Overview
Pre-built tooling
✅ Authorization
✅ Authorization
✅ Read & write data
✅ Read & write data
Tools | Status |
---|---|
Pre-built integrations | 🚫 (time to contribute: <48h) |
API unification | ✅ |
2-way sync | ✅ |
Webhooks from Nango on data modifications | ✅ |
Real-time webhooks from 3rd-party API | 🚫 (time to contribute: <48h) |
Proxy requests | ✅ |
✅ Observability & data quality
✅ Observability & data quality
Tools | Status |
---|---|
HTTP request logging | ✅ |
End-to-type type safety | ✅ |
Data runtime validation | ✅ |
OpenTelemetry export | ✅ |
Slack alerts on errors | ✅ |
Integration status API | ✅ |
✅ Customization
✅ Customization
Tools | Status |
---|---|
Create or customize use-cases | ✅ |
Pre-configured pagination | 🚫 (time to contribute: <48h) |
Pre-configured rate-limit handling | 🚫 (time to contribute: <48h) |
Per-customer configurations | ✅ |
Pre-built integrations
No pre-built integration yet (time to contribute: <48h)Not seeing the integration you need? Build your own independently.
Access requirements
Pre-Requisites | Status | Comment |
---|---|---|
Paid dev account | ✅ Not required | Free, self-signup for a Microsoft account and Azure account. |
Paid test account | ✅ Not required | Free Microsoft account can be used for testing. |
Partnership | ✅ Not required | |
App review | ⚠️ Conditional | Required only if you want to publish your app to the Microsoft commercial marketplace or if your app needs admin consent for certain permissions. |
Security audit | ✅ Not required |
Setup guide
1
Create a Microsoft account and Azure account
If you don’t already have them, sign up for a Microsoft account and an Azure account.
2
Register an application in Microsoft Entra ID
- Sign in to the Microsoft Entra admin center as at least an Application Developer.
- If you have access to multiple tenants, use the Settings icon in the top menu to switch to the tenant in which you want to register the application.
- From the search bar at the top of the Azure portal, search for App registrations and select it. Then choose New registration. Or from your left navigation tab, navigate to Applications > App registrations then choose New registration.
- Enter a meaningful name for your application, for example “Nango Integration”.
- Under Supported account types, select the appropriate option based on your needs:
- Accounts in any organizational directory - For multitenant apps that you want users in any Microsoft Entra tenant to be able to use.
- Accounts in any organizational directory and personal Microsoft accounts - For multitenant apps that support both organizational and personal Microsoft accounts.
- Leave the Redirect URI section blank for now; we’ll configure it in a later step.
- Click Register to complete the app registration.
3
Note your application (client) ID
After registration, you’ll be taken to the application’s Overview page. Record the Application (client) ID, which uniquely identifies your application and is used in your application’s code as part of validating security tokens.
4
Add a redirect URI
- In the left sidebar, select Authentication.
- Under Platform configurations, select Add a platform.
- Select Web as the platform type.
- Enter
https://api.nango.dev/oauth/callback
as the Redirect URI. - Under Implicit grant and hybrid flows, check the boxes for Access tokens and ID tokens if your application needs them.
- Under Advanced settings, set Allow public client flows to No for web applications.
- Click Configure to save your changes.
5
Add API permissions
- In the left sidebar, select API permissions.
- Click Add a permission.
- Select Azure Blob Storage to integrate with Azure Blob Storage.
- Choose the type of permission:
- user_impersonation - This allows the application to access Azure Storage on behalf of the signed-in user.
- Click Add permissions.
6
Assign role to the application
- In the Azure Portal, navigate to your Storage Account.
- In the left sidebar, select Access control (IAM).
- Click Add > Add role assignment.
- In the Role dropdown, select Storage Blob Data Contributor.
- Under Assign access to, select User, group, or service principal.
- Click Select members, search for the application name we created earlier, and select it.
- Click Next, then Review + assign to complete the role assignment.
7
Create a client secret
- In the left sidebar, select Certificates & secrets.
- Under Client secrets, click New client secret.
- Enter a description for the secret and select an expiration period (6 months, 12 months, 24 months, or custom).
- Click Add.
- Important: Copy the secret value immediately and store it securely. You won’t be able to see it again after you leave this page.
8
Configure token settings (optional)
- In the left sidebar, select Token configuration.
- Here you can configure optional claims to be included in the ID and access tokens issued to your application.
- Click Add optional claim if you need to include additional information in your tokens.
9
Configure app visibility (optional)
If you want users to see your app on their My Apps page:
- From the search bar at the top of the Azure portal, search for Enterprise applications, select it, and then choose your app.
- On the Properties page, set Visible to users? to Yes.
10
Next
Follow the Quickstart.
Need help getting started? Get help in the community.
Useful links
Contribute useful links by editing this page
Common Scopes
Scope | Description |
---|---|
offline_access | Access to refresh tokens for offline access |
https://storage.azure.com/.default | Allow the application to access Azure Storage on behalf of the signed-in user |
API gotchas
- Make sure you request the
offline_access
scope to get a refresh token and keep access with your integration. - If you require a user to reauthenticate and force them to accept scopes that have been updated or changed you can force a prompt via the
authorization_params
:
Contribute API gotchas by editing this page
Going further
Connect to Azure Blob Storage
Guide to connect to Azure Blob Storage using Connect UI