SMTP Server Configuration for Cluster and Site Configurations

SMTP server configuration in Cisco Secure Workload enables automated email notifications by allowing administrators to activate or deactivate SMTP settings from the Site Config page during cluster setup. When SMTP is enabled, admins can specify server details, set alert recipient emails, and optionally configure authentication using a username and password. For unauthenticated SMTP, the server will connect without credentials, but secure connections can be enforced using TLS/SSL if required. Disabling SMTP removes all related email fields, though credential management for admin and support users remains accessible. Alert emails are sent to default or customized recipient lists as defined in the alert connector settings.

To configure the SMTP server in the cluster, use either of the following methods:

  • Basic SMTP Authentication

  • Microsoft Modern Authentication (OAuth)

To use the Microsoft Modern Authentication (OAuth) for SMTP configuration, the Secure Workload application is registered in the Azure Active Directory (Azure AD) to generate a client secret, API permissions are configured and the Service Principal for Exchange Online is set up for authentication of client credentials. You can configure the SMTP server settings at the time of deploying the cluster or upgrading to the next version or if there are any changes to the configurations.

Azure AD Application Registration and Client Secret Generation

In Modern Microsoft Authentication (OAuth 2.0) based authorization, a client application must be granted specific permissions, such as the ability to send mails on behalf of users. To perform this, the client must first obtain an access token from an authorization server. Modern Microsoft Authentication specification defines multiple grant types to acquire this access token.

  • Authorization code grant: The user configuring the system is redirected to the authorization server, for example, Azure Active Directory, to authenticate and explicitly authorize Secure Workload to send emails on their behalf. Upon approval, an authorization code is exchanged for an access token..

  • Client credentials: Secure Workload uses its own credentials directly as an authorization grant to request an access token from the authorization server without user interaction.

The Modern Microsoft Authentication flows ensure secure, delegated access control, enabling Secure Workload to send alert emails.

To register Secure Workload as an application in Azure Active Directory, perform the following steps:

Procedure


Step 1

Log in to the Exchange Online Azure portal with admin permissions. Navigate to Azure Active Directory, choose Azure Active Directory > App registrations > New registration.

Fill the following details:

  • Name: Enter a name for the application. Choose a descriptive name for your application (for example, "SMTP Service App" or "CSW SMTP OAuth2".

  • Supported account types: Select the supported account types that aligns with the organization's requirements. Choose the supported account types based on your organization, for example:

    • Single tenant (accounts in the organizational directory)

    • Multi-tenant (any organizational directory)

    • Personal Microsoft accounts

  • Redirect URI: Leave this blank for client credentials flow.

  • Copy the following IDs from the application's Overview page, which are crucial for the cluster configuration:

    • Application (client) ID

    • Directory (tenant) ID

    Note

     

    In Advanced settings, set Allow public client flows to No.

  • Click Register to complete the process.

Step 2

Create a client secret

  • In your newly registered application's page, choose Manage > Certificates & secrets within the Azure portal.

  • Click New client secret to initiate secret creation.

    Provide a meaningful description and specify the secret's expiration period. We recommend selecting an expiry suitable for your use case and rotating secrets regularly for enhanced security. The options include:

    • 6 months

    • 12 months

    • 24 months

    • Custom (set an expiry suited to your security policies)

  • Click Add and then copy and store the generated secret value.

    Note

     

    After you copy the generated secret value, ensure that you securely store it because the secret value will not be displayed again. The secret value will not be available after you leave this page and is essential for your cluster configuration.

Step 3

Configure API permissions for client credentials grant:

  • Choose Manage > API permissions.

  • Click Add a permission and select Select the APIs (for example, Microsoft Graph or custom APIs).

  • Search for and choose Office 365 Exchange Online.

  • Choose Application permissions for daemon or service applications. Do not choose Delegated permissions for user context.

  • Add the required permissions as per your protocol needs.

  • Your Azure administrator must Grant admin consent for your tenant to become effective.


Permissions for SMTP with Modern Microsoft Authentication Client Credentials Flow

For applications sending emails using SMTP with Modern Microsoft Authentication authentication, the following permission is required:

  • Permission Name: SMTP.SendAsApp

  • Purpose: Allows the application to send emails on behalf of any user using SMTP with OAuth authentication.

  • Scope for Token Request: <https://outlook.office365.com/.default>

This permission must be added under Application permissions in the Azure AD app registration for SMTP sending functionality.

Service Principal and Exchange Online Setup

After the app. registration, Azure AD automatically creates a service principal to represent the app's identity within your tenant. This service principal is used to authenticate the application with the granted permissions via the client credentials flow.

Register the service principal in Exchange Online:

  • New-ServicePrincipal -AppId <ApplicationId> -ObjectId <ObjectId>:

    • Replace <ApplicationId> with the Application (client) ID copied from Azure AD (Step 1, point 6).

    • Replace <ObjectId> with the Object ID of the service principal instance, which can be found in Azure AD under Enterprise applications for your registered app.

  • Purpose: Allows the application to send emails on behalf of any user using SMTP with OAuth authentication.

  • Scope for Token Request: <https://outlook.office365.com/.default>

Grant mailbox permissions to the service principal:

  • Add-MailboxPermission -Identity "user@domain.com" -User <ServicePrincipalId> -AccessRights FullAccess

    • Replace "user@domain.com" with the actual email address of the mailbox you want the service principal to access.

