Purpose

Azure Active Directory (Azure AD) is a Microsoft’s enterprise cloud-based identity and access management service which is massively used in enterprise solutions but can be complicated to implement.

This documentation shows how to configure an OAuth2 connection with Elements Connect for Jira Cloud using the "Client credentials" grant type.

Connecting to an Azure Active Directory is useful to display more information about the reporter of a request to support agents for example. The office location of a reporter can be fetched and used to affect the ticket to the relevant support group or to automatically triage request to location-based queues in a Jira Service Management project.


Prerequisites

  • Have a Jira Cloud instance

  • Have Elements Connect installed on your instance

  • Have an Azure Active Directory up and running


Configuration steps

  1. Azure Active Directory configuration

  2. Elements Connect configuration


Azure Active Directory configuration

From the "Azure Active Directory configuration", as a Microsoft Azure admin:

  • Create a new "App registration" and give it a meaningful name (i.e.: "Elements Connect" or "Jira"):



  • Click "Register"

A client ID was automatically generated for your App:

The next step is to generate a client secret. 

To do that, go to "Certificates & secrets"

  • Click "New client secret"


  • Provide your secret with a name and select the expiry duration of your choice:

Remember to save your secret somewhere safe, as you won't be able to access it anymore after that. You may also generate new ones.


Elements Connect configuration

  • Go to Elements Connect administration by clicking on “Apps”, then Elements Connect

  • Click on “Create datasource”


  • Select “REST API”

  • Give your datasource a name, then configure it as follows:

Base URL:

https://graph.microsoft.com/v1.0
CODE


API Documentation: https://learn.microsoft.com/en-us/rest/api/azure/

API Test URL

https://graph.microsoft.com/v1.0/users
CODE

 (this is a working endpoint that will work against the connection tester)

Authentication mode: OAuth 2

Token URL: go to your Azure AD app > Overview > Endpoints > URL under "OAuth 2.0 token endpoint (v2)"


Client ID: go to your Azure AD app > Overview > Client ID


Client secret: use the secret you generated when registering your app

Client authentication: choose where you want to send the client ID and client secret (header or body) - for Azure AD, we recommend sending credentials to the body

Scopes: https://graph.microsoft.com/.default (default), or any other scopes defined when registering your app



  • Click the “Test connection” button

  • Save your datasource configuration. You’re all set!