JDBC Driver for Vault CRM

Build 25.0.9434

Updating Your Custom Entra ID (Azure AD) Application

Updating Your Custom Entra ID (Azure AD) Application

If you already have a previously-created application that has been used to configure the Entra ID (Azure AD) provider for your Vault CRM data source, you need to update it to include a redirect URL. This enables the driver to retrieve the verifier code from the opened browser tab and complete the flow.

The following section describes how to do this, and to obtain the OAuth OAuthClientId and OAuthClientSecret values for your application.

Procedure

At https://portal.azure.com:

  1. In the left-hand navigation pane, select Azure Active Directory > App Registrations.
  2. Find the application you had previously created for use with the Azure AD Authentication Provider.
  3. From the Overview section, copy the Application (client) Id which corresponds to the OAuthClientId property.
  4. In the Certificates & Secrets section, either define a new application authentication type or use the one that already exists. The two authentication choices are using a client secret and using a certificate (recommended).
    • Option 1 - Upload a certificate: In the Certificates & Secrets section, select Upload certificate and select the certificate to upload from your local machine.
    • Option 2 - Create a new application secret: In the Certificates & Secrets section, select New Client Secret for the app and select its duration. After saving the client secret, the key value is displayed. Copy this value as it is displayed only once, and it is used as the OAuthClientSecret.
  5. In the Authentication section, under Redirect URIs of the existing Web platform, you can add a new redirect URL to something such as http://localhost:33333, the driver's default. Otherwise, set a different port of your choice and set CallbackURL to the exact reply URL you defined.
  6. Save your changes.

Copyright (c) 2025 CData Software, Inc. - All rights reserved.
Build 25.0.9434