⚒️Using Microsoft Teams for Video Meetings

Cubu can use Microsoft Teams to start a video call between an agent and a customer.

This document describes the required steps for configuring Teams as Cubu’s online meeting provider.

Following the instructions in this document requires admin access to the organization’s active directory.

Overview

For Cubu to create Team meetings for the organization’s users, you must provide Cubu with the proper credentials.

Cubu and Microsoft Teams Integration

The process consists of the following steps:

  1. Registering an App in the organization’s active directory.

  2. Creating a client secret, allowing Cubu to request access tokens.

  3. Grant the app with API access privileges.

  4. Configure an application access policy and assign it to users.

  5. Configure Cubu to use the app for online meetings.

Active Directory Configuration

Registering an Application

In this step, you will create an application in your Azure Active Directory that clients can use to create Teams meetings on behalf of users.

  • Log in to the Azure Portal

  • Go to Azure Active Directory

  • Click on “New registration” and provide a name for your application.

  • After creating the application, take note and keep the Application (client) ID and Directory (tenant) Id for later use.

Creating a Client Secret

In this step, you will create a client secret for the application. Cubu will use the client’s secret and the client and tenant IDs to obtain an access token to Microsoft Graph API.

  • Click on “Certificates and Secrets”

  • Click on “New client secret” and provide a name for your secret.

  • After the secret is created, take note of the secret value. This value will no longer be available once you leave the page.

Granting API Permissions

In this step, you grant the application minimal access permissions to Microsoft Graph API.

  • Click on “API Permissions”

  • Click on “Microsoft Graph”

  • Make sure to choose Application permissions

  • Add the following permissions:

    • OnlineMeetings.ReadWrite.All

    • User.ReadBasic.All

API Permissions

Configuring the Application Access Policy

For the application to create meetings on behalf of users, an access policy must be created and assigned to the users. This step is performed using PowerShell. For details, see:

Installing and Connecting the Teams Module

Install the latest PowerShellGet:

Install-Module -Name PowerShellGet -Force -AllowClobber

Install the Teams PowerShell Module:

Install-Module -Name MicrosoftTeams -Force -AllowClobber

For details, see:

To start working with the Microsoft Teams PowerShell module, sign in with your Azure credentials.

Connect-MicrosoftTeams

Creating and Assigning Application Access Policy

Create a new application access policy:

New-CsApplicationAccessPolicy -Identity cubu-teams-policy -AppIds "<your-app-id>" -Description "description here".

For AppIds use the Application (client) Id you created earlier. Identity is the name of the policy to create.

Assign the policy to each user that the application should create a meeting on their behalf:

Grant-CsApplicationAccessPolicy -PolicyName cubu-teams-policy -Identity "<user-object-name>"

Identity is the object ID of the user in your active directory. You can obtain the user Id from the Azure Portal.

To assign the access policy to all the users in the tenant use:

Grant-CsApplicationAccessPolicy -PolicyName cubu-teams-policy -Global

See:

Cubu Configurations

  • In Cubu, go to Admin Tools > Settings > Online Meetings.

  • Select Microsoft Teams as the Provider Type.

  • Enter the Tenant Id, Client Id, and Client Secret

  • Check the Enabled box.

  • Click on Save.

Last updated