Setup Azure AD/Entra ID for MyWorkDrive


Azure AD/Entra ID for MyWorkDrive Setup Guide

MyWorkDrive 7 Server or higher Required:

MyWorkDrive Server supports native Azure AD/Entra ID for user authentication as an alternative to Active Directory.  Authentication works by utilizing an Entra ID App registration with permissions to view users and groups in active directory.

There are three options for the Entra ID App registration with MyWorkDrive.

Option 1, MyWorkDrive server may be configured to trust and use our shared MyWorkDrive Auth app registration This uses an App registration hosted by MyWorkDrive and requires you to permit cross tenant apps in your tenant.

Or, use a custom Tenant Only App Registration in your Azure tenant. There are two options to setup a Tenant Only App Registration.

Option 2, Use the setup wizard to create a custom Azure App Registration in your tenant. This will create an Azure App Registration in your tenant your MyWorkDrive server will use. It does not use a hosted app like Option 1.

Option 3, Manually create your own App in your Azure tenant for your MyWorkDrive server to use. This produces the same outcome as Option 2, an app in your own tenant (nothing cross tenant), it is simply done manually.

In our Server post Setup Wizard we offer the option to choose the prefered option.

Note that you intend to publish MyWorkDrive with your own host name, you have the hostname fully configured to complete the setup wizard.

If you are not prepared to configure your own hostname, you can use our build in Cloud Web Connector to publish your server. You can always move to your own hostname later. See Publishing your MyWorkDrive Server for additional options and details.

API Permissions

The permissions recommended for your app in Azure in the chart below support the common functions MyWorkDrive accesses in Azure.

-Entra ID Identity for Authentication
-Data Storage for OneDrive/SharePoint
-Office Online Editing with Office 365 and OneDrive/SharePoint for temporary storage
-Azure Storage (Azure File Shares, Azure Blob)

They are what is used in the MyWorkDrive managed App, what is setup in the automated setup option, and what we recommend you setup if choosing the manual setup option.

API Permission Type Description
Azure Storage
user_impersonation Delegated Access Azure Storage
Microsoft Graph
email Delegated View users' email address
Files.ReadWrite Delegated Have full access to user files
Files.ReadWrite.All Delegated Have full access to all files user can access
Group.Read.All Application Read all groups
GroupMember.Read.All Application Read all group memberships
GroupMember.Read.All Delegated Read group memberships
offline_access Delegated Maintain access to data you have given it access to
openid Delegated Sign users in
profile Delegated View users' basic profile
Sites.Read.All Delegated Read items in all site collections
User.Read Delegated Sign in and read user profile
User.Read.All Application Read all users' full profiles
SharePoint
MyFiles.Write Delegated Read and write user files

Reply URIs

Serveral reply URIs are required for proper functioning of your App Registration. If you use the wizard to create an app in your tenant (Option 2), or choose to manually create your own App (Option 3), please make sure these 5 URIs are present on the Authentication page of your app. The base domain of the URI will be the public URL of your MyWorkDrive server.

URI Usage
https://your-server.example.com/ Logins from the home page
https://your-server.example.com/GraphAPITokenPage.aspx Logins generated dynamically by the application for token renewals, access to storage
https://your-server.example.com/OfOnShPo/Home/SignInRedirect Logins used in the Web client or when editing with office online
https://www.myworkdrive.com/success-azure-app-registration-approval Approval URL for Adding and modifying Entra ID / Graph API access configuration in MyWorkDrive server admin.

Option 1: MyWorkDrive Auth App Registration

When utilizing the MyWorkDrive Cloudflare Web Connector (*.myworkdrive.net web address), the MyWorkDrive managed App Registration will be presented as an option.

With this option you will be prompted by the wizard to Sign-in as an Azure AD/Entra ID Global admin account.

In the next step login with an Azure AD Global Admin to continue automated setup.

To sign in, follow the prompts to sign in using the Microsoft device login method and enter the code (you may copy the code to the clipboard for ease of entry) as presented during setup:

Authenticate with your Azure AD/Entra ID Global admin account when prompted, then click continue to sign in the Microsoft Azure CLI and close the page when requested to continue to the next step:

After a few moments the MyWorkDrive Admin panel will recognize you are logged in with an Azure AD Global Admin:

You with then be provided with the option of using the MyWorkDrive hosted Azure AD App:

Leaving that option selected, approve the MyWorkDrive hosted app registration.

