Forms Printer Modern Authentication Help
28 October 2022
This Applies to Forms Printer for GP 18.x build 161 and greater: For Earlier 18.x builds, a SQL Script must be used to Configure For EWS modern Authentiation, and for Builds Prior to 154 , only Outlook emailing is available with Forms Printer, but in that case Outlook handles the Modern Authentication.
Regarding: “Use Default Forms Printer Multitenant App ID and Tenant ID”. Checkbox, on the E-mail Send Method Setup Window Accessed from the Forms Printer Setup->E-mail Setup-> E-mail Send Method Setup Menu entry.
Check this checkbox in order to have the Send Method you are defining, use Modern Authentication with Exchange Online, And use the Default “Forms Printer For Dynamics GP Multitenant” Azure registered Application for permissions and approval for Email Sending.
This will result in a dialog such as the below for each user when they First Log in while sending E-mail with Forms Printer.
After The user Accepts this Permission Request, then they will only need to Log in once per GP Session, when the First e-mail is sent:
If you choose not to use this Default “Forms Printer For Dynamics GP Multitenant” Azure Application, then you can create your own Azure Registered Application, and enforce more restrictive security on your users: If you do this, you will enter your own “Modern Auth App ID/Client ID” for the Application you create, and the “Modern Auth Tenant ID” for the Azure Domain, (Tenant) it is created in.
In order to Create a custom Azure Registered Application, you can follow the steps here:
Forms Printer uses “Delegated Authentication”, so only the Section under “Register your Application” needs to be performed: (duplicated below)
Register your application
To use OAuth, an application must have an application ID issued by Azure Active Directory. In this tutorial, it is assumed that the application is a console application, so you need to register your application as a public client with Azure Active Directory. You can register an application in the Azure Active Directory admin center or by using Microsoft Graph.
Open a browser and navigate to the Azure Active Directory admin center and login using a personal account (aka: Microsoft Account) or Work or School Account.
Select Azure Active Directory in the left-hand navigation, then select App registrations under Manage.
Select New registration. On the Register an application page, set the values as follows.
- Set Name to a friendly name for your app.
- Set Supported account types to the choice that makes sense for your scenario.
- For Redirect URI, change the dropdown to Public client (mobile & desktop) and set the value to https://login.microsoftonline.com/common/oauth2/nativeclient
Choose Register. On the next page, copy the values of the Application (client) ID and Directory (tenant) ID and save them, you will need them later.
For more information, contact firstname.lastname@example.org, with your GP Site name, and affiliation.