Create Microsoft Entra App - (https://learn.microsoft.com/en-us/entra/identity-platform/quickstart-register-app?tabs=certificate)
Sign in to the Microsoft Entra admin center as at least a Cloud Application Administrator.
If you have access to multiple tenants, use the Settings icon in the top menu to switch to the tenant in which you want to register the application from the Directories + subscriptions menu.
Browse to Identity > Applications > App registrations and select New registration.
Enter a display Name for your application. Select Accounts in this organizational directory only (single tenant) in Supported account types and click register.
Configure integration fields in we360.ai
Open your We360.ai portal and go to Settings > Integration > Microsoft Teams Integration > Configure
Copy Directory (tenant) ID from the Entra app overview section and paste it into we360 portal configuration Microsoft Tenant ID (Organization ID).
Copy Application (client) ID from the Entra app overview section and paste it into we360 portal configuration Client ID (Application ID).
Go to Manage > Certificate & secrets > + New client secret. Fill in the description and expiry as per your requirement and click on Add at the bottom.
Copy the the newly created client secret value and paste it into the we360 portal configuration Client Secret field.
Select a unique identification key based on the requirement and save you configuration on we360.ai portal.
Email - Use this when email addresses on Microsoft Teams match email addresses on the we360.ai portal.
Email Prefix - Use this when only email prefixes (the part before the @ symbol) on Microsoft Teams match email prefixes on the we360.ai portal.
Employee ID - Use this when email addresses on Microsoft Teams match employee IDs on the we360.ai portal (and do not match email addresses on the we360.ai portal).
Employee ID Prefix - Use this when email prefixes on Microsoft Teams match employee IDs on the we360.ai portal (and do not match email prefixes on the we360.ai portal).
Add Permissions to Entra app - (https://learn.microsoft.com/en-us/entra/identity-platform/quickstart-configure-app-access-web-apishttps://learn.microsoft.com/en-us/entra/identity-platform/quickstart-configure-app-access-web-apis)
Go to Manage > API permissions > + Add a permission and add the following permissions
Calendars.Read
Calendars.ReadBasic.All
CallRecords.Read.All
OnlineMeetingArtifact.ReadAll
OnlineMeetings.Read.All
OnlineMeetings.ReadWrite.All
User.Read
User.Read.All
These permissions will require admin consent. As shown in the screenshot below please grant admin consent for the tenant.
Configure Application Access policy for online meeting access - (https://learn.microsoft.com/en-us/graph/cloud-communication-online-meeting-application-access-policy#configure-application-access-policy)
Entra app requires an application access policy to access online meeting data which can be configured using the following commands (after replacing variables)
New-CsApplicationAccessPolicy -Identity Test-policy -AppIds "<Application (client) ID>" -Description "<description here>"
Grant-CsApplicationAccessPolicy -PolicyName Test-policy -Global