Understanding How to Create Softcoding Record for Microsoft Azure AD

Tools Release 9.2.7.3 has a softcoding template available to enable communication between EnterpriseOne and Microsoft Azure AD.
Note: The option to import or export grid data to Cloud Storage is activated only when there is a softcoding record configured and SupportActiveXIE ini setting is set to false.

See “Managing Softcoding Records” in Business Services Development Guide for details.

You must create a softcoding record based upon on the roles and access to folders in SharePoint sites. Access the Soft Coding Records application, P954000, and enter the appropriate information in the following fields:

User/Role

Enter your JD Edwards EnterpriseOne user ID or role (such as *Public or User or Role). The access to folders available to import and export data to in Microsoft SharePoint is based on the defined user or role.

Environment Name

Enter the name of the JD Edwards EnterpriseOne environment in which you are working.

Template Name

Enter SHAREPOINT in the Template Name field and click the Populate Soft Coding Value button. The values in the fields for Soft Coding Value and Mask Field are populated.

Soft Coding Key

The Soft Coding Key is populated as SHAREPOINT.

Note: Instances where multiple soft coding records exist with the same Soft Coding Key, the system will consider the soft coding record based on role hierarchy logic and ignore other records. For example, if soft coding records exist for USER, ROLE, and *PUBLIC with the same Soft Coding Key, the system will only consider only the soft coding record for USER.

Record Type

Use the drop-down list to select SHAREPOINT.

Soft Coding Description

Sharepoint Template is populated in the Soft Coding Description of the record.

Soft Coding Value

The Soft Coding Value is populated after you click the Populate Soft Coding Value button that appears on the form when you enter a valid template name. Use the below example to configure the Soft Coding Value in the template.

Enter the tenant ID that is generated after you register the application in Microsoft Azure AD in place of DIRECTORY_OR_TENANT_ID.

Enter the Application (client) ID that is generated after you register the client application in Microsoft Azure portal in place of CLIENT_ID.

Enter the client secret in the Masked Value field.

Enter the values for site, rootfolder, and scope.

Enter the values for redirect_uri, grant_type, use_proxy, proxy_host, and proxy_portif required.

Example:

<docs>
<endpoint>https://login.microsoftonline.com/DIRECTORY_OR_TENANT_ID/oauth2/v2.0/token</endpoint>
<username>CLIENT_ID</username>
<password>_||_client_secret_||_</password>
<properties>
<property><name>site</name><value>SITE_NAME</value></property>
<property><name>rootfolder</name><value>ROOT_FOLDERNAME</value></property>
<property><name>scope</name><value>https://graph.microsoft.com/.default</value></property>
<property><name>redirect_uri</name><value>https://localhost</value></property>
<property><name>grant_type</name><value>client_credentials</value></property>
<property><name>use_proxy</name><value>true</value></property>
<property><name>proxy_host</name><value>PROXY_SERVER</value></property>
<property><name>proxy_port</name><value>PROXY_PORT</value></property>
</properties>
</docs>

Click OK.