How to configure Certificate-Based Authentication for Virtual Agent MS Teams OR any Microsoft Azure-based application?Issue <!-- /*NS Branding Styles*/ --> .ns-kb-css-body-editor-container { p { font-size: 12pt; font-family: Lato; color: #000000; } span { font-size: 12pt; font-family: Lato; color: #000000; } h2 { font-size: 24pt; font-family: Lato; color: black; } h3 { font-size: 18pt; font-family: Lato; color: black; } h4 { font-size: 14pt; font-family: Lato; color: black; } a { font-size: 12pt; font-family: Lato; color: #00718F; } a:hover { font-size: 12pt; color: #024F69; } a:target { font-size: 12pt; color: #032D42; } a:visited { font-size: 12pt; color: #00718f; } ul { font-size: 12pt; font-family: Lato; } li { font-size: 12pt; font-family: Lato; } img { display: ; max-width: ; width: ; height: ; } } How to configure VA Teams using Certificate-based authentication? OR any Microsoft Azure-based application? Release<!-- /*NS Branding Styles*/ --> .ns-kb-css-body-editor-container { p { font-size: 12pt; font-family: Lato; color: #000000; } span { font-size: 12pt; font-family: Lato; color: #000000; } h2 { font-size: 24pt; font-family: Lato; color: black; } h3 { font-size: 18pt; font-family: Lato; color: black; } h4 { font-size: 14pt; font-family: Lato; color: black; } a { font-size: 12pt; font-family: Lato; color: #00718F; } a:hover { font-size: 12pt; color: #024F69; } a:target { font-size: 12pt; color: #032D42; } a:visited { font-size: 12pt; color: #00718f; } ul { font-size: 12pt; font-family: Lato; } li { font-size: 12pt; font-family: Lato; } img { display: ; max-width: ; width: ; height: ; } } All Resolution<!-- /*NS Branding Styles*/ --> .ns-kb-css-body-editor-container { p { font-size: 12pt; font-family: Lato; color: #000000; } span { font-size: 12pt; font-family: Lato; color: #000000; } h2 { font-size: 24pt; font-family: Lato; color: black; } h3 { font-size: 18pt; font-family: Lato; color: black; } h4 { font-size: 14pt; font-family: Lato; color: black; } a { font-size: 12pt; font-family: Lato; color: #00718F; } a:hover { font-size: 12pt; color: #024F69; } a:target { font-size: 12pt; color: #032D42; } a:visited { font-size: 12pt; color: #00718f; } ul { font-size: 12pt; font-family: Lato; } li { font-size: 12pt; font-family: Lato; } img { display: ; max-width: ; width: ; height: ; } } 1. Generate Java Keystore (.JKS) certificate. Note the alias name and keystore password provided while generating the certificate. 2. Upload the certificate to Microsoft Azure In Microsoft Azure, navigate to Manage > Certificates & secrets.Select the upload certificate.Provide a description, a start date, and an expiration date and upload the certificate. 3. Upload the Java Keystore certificate to the instance. Navigate sys_certificate.doSelect Type = Java Key StoreEnter Name & Keystore passwordAttach the (.JKS) certificate generated. Save & Click Validate Stores/Certificates [Ensure you have jks added under property glide.attachment.extensions, or the value is blank to allow all extensions] 4. Create JWT Keys Navigate jwt_keystore_aliases.doEnter Name Select Signing Keystore = Certificate record created in Step 3Enter Signing Key = KeyStore PasswordSave 5. Create JWT Providers Naviagte jwt_provider.doEnter Name and Select Signing Configuration = JWT Keys record created in Step 4SaveGo to the Related Tab (Standard Claims) & Enter Claim Value aud = https://login.microsoftonline.com/botframework.com/oauth2/v2.0/tokeniss = {client_id}sub = {client_id} Save [Select aud = https://login.microsoftonline.com/{tenant}/oauth2/v2.0/token for any other Microsoft Azure-based application] 6. Generate a SHA-1 Thumbprint Navigate to All > System Definition > Scripts-BackgroundPaste the following script to generate the SHA-1 thumbprint value var certId = "<sys_id of the certificate record created in Step 3>"; var certAlias = "<alias name provided for the certificate while generating .JKS certificate>"; var gce = new GlideCertificateEncryption(); var thumbprint = gce.getThumbPrintFromKeyStore(certId, certAlias,"SHA-1"); gs.info(thumbprint); Note the thumbprint If you don't remember the alias name of the certificate, use the command below and see the value for Alias name:? keytool -list -v -keystore jks_cert_step_3.jks -storepass keystore_password 7. Create OAuth Script Create a copy of the GraphCertificateOAuthTemplate script include. [This comes as part of glide.email.graph plugin]The copy name must begin with OAuthIn the script, enter the JWT provider sys_id created in Step 5 and the SHA-1 thumbprint generated in Step 6.Save 8. Navigate to the Application Registry record of the Microsoft Teams Bot Select the OAuth API Script = OAuth Script created in Step 7Validate Client IDValidate Default Grant Type = Client CredentialsValidate Token URL = https://login.microsoftonline.com/botframework.com/oauth2/v2.0/tokenValidate Redirect URL = https://<instance>.service-now.com/oauth_redirect.do Save [Naviagte related Application Registry record and change Token URL = https://login.microsoftonline.com/{tenant}/oauth2/v2.0/token for any other Microsoft Azure-based application] Related Links<!-- /*NS Branding Styles*/ --> .ns-kb-css-body-editor-container { p { font-size: 12pt; font-family: Lato; color: #000000; } span { font-size: 12pt; font-family: Lato; color: #000000; } h2 { font-size: 24pt; font-family: Lato; color: black; } h3 { font-size: 18pt; font-family: Lato; color: black; } h4 { font-size: 14pt; font-family: Lato; color: black; } a { font-size: 12pt; font-family: Lato; color: #00718F; } a:hover { font-size: 12pt; color: #024F69; } a:target { font-size: 12pt; color: #032D42; } a:visited { font-size: 12pt; color: #00718f; } ul { font-size: 12pt; font-family: Lato; } li { font-size: 12pt; font-family: Lato; } img { display: ; max-width: ; width: ; height: ; } } Configure an OAuth profile to use certificates for authentication with Microsoft Azure