OAuth for Sentry on Core

OAuth is supported with Standalone Sentry for Office 365.

The following scenarios must be compliant for OAuth to function correctly:

  • The email client must support OAuth (iOS Native Mail, iOS Email+ and Android Email+)

  • UEM must push an OAuth configuration to the email client

  • UEM must enable Sentry for OAuth

Sentry 9.14.0 and 9.15.0 supports Azure AD Conditional Access Policy.
For more information, see Configuring conditional access policy in Azure AD.

Configuring Sentry on Core for OAuth

You must configure Sentry to enable OAuth and provide the endpoints.

Before you begin 

  • Verify that you have Sentry 9.14.0 or later and Core 11.0.0.0 or later.

Procedure 

  1. Login to Core with admin credentials.

  2. Click Services > Sentry.

  3. Click Add New > Standalone Sentry.

  4. Select Enable ActiveSync and enter the following details for OAuth.


    1. Select Pass Through for Server Authentication.

    2. Select Enable Pass Through with OAuth.

    3. Destination OAuth2 Authorization Endpoint: "https://login.windows.net/common/oauth2/authorize"

    4. Destination OAuth2 Token Endpoint: "https://login.windows.net/common/oauth2/token"

    5. Sentry Resource: https://<SentryHostName>

    6. Destination Resource: https://outlook.office365.com/
      If Active Sync servers are not added by default, then configure Active sync server as outlook.office365.com.

  5. Click Save.

Configuring OAuth for Email+ through Sentry on Core

After the iOS Email+ application is installed the configuration must be pushed to the device.

Before you begin 

  • Verify that you have installed iOS Email+ application.

Procedure 

  1. Login to Core with admin credentials.

  2. Click Services > Sentry.

  3. Click Add New > Standalone Sentry.

  4. Select Enable ActiveSync and enter the following details for OAuth.


    1. Select Pass Through for Server Authentication.

    2. Select Enable Pass Through with OAuth.

    3. Destination OAuth2 Authorization Endpoint: "https://login.windows.net/common/oauth2/authorize"

    4. Destination OAuth2 Token Endpoint: "https://login.windows.net/common/oauth2/token"

    5. Sentry Resource: https://<SentryHostName>

    6. Destination Resource: https://outlook.office365.com/
      If Active Sync servers are not added by default, then configure Active sync server as outlook.office365.com.

  5. Click Save.

Configuring iOS native email configuration with OAuth

Before you begin 

  • Verify that you have enabled "Use OAuth for Authentication" for iOS 5 and later versions.

Procedure 

  1. Login to Core with admin credentials.

  2. Click Policies and Configs.

  3. Click Edit on the exchange configuration.

  4. Enable Use OAuth for Authentication.

  5. Under iOS 5 and Later Settings, enter the following details:

    OAuth Sign In URL: https://<SentryHostName>/proxyservice/oauth2/authorize

    OAuth Token Request URL: https://<SentryHostname>/proxyservice/oauth2/token


  6. Click Save.

Configuring Android and iOS Email+ with OAuth

For more information on configuring Android or iOS Email+ for OAuth, see Email+ Product Documentation.

KVPs for Email+ Configuration

For OAuth, ensure to set "eas_min_allowed_auth_mode" to "modern_auth" and provide the modern_auth_authority_url and modern_auth_resource_url for appropriate OAuth configuration:

  • eas_min_allowed_auth_mode: modern_auth

  • modern_auth_authority_url: https://<SentryHostname>/proxyservice

  • modern_auth_resource_url: https://<SentryHostname>

For OAuth Email+ CBA user, the following KVP must be provided:

  • email_login_certificate = <CBACertificateName>.pfx

Configuring conditional access policy in Azure AD

You can configure the conditional access rules in Azure for OAuth to function correctly.

  1. Login to Azure portal with admin credentials.
    The admin has to be super admin who has premium features to configure Conditional Access rules.

  2. Click Azure AD Conditional Access > Named Locations > IP Range Locations > New IP Range Location.

  3. Click Add and enter the IPv4 or IPv6 address range.

  4. Configure a name and Sentry IP address with Subnet > Add > and enable Mark as Trusted location > Create.

  5. On the Home tab, click Conditional Access Policies > Create New Policy.

  6. Under Users and Groups, select Users and Groups.

  7. Search for the appropriate Users or Groups and click Select.

  8. Under Cloud apps or actions, select apps > Office 365.

  9. Under Conditions > Locations > Any Location > Configure "Yes" under Include to "Any Location".

  10. Under list of locations, select Selected locations under Exclude.

  11. Select Grant access as block access > require one of the selected controls.

  12. Select Enable Policy > OnCreate.