In Part 3 of the blog series, the author discusses enhancing the security of a custom connector published from Azure API Management for Microsoft Graph APIs by implementing Entra ID OAuth authentication. The process involves creating two Entra ID applications, one to represent the API from API Management and the other to represent the client application for authentication. The author provides step-by-step instructions for registering the applications in Microsoft Entra ID and configuring the custom connector authentication to Entra ID OAuth. The article also covers configuring JWT validation policy in Azure API Management to authorize requests from the custom connector and testing the custom connector in Power Platform. The blog series aims to provide secure access to Microsoft Graph APIs in Power Platform using Azure API Management and Entra ID OAuth authentication.
Login now to access my digest by 365.Training