JDBC Driver for Microsoft Dataverse

Build 22.0.8462

Creating a Custom AzureAD Service Principal App

Creating a custom AzureAD application and a service principal that can access the necessary resources is required when authenticating using an Azure Service Principal.

Follow the steps below to create a custom AzureAD application and obtain the connection properties for the Azure Service Principal authentication.

Steps to Create an AzureAD SP App

Follow the steps below to obtain the AzureAD values for your app.

  1. Log in to https://portal.azure.com.
  2. In the left-hand navigation pane, select Azure Active Directory > App Registrations and click New registration.
  3. Enter an application name and set the radio button for "Any Azure AD Directory - Multi Tenant". Then set the redirect url to something such as http://localhost:33333, the driver's default.
  4. After creating the app, copy the Application (client) Id value displayed in the "Overview" section, since this value is used as the OAuthClientId
  5. Define the application authentication type by going to the "Certificates & Secrets" section. There are two types of authentication available: client secret and certificate. The recommended authentication method is via a certificate.
    • Option 1 - Upload a certificate: In "Certificates & Secrets", select Upload certificate and the certificate to upload from your local machine.
    • Option 2 - Create a new application secret: In "Certificates & Secrets", select New Client Secret for the application and specify its duration. After saving the client secret, the key value is displayed. Copy this value since it is displayed only once. You will use it as the OAuthClientSecret.
  6. On the Authentication tab, make sure to select the option Access tokens (used for implicit flows).

Copyright (c) 2023 CData Software, Inc. - All rights reserved.
Build 22.0.8462