (AD) user account, select Azure AD for Auth Scheme. CData Sync provides an embedded OAuth application with which to connect so no additional properties are required.

Azure Service Principal

To connect with an Azure service principal and client secret, set the following properties:

  • Auth Scheme - Select AzureServicePrincipal.

  • Azure Tenant - Enter the Microsoft Online tenant to which you want to connect.

  • OAuth Client Id - Enter the client Id that you were assigned when you registered your application with an OAuth authorization server.

  • OAuth Client Secret - Enter the client secret that you were assigned when you registered your application with an OAuth authorization server.

To obtain the OAuth client Id and client secret for your application:

  1. Log in to the Azure portal.

  2. In the left navigation pane, select All services. Then, search for and select App registrations.

  3. Click New registrations.

  4. Enter an application name and select Any Azure AD Directory - Multi Tenant. Set the redirect URI to the value that is specified for CallbackURL.

  5. After you create the application, copy the application (client) Id value that is displayed in the Overview section. Use this value as the OAuth client Id.

  6. Navigate to the Certificates & Secrets section and select New Client Secret for the application.

  7. Specify the duration and save the client secret. After you save it, the key value is displayed.

  8. Copy this value because it is displayed only once. You will use this value as the OAuth client secret.

  9. On the Authentication tab, make sure to select Access tokens (used for implicit flows).

Azure Service Principal Certificate

To connect with an Azure service principal and client certificate, set the following properties:

  • Auth Scheme - Select AzureServicePrincipalCert.

  • Azure Tenant - Enter the Microsoft Online tenant to which you want to connect.

  • OAuth Client Id - Enter the client Id that you were assigned when you registered your application with an OAuth authorization server.

  • OAuth JWT Cert – Enter your Java web tokens (JWT) certificate store.

  • OAuth JWT Cert Type – Enter the type of key store that contains your JWT Certificate. The default type is PEMKEY_BLOB.

  • OAuth JWT Cert Password (optional) – Enter the password for your OAuth JWT certificate.

  • OAuth JWT Cert Subject (optional) – Enter the subject of your OAuth JWT certificate.

To obtain the OAuth certificate for your application:

  1. Log in to the Azure portal.

  2. In the left navigation pane, select All services. Then, search for and select App registrations.

  3. Click New registrations.

  4. Enter an application name and select Any Azure AD Directory - Multi Tenant. Set the redirect URI to the value that is specified for CallbackURL.

  5. After you create the application, copy the application (client) Id value that is displayed in the Overview section. Use this value as the OAuth client Id.

  6. Navigate to the Certificates & Secrets section and select Upload certificate. Then, select the certificate to upload from your local machine.

  7. Specify the duration and save the client secret. After you save it, the key value is displayed.

  8. Copy this value because it is displayed only once. You will use this value as the OAuth client secret.

  9. On the Authentication tab, make sure to select Access tokens (used for implicit flows).

Azure Managed Service Identity

To leverage Azure Managed Service Identity (MSI) when CData Sync is running on an Azure virtual machine, select Azure MSI for Auth Scheme. No additional properties are required.

NT LAN Manager

To connect with NT LAN Manager (NTLM) user credentials, select NTLM for Auth Scheme. No additional properties are required.

Negotiate

To connect with Kerberos credentials, specify the following properties:

  • Auth Scheme – Select Negotiate.

  • Kerberos KDC - Enter the Kerberos Key Distribution Center (KDC) service that you use to authenticate.

  • Kerberos Realm - Enter the Kerberos 5ealm that you use to authenticate.

  • Kerberos SPN - Enter the service principal name (SPN) for the Kerberos domain controller.

  • Kerberos Keytab File (optional) - Enter the path to the keytab file that contains your pairs of the Kerberos principals and encrypted keys.

  • Kerberos Ticket Cache (optional) - Enter the full path to an MIT Kerberos credential cache file. Sync uses the specified cache file to obtain the Kerberos ticket that is required to connect to Microsoft Dynamics 365 Business Central.

Complete Your Connection

To complete your connection:

  1. (Optional) For Company, enter the name of the company that you want to use for Microsoft Dynamics 365 Business Central.

  2. Define advanced connection settings on the Advanced tab. (In most cases, though, you should not need these settings.)

  3. If you authenticate with AzureAD, click Connect to Microsoft Dynamics 365 Business Central to connect to your Microsoft Dynamics 365 Business Central account.

  4. Click Create & Test to create your connection.

More Information

For more information about interactions between CData Sync and Microsoft Dynamics 365 Business Central, see Microsoft Dynamics 365 Business Central Connector for CData Sync.