Option 2: Custom Azure App Registration (automated setup)

With this option you will be prompted by the wizard to Sign-in as an Azure AD/Entra ID Global admin account.

You will be approving the The "MyWorkDrive App" Azure AD which has Microsoft Graph API permission to create/read/write Azure Ad Apps on your behalf.

Note: The temporary "MyWorkDrive App" may be removed from Entra AD once setup is complete (Located in Entra ID Enterprise Applications).

Begin by following the wizard to login to Azure AD and setup Automatically:

In the next step login with an Azure AD Global Admin to continue automated setup.

To sign in, follow the prompts to sign in using the Microsoft device login method and enter the code (you may copy the code to the clipboard for ease of entry) as presented during setup:

Authenticate with your Azure AD/Entra ID Global admin account when prompted, then click continue to sign in the Microsoft Azure CLI and close the page when requested to continue to the next step:

After a few moments the MyWorkDrive Admin panel will recognize you are logged in with an Azure AD Global Admin:

You with then be provided with the option of creating your own Azure AD App:

Deselect the Office 365 and Azure Storage options (not shown in this image) if you do not intend to use those features. If you select those features but they are not available in your tenant, or you do not have permission to grant consent for them, you may not be able to complete the wizard.

Leaving that option selected, once created, backup then approve the MyWorkDrive hosted app registration that we created for you in your tenant:

Make note of the Application ID and securely store your Application Secret for future reference.

Option 3: Custom Azure App Registration (manual setup)

Your organization will need their Azure AD Global Admin to create an Azure AD App registration with the necessary permissions noted at the beginning of this article.

Create a new Azure AD App Registration in the same Azure AD as your user’s Office 365 Subscription.

On portal.azure.com, login using Global Admin Account.  Bring up Azure Active Directory/Entra ID https://portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade then Click App Registrations.

Create New Registration

Provide a Name, Selected Account Types and insert your public MyWorkDrive URL

Click Register

Web Redirect URIs

Set the four Web Redirect URIs, as described in the section above, on the Manage | Authentication page of your new app.

https://your-server.example.com/OfOnShPo/Home/SignInRedirect
https://your-server.example.com/GraphAPITokenPage.aspx
https://your-server.example.com/
https://www.myworkdrive.com/success-azure-app-registration-approval

API Permissions

Click API permissions,

If you are using all the features of  MyWorkDrive, Add the permission below:

You may omit Azure Storage |user_impersonation if you do not intend to use Azure Storage with EID Auth, and will either not be using Azure Storage, or will be using it with Connection string.

You may omit SharePoint | MyFiles.Write if you will not be using Office 365 Online Editing.

If you just wish to use MyWorkDrive for Identity only, with no additional features in Azure (SharePoint/OneDrive storage, Office Online Editing, Azure Storage), then only these five permissions are required.

Create Client Secret: Certificates & Secrets: New client secret

Note and Calendar Secret Expiration Date as it will need to be regenerated at that time and updated on all MyWorkDrive Servers.

Click Authentication:  Enable Access Tokens and ID tokens.

Copy the Client Secret Value (not the secret ID): Keep this backed up and secured as it will only display briefly.

Click Overview:  Copy the Application (client) ID:  Retain this value for use in the MyWorkDrive Admin Panel.

Copy the Directory (tenant) ID: Retain this value for use in the MyWorkDrive Admin Panel.

*Note the Client Secret Expiration – this will need to be renewed before it expires and updated on each MyWorkDrive Server in the future.

Update Branding on your custom Azure AD App Registration to verify app or add Company Logo as desired.

MyWorkDrive Server Configuration

Under Integrations or during the Wizard when prompted, Paste the values of your Tenant ID, Application ID, Application Secret and Your Server URL into Azure AD Integration:

 


We appreciate your feedback. If you have any questions, comments, or suggestions about this article please contact our support team at support@myworkdrive.com.