Skip to content

ZZZ ‐ [Archived] ‐ Update bot project using bot id and bot password to using certificate or MSI

Junjie Li edited this page Oct 28, 2024 · 1 revision

Important

Content in this document has been moved to Teams platform documentation. Please do not refer to or update this document.

Introduction:

You can follow this guide to update your existing bot project to use certificate or MSI for bot authentication to resolve the compliance issue of using Entra id with secret.

Prerequisites:

You should have a Teams bot app that has been deployed to Azure with the following resources:

  1. Azure bot service
  2. An Entra id with a secret that is used for bot authentication
  3. A resource that hosts your bot app (app service, Azure functions, etc)

Steps (updating to certificate):

  1. Prepare a certificate and a private key.
  2. Upload certificate to your Entra id.
  3. Update your code and deploy to your hosting resource.

For typescript/javascript project:

const credentialsFactory = new ConfigurationServiceClientCredentialFactory({
  MicrosoftAppId: config.botId,
  CertificatePrivateKey: '{your private key}',
  CertificateThumbprint: '{your cert thumbprint}',
  MicrosoftAppType: "MultiTenant",
});

const botFrameworkAuthentication = new ConfigurationBotFrameworkAuthentication(
  {},
  credentialsFactory
);

const adapter = new CloudAdapter(botFrameworkAuthentication);

For csharp project:

builder.Services.AddSingleton<ServiceClientCredentialsFactory>((e) => new CertificateServiceClientCredentialsFactory("{your certificate}", "{your entra id}"));
  1. Test your bot app.

  2. Clean up secrets in your Entra id.

    If your bot works, you can delete the secrets in your Entra id.

Steps (updating to MSI):

  1. Create a new Azure bot service with MSI type

    Since Azure bot service’s id and type cannot be modified after creation, you need to create a new Azure bot service. Select type “User-Assigned Managed Identity” and creation type “Create new Microsoft App ID”, and it will create both the Azure bot service and the managed identity for you. image

    You can also manually create a managed identity first then create the Azure bot service with creation type “Use existing app registration”.

    You need to update the new Azure bot service’s messaging endpoint and Channels to be the same as the old one.

  2. Add the managed identity to the resource that hosts your bot app.

    Go to your app’s hosting resource, select Settings->Identity->User assigned. Add the managed identity created in step 1.

  3. Update your code and deploy to your hosting resource.

For typescript/javascript project:

const credentialsFactory = new ConfigurationServiceClientCredentialFactory({
  MicrosoftAppType: 'UserAssignedMsi',
  MicrosoftAppId: '{your msi’s client id}',
  MicrosoftAppTenantId: '{your msi’s tenant id}',
});

const botFrameworkAuthentication = new ConfigurationBotFrameworkAuthentication(
  {},
  credentialsFactory
);

const adapter = new CloudAdapter(botFrameworkAuthentication);

For c# project:

 builder.Configuration["MicrosoftAppType"] = "UserAssignedMsi";
 builder.Configuration["MicrosoftAppId"] = "{your msi’s client id}";
 builder.Configuration["MicrosoftAppPassword"] = "{your msi’s tenant id}";
 builder.Services.AddSingleton<BotFrameworkAuthentication, ConfigurationBotFrameworkAuthentication>();
  1. Update BOT_ID’s value in env file

    Go to your env file. Update BOT_ID’s value to be your newly created managed identity’s client id.

  2. Generate the appPackage with new BOT_ID

  3. Test your bot app

  4. Clean up unneeded resources

    If your bot works, you can delete the old Azure bot service and the old Entra id.

Clone this wiki locally