Setting Up MCF Email Using Azure

You can set up MCF inbound and outbound emails using OAuth2 authentication through Azure using the Create OAuth2 Service Apps page.

To create your own OAuth2 service application or open an existing application, open the Create OAuth2 Service Apps page using this navigation path:

Navigation:

PeopleTools > Security > OAuth2 Administration > Create OAuth2 Service Apps.

This example illustrates the fields and controls on the Example to set up MCF Emails using OAuth2 Authentication with Azure.

Setting Up Azure as Email Client

Example

This example shows the suggested values to be used for MCF emails:

Field or Control

Description

Application Type

Select Email Client.

Client ID

Enter Azure application client ID.

Client Secret

Enter Azure application secret.

Authorized Endpoint

https://login.microsoftonline.com/<tenant ID>/oauth2/v2.0/authorize

Token Endpoint

https://login.microsoftonline.com/<tenant ID>/oauth2/v2.0/token

Issuer

https://login.microsoftonline.com

Scope

For email configurations, scope is set to None and grayed-out.

Scope URL

For email configurations, this defaults to https://graph.microsoft.com/mail.readwrite.

Refresh Token

This option is selected and grayed-out for email configurations.

For more information on OAuth2 support for non-IDCS service providers, see Understanding OAuth 2.0.

There are several SMTP parameters that you must modify for OAuth configuration. See SMTP Settings.

For more information on certificates for SSL communication, see How To Configure SMTP SSL on Application Servers and Process Schedulers on My Oracle Support (Doc ID 1612188.1). For more information on setting up client certificate authentication, see How to Setup SMTP Client Certificate Authentication in PeopleSoft (Doc ID 2876697.1).