Pre-requisites
To set up an identity management application to manage authentication for NewStore apps, ensure that you have access to:
Omnichannel Manager
Microsoft Entra Admin Center
Important
To enable users from your corporate directory to be able to use the NewStore applications, you have to create users, assign them to a store, and assign relevant roles in NewStore.
Setting up Microsoft Entra ID with NewStore
This process involves working with Microsoft Entra ID and Omnichannel Manager in tandem. Ensure you have access to both before you proceed.
Log into Microsoft Entra Admin Center..
In the navigation menu, in the
Identitysection, clickApplications>App registrations.Click
New registrationand enter the following details:Name:For non-production systems such as staging environments, specify
newstore-staging.For production systems, specify
newstore-production.
Select
Accounts in these organizational directory only.Leave the
Redirect URIempty.
Click
Register.After the application is created, in the left menu, click
API permissions.A list of default permissions appear.
Click
Add a permission>Microsoft Graph>Application permissions.Add the following permissions. Ensure that you specify the correct
TypeandAdminprivileges.API/Permission nameTypeDescriptionAdminDirectory.Read.AllApplication
Read directory data
Yes
Group.Read.AllApplication
Read all groups
Yes
Group.Member.Read.AllApplication
Read all group memberships
Yes
After you have added these permissions, click
Grant admin consent for <retailer name>.The status for all permissions is updated to
Granted.In the left menu, click
Certificates & secrets>New client secret.In the screen that appears, enter a description, set the
Expiredfield to one of the provided options, and clickAdd.Important
Ensure that you get notified and rotate the
client secretbefore it expires. After the secret expires, the login credentials to NewStore will not work anymore. Follow the updating guidelines to rotate a secret.The new secret is created and added to the list of
Client secrets.Copy the
Valueof the new secret securely for later use.Note
The value of the new secret can only be viewed immediately after creation. If you missed copying the
Value, create a new secret.In the left menu, click
Overview, and copy theApplication (client) IDandDirectory (tenant) IDsecurely for later use.Open the
Omnichannel Managerin a separate tab.Click
Settings>Users & Roles>Single Sign-On.Click
Configure Single Sign-On.Select Vendor
MICROSOFT.Fill in the saved data from the previous configuration.
Secretfrom step 11Directory (Tenant) IDandApplication (Client) IDfrom step 12
Click
Connect.Switch back to
Microsoft Entra IDtab.In the left menu, click
Authentication>Platform configurations>Add a platform.Select
Web.Paste the
Redirect URIandLogout URLfrom theOmnichannel Managertab.Click
Configure.In the left menu, click
Token configuration, and clickAdd groups claim.In the
Edit groups claimscreen, specify the following:Select
Security groups.In the
Accessarea, selectGroup IDandEmit groups as role claims.Specify the same settings as described in the previous step for the
IDandSAMLareas.
Click
Add.
Click
Add optional claim.In the screen that appears, select
Accessas theToken type, and select the following:emailfamily_namegiven_nameupn
Click
Add.Repeat the same steps for
IDas theToken type.
(Optional) To remove explicit user assignment in Microsoft Entra ID, see this section.
Single Sign-on is successfully configured with Microsoft Entra ID.
Updating client secrets in Omnichannel Manager
Log into Microsoft Entra Admin Center (formerly Azure AD management portal).
In the navigation menu, in the
Identitysection, clickApplications>App registrations.Open the application you want to update.
In the left menu, click
Certificates & secrets>New client secret.In the screen that appears, enter a description, set the
Expiredfield to one of the provided options, and clickAdd.The new secret is created and added to the list of
Client secrets.Copy the
Valueof the new secret securely for later use.Note
The value of the new secret can only be viewed immediately after creation. If you missed copying the
Value, create a new secret.Open
Omnichannel Manager.Click
Settings>Users & Roles>Single Sign-On.Click on the displayed name
MICROSOFT.Paste the new secret value in the
Secretform.Important
Ensure that this secret exists and is valid in Microsoft Entra ID. There is no way to revert after updating the secret.
Click
Update.Click
Confirm.
You have successfully rotated your secret.
(Optional) Removing explicit user assignment
To remove explicit user assignment in Microsoft Entra ID:
Log into the Microsoft Entra Admin Center.
In the navigation menu, in the
Identitysection, clickApplications>Enterprise applications.In the list, search for the system environment (such as
newstore-stagingornewstore-production) and select it.In the left menu, click
Properties.For the
Assignment required?field, selectNo.
Related topics