Cubu Docs
Technical Guide
Technical Guide
  • Welcome to Cubu's Technical Guide!
  • White Papers
    • Data Protection
    • Sign On and Authentication
  • Advanced Configuration
    • Configuring Video Meetings
      • ⚒️Using Microsoft Teams for Video Meetings
      • ⚒️Using Zoom for Online Meetings
    • Calendar Integration
      • ⚒️Configuring Microsoft Office 365 Calendar Integration
      • ⚒️Configuring Google Workspace Calendar Integration
    • Configuring Single Sign On (SSO)
      • ⚒️Configuring SSO with Azure AD
      • ⚒️Configuring SSO with Okta
      • ⚒️Configuring SSO with Auth0
    • Configuring Chatbots
      • Configure Chatbot using WhatsApp
  • Webhooks
    • Webhooks Configuration
    • Developing Webhooks
      • Dev Tools
      • HMAC Validation (ASP.NET Core)
    • Webhooks Reference
      • Organization Webhooks
        • 🪝Webhook: Send SMS
      • Data Table Webhooks
        • 🪝Webhook: Query
        • 🪝Webhook: Find
        • 🪝Webhook: Fetch
      • Service Webhooks
        • 🪝After Book Appointment
        • 🪝After Check In
        • 🪝After Close
        • 🪝Before Book Appointment
        • 🪝Before Check In
        • 🪝Before Queue-Up
        • 🪝Before Resolve
        • 🪝After Queue-up
        • 🪝After Resolve
        • 🪝After Start Work
      • Kiosk Webhooks
        • 🪝Before Query Appointments
  • Server to Server (S2S) API
    • Server to Server (S2S) API
Powered by GitBook
On this page
  • Overview
  • Active Directory Configuration
  • Registering an Application
  • Creating a Client Secret
  • Granting API Permissions
  • Configuring the Application Access Policy
  • Cubu Configurations
  1. Advanced Configuration
  2. Configuring Video Meetings

Using Microsoft Teams for Video Meetings

PreviousConfiguring Video MeetingsNextUsing Zoom for Online Meetings

Last updated 1 year ago

Cubu can use Microsoft Teams to start a video call between an agent and a customer.

This document describes the required steps for configuring Teams as Cubu’s online meeting provider.

Following the instructions in this document requires admin access to the organization’s active directory.

Overview

For Cubu to create Team meetings for the organization’s users, you must provide Cubu with the proper credentials.

The process consists of the following steps:

  1. Registering an App in the organization’s active directory.

  2. Creating a client secret, allowing Cubu to request access tokens.

  3. Grant the app with API access privileges.

  4. Configure an application access policy and assign it to users.

  5. Configure Cubu to use the app for online meetings.

Active Directory Configuration

Registering an Application

In this step, you will create an application in your Azure Active Directory that clients can use to create Teams meetings on behalf of users.

  • Log in to the Azure Portal

Creating a Client Secret

In this step, you will create a client secret for the application. Cubu will use the client’s secret and the client and tenant IDs to obtain an access token to Microsoft Graph API.

  • Click on “Certificates and Secrets”

  • Click on “New client secret” and provide a name for your secret.

Granting API Permissions

In this step, you grant the application minimal access permissions to Microsoft Graph API.

  • Click on “API Permissions”

  • Click on “Microsoft Graph”

  • Add the following permissions:

    • OnlineMeetings.ReadWrite.All

    • User.ReadBasic.All

Configuring the Application Access Policy

For the application to create meetings on behalf of users, an access policy must be created and assigned to the users. This step is performed using PowerShell. For details, see:

Installing and Connecting the Teams Module

Install the latest PowerShellGet:

Install-Module -Name PowerShellGet -Force -AllowClobber

Install the Teams PowerShell Module:

Install-Module -Name MicrosoftTeams -Force -AllowClobber

For details, see:

To start working with the Microsoft Teams PowerShell module, sign in with your Azure credentials.

Connect-MicrosoftTeams

Creating and Assigning Application Access Policy

Create a new application access policy:

New-CsApplicationAccessPolicy -Identity cubu-teams-policy -AppIds "<your-app-id>" -Description "description here".

For AppIds use the Application (client) Id you created earlier. Identity is the name of the policy to create.

Assign the policy to each user that the application should create a meeting on their behalf:

Grant-CsApplicationAccessPolicy -PolicyName cubu-teams-policy -Identity "<user-object-name>"

Identity is the object ID of the user in your active directory. You can obtain the user Id from the Azure Portal.

To assign the access policy to all the users in the tenant use:

Grant-CsApplicationAccessPolicy -PolicyName cubu-teams-policy -Global

See:

Cubu Configurations

  • In Cubu, go to Admin Tools > Settings > Online Meetings.

  • Select Microsoft Teams as the Provider Type.

  • Enter the Tenant Id, Client Id, and Client Secret

  • Check the Enabled box.

  • Click on Save.

Go to Azure Active Directory

Click on “New registration” and provide a name for your application.

After creating the application, take note and keep the Application (client) ID and Directory (tenant) Id for later use.

After the secret is created, take note of the secret value. This value will no longer be available once you leave the page.

Make sure to choose Application permissions

⚒️
Configure an application access policy using the cloud communications API - Microsoft GraphMicrosoftLearn
Logo
Install Microsoft Teams PowerShell - Microsoft TeamsMicrosoftLearn
Logo
New-CsApplicationAccessPolicy (SkypeForBusiness)MicrosoftLearn
Logo
Grant-CsApplicationAccessPolicy (SkypeForBusiness)MicrosoftLearn
Logo
Cubu and Microsoft Teams Integration
API Permissions