Skip to main content

About PowerApp Connectors

A connector is a proxy or a wrapper around an API that allows the underlying service to talk to Microsoft Power Automate, Microsoft Power Apps, and Azure Logic Apps. It provides a way for the users to connect their accounts and leverage a set of prebuilt actions and triggers to build their apps and workflows.

Prerequisites

  • Azure Subscription
  • Azure Active Directory Tenant
  • Azure Power Apps Subscription
  • Once of the following roles to the client Azure account:
    • Global Administrator
    • Cloud Application Administrator
    • Application Administrator
    • Owner of the service principal
  • The following roles within the Manifest Web Application:
    • Security Admin

How to Set-up a PowerApp Connector

Register App in Azure Active Directory

  1. Sign into the Azure portal
  2. In the Azure portal, search for and select Azure Active Directory
  3. Select App registrations
Power Apps1
  1. Select ’+ New Registration’
  2. Complete the App registration form:
    • Enter the desired user-facing display name, eg. ‘Manifest’
    • Choose the scope for application authentication (most single tenant users will select the first option: Support Account types - select ‘Accounts in this organizational directory only’)
    • Redirect URI is (optional) - leave blank
    • Select Register
Power Apps2
  1. From the App registration screen, under “Owned applications” select the Manifest app you just created
  2. Go to the Authentication tab
  3. Select + Add a platform
Power Apps3
  1. On the Configure platform select Web
Power Apps4
  1. Enter the redirect URI of the application
Power Apps5
  1. Go to Certificates + secrets tab
  2. Under Client secrets, select ’+ New Client Secret’ and add a client secret
    • Provide a description and expiration and a client secret will be automatically generated
    • IMPT! Copy the key once created and save this. You will need this to configure your AD in Manifest. Once you leave this screen you WILL NOTE be able to access this secret value again.
Power Apps6 Power Apps7
  1. Go to the ‘API Permissions’ tab
  2. Select ’+ Add a permission’, The ‘Request API permissions’ window will fly out
  3. Under Microsoft API’s, select Microsoft Graph. You will be prompted to indicate what type of permissions your application requires.
  4. Select Delegated Permissions and search for and then check off the following permissions:
    • User.read
    • Sites.Manage.All
    • Sites.Read.All
    • User.Read
Power Apps8
  1. Before logging out, be sure to make note of the following information required to configure your Active Directory in Manifest:
    • Application (client) ID: available under App registrations
    • Client Secret: create in step 12
    • Directory (tenant) ID: available on the Overview tab

Configuring Manifest with your client Azure AD

  1. Sign into the Manifest Client Portal
  2. Select ‘Client Settings’ and go to the Active Directory Configurations tab
  3. Select ‘+OAUTH PROVIDER’
  4. Enter in the following information gathered when adding the Manifest application to your Azure AD tenant:
    • Client ID
    • Client Secret
    • Tenant ID
  5. Select Update
Power Apps9

Install Custom Connector

  1. Login to Power Apps at https://make.powerapps.com
  2. Go to the custom connector page
Power Apps10
  1. Go to Custom connector —> Import an Open API file
Power Apps11
  1. Download file below and save it into .json format
  2. Import ‘manifest_powerapps.json’ file
manifest_powerapps.jsonDownload Power Apps12
  1. Change host to Manifest Instance URI e.g. ‘demo.taqmanifest.com’ or ‘apac.taqmanifest.com’
Power Apps13
  1. Go to the next page ‘Security’
Power Apps14
  1. Set Client ID, Client Secret, Tenant ID to your specific credentials based on your Azure AD Tenant and App registration from the above steps. Set Resource URL to https://graph.microsoft.com/
Power Apps15
  1. Go to the next page ‘Definition’
  2. Select Create Connector
Power Apps16

Create PowerApps Connection

  1. Go to Custom Connectors Page
Power Apps17
  1. Click Plus button to create connection
Power Apps18
  1. Click Create and then login using Azure AD
Power Apps19
  1. Complete!