Microsoft O365 (certificate)
Configure the action connector for Microsoft O365 (certificate).
In this guide, you'll onboard the Microsoft O365 (certificate) action connector. This configuration will establish a trusted relationship between Radiant Security and your Azure application to authenticate with the Exchange Online Management PowerShell module. With the action connector, you can execute PowerShell commands from the Radiant Security application with one click.
Available actions
The following actions are available after you set up the Microsoft O365 action connector. Keep in mind, additional permissions are required.
Block sender
Block sender domain
Block URLs
At the end of this configuration, you will provide Radiant Security with the following:
Private Certificate File
Private Certificate Password
Application ID
Organization Name
Prerequisites
Generate the self-signed certificate
Choose to either generate the certificate on Windows or MacOS/Linux.
Windows: PowerShell certificate generation
In PowerShell, update the DnsName to reflect your organization by executing the following commands:
If you are an E.U. tenant, replace app.radiantsecurity.ai by app.eu1.radiantsecurity.ai
Note: Save the .cer file to upload to Azure at a later step. Save the .pfx file to upload to Radiant Security at a later step. Save the password to upload to Radiant Security at a later step.
MacOS/Linux: OpenSSL certificate generation
In the command line, generate a private key for signing this request:
Create certificate signing request using user input for certificate details:
Sign the certificate signing request using the private key:
Convert the pem certificate to a pfx certificate file. This is required for the PowerShell exchange online authentication.
Note: Ensure you provide an input for the CN (common name) as it identifies the certificate.
Note: Save the .pem file to upload to Azure at a later step. Save the .pfx file to upload to Radiant Security at a later step. Save the password to upload to Radiant Security at a later step.
Update the Azure app manifest
Log in to Azure.
From the left side menu, navigate to Microsoft Entra ID.
From the left menu, navigate to App Registrations.
Under All applications search for
Radiant Security.Click to open the application and copy the Application (client) ID.
Note: Be sure to save the Application (client) ID as it will be needed at a later step.
Upload the certificate
From the left side menu, click Certificates & secrets then, click the Certificates tab, and choose Upload certificate.
Upload the certificate
.pemor.cerfile that you saved from the previous step.
Copy the primary domain
From the Entra ID Home menu, copy the Primary domain.
Create the action connector in Radiant Security
Log in to Radiant Security.
From the navigation menu, select Settings > Credentials and click + Add Credential.
Search for and select Microsoft O365 (certificate) and click Configure Credential.
Enter a Credential Name.
Under Required Credentials, provide the following information that you obtained from the previous steps:
Private Certificate (pfx) File Upload:
the .pfx file downloadedPrivate Certificate Password:
the password associated with the .pfx fileApplication (client) ID:
the Application (client) ID you copied from AzurePrimary Domain:
the Primary Domain you copied from Azure
Last updated