Moxie permissions support Microsoft Entra ID (formerly Azure Active Directory). This allows you to manage your Moxie user permissions from a cloud-based environment. Moxie will support the use of MFA as long as you use Microsoft Entra ID and have Microsoft Entra ID configured for MFA.
You must set up Microsoft Entra ID to register Moxie as an application in order for Moxie to use Microsoft Entra ID. Once you have completed this task, you will have to run the Omnivex Moxie Data Server Config (MDSC) application on the Data Server computer and select Azure Active Directory as your new permission method.
Note: Before attempting to use AAD as your authentication method, ensure that you have registered Moxie with AAD.
Prerequisites:
- Microsoft Entra ID P1 or P2 license
- Privileged Role Administrator or Global Administrator
Setting up Microsoft Entra ID:
- Go to Azure Portal > Microsoft Entra ID > Roles and Administrators > Create a new custom role
- Name it (e.g: Azure Group Read All)
- Search microsoft.directory/groups/memberOf/read > Addit > Next.
- Click Create.
- Go back to Microsoft Entra ID > Groups > New group
- Fill in the following fields:
- Group type: Security
- Group name: Data Server Admins
- Group description: Data Server Admins for Moxie
- Microsoft Entra roles can be assigned to the group: Yes
- Owners: Assign an owner
- Members: Assign members that you want to have access to the Moxie Data Server Admins group
- Roles: Azure Group Read All
- Go to App registrations > New registration
- Name: Omnivex Moxie
- Supported account types: Accounts in this organizational directory only
- Assign an owner
- Click Authentication>Add a platform
- Click Mobile and desktop applications
- Select all of the URLs > Custom redirect URLs: https://localhost > Click Configure
- Click API permissions > Add a permission
- Click Microsoft Graph
- Click on Delegated permissions > Add Directory.AccessAsUser.All > Click Add Permissions
- Click Grant admin consent for your org
- Go to App registrations > Omnivex Moxie > Note down the Application (client) ID & Directory (tenant) ID
- Run the Omnivex Moxie Data Server Configuration (MDSC application)
- Click Use Permissions
- Select Authorization type: Azure Active Directory
- Fill in the Application (client) ID and Directory (tenant) ID with the values in Step 1 above
- Click Test Connection
- Sign in with the email that is in the Data Server Admin Group
- You should receive a notice in the MDSC to say "Your Azure Active Directory settings have been successfully verified"
- Open Moxie Studio
- Login with the account in the Data Server Admins group
- Click on Permissions Manager under Modules
- Click on a module (e.g. Player Manager)
- Click Add Groups at the top left of the ribbon
- From the Add Groups dialog, click Select Groups
- Search for a group to whom you want to grant the permission
- Click Find Now
- Click Ok