    • Replace <ServicePrincipalId> with the identity of the service principal in Exchange. This is often the ObjectId used in the New-ServicePrincipal command or the AppId itself, depending on the Exchange version and configuration.

    These steps allow the service principal to send mail and access mailboxes as configured, leveraging the permissions granted in Azure AD.

Site Configuration in Secure Workload Setup

After you have registered the Azure AD application, configure the SMTP server for Secure Workload clusters either using the Basic SMTP configuration or Microsoft Modern authentication along with the Microsoft SMTP server.

This section explains how Site Admins set up a site during the Secure Workload set up process. During the cluster setup, Site Admins use the SMTP Configuration switch to disable or enable the SMTP settings.

From Secure Workload software release, 3.10 and later, users can configure the email notifier in the Site Config page for managing email and SMTP related configurations.

When SMTP Configuration is Off: Displays the current logged-in admin user (read-only) and mandatory downloadable recovery codes for that user. If the SMTP configuration is disabled, all email and SMTP related fields in the Site Config page will not be available for configurations. However, the UI Admin Username and UI Primary Customer Support Username fields are available to setup passwords and usernames.

Figure 1. Configure Username and Generate Passwords

Field

Description

UI Admin Username

The username of the individual who will be responsible for administering Secure Workload within your organization.

You can edit this field only when SMTP Configuration is disabled.

Note

 

If the entered UI admin username does not exist in the system, a new user is created with the same username, and the field will be updated with the newly created user.​

UI Admin Password

Enter the password of the admin to access the UI cluster. Password must match the password criteria.

UI Admin Confirm Password

Confirm the password of the admin to access the UI cluster. The password must match the password entered for the UI Admin password.

Recovery Codes

Generate recovery codes for Site Admins during deployment and from the User Preferences option after the deployment is complete.

Note

 

Recovery codes are used for enabling password reset by the Site Admins in the event of forgotten passwords. Recovery codes are for one-time use only and can be regenerated.

UI Primary Customer Support username

The username of the individual for the primary point of contact for customer support. This username is used during configuration to streamline support interactions.

Note

 

The username of the primary customer support must be different from the UI Admin Username.

UI Primary Customer Support Password

Enter the password of the UI primary customer support to access the UI cluster. Password must match the password criteria.

UI Primary Customer Support Confirm Password

Confirm the password of the UI primary customer support to access the UI cluster. Password must match the password criteria.


Note


The email addresses are non case-sensitive, use the lowercase version of the email if it contains letters.


If the SMTP configuration is switched On: Users can set up the Email notifier configuration and the SMTP server configurations.

Figure 2. Configure UI Admin, Primary Customer Support, and Admiral Admin Alert Emails

To configure the SMTP server in the cluster, use either of the following methods:

  • Basic SMTP Authentication

  • Microsoft Modern Authentication (OAuth)

The Basic SMTP Authentication method uses SMTP server, SMTP username and SMTP password for authentication. The following parameters are configured for Basic SMTP configuration:

Figure 3. SMTP Username and Password for Authentication

Parameter

Type

Description

SMTP Username

String

(Optional) SMTP server username

SMTP Password

String

(Optional) SMTP server password for the user (if given)

SMTP Server

String

IP address or hostname of the SMTP server

SMTP Port

Number

Listening port of the SMTP server

Secure Connection

Check box

Email address from which alerts are sent

Default Recipients

String

Comma-separated list of recipient email addresses

The Microsoft Modern Authentication (OAuth) method uses SMTP username and password for authentication. The following parameters are configured for Microsoft Modern Authentication:

Figure 4. Configure SMTP Using the Microsoft Modern Authentication

Field

Description

SMTP Server

The name or IP adddress of an SMTP server that can be used by Secure Workload to send email.

SMTP Port

The port number of the SMTP server provided above.

SMTP Username

The username for SMTP authentication.

SMTP OAuth Tenant ID

Enter the tenant Id for operating mails via SMTP in microsoft modern authentication. This can be copied from your azure application.

SMTP OAuth Client ID

Enter the client Id for operating mails via SMTP in microsoft modern authentication . This can be copied from your azure application.

SMTP OAuth Client Secret

Enter the client secret for operating mails via SMTP in microsoft modern authentication. This can be copied from your azure application.

Field

Description

UI Admin Email

The email address of the individual who will be responsible for administering Secure Workload within your organization.

UI Primary Customer Support Email

The email address of primary support. The email must be different from the UI Admin email.

Admiral Alert Email

This email address receives alerts that are related to the cluster health. Must be different from UI Admin Email and UI Primary Customer Support Email.

Configure SMTP in Secure Workload for Microsoft Modern Authentication

After you have registered Secure Workload as an Azure AD application, configure the SMTP server for Secure Workload clusters using either the Basic SMTP configuration or Microsoft Modern authentication along with the Microsoft SMTP server.

Figure 5. Cluster Configuration– SMTP Configuration

Parameter

Description

SMTP OAuth Client ID

Enter the client ID for operating mails through SMTP in microsoft modern authentication. This can be copied from your azure application.

SMTP OAuth Client Secret

Enter the client secret for operating mails through SMTP in microsoft modern authentication. This can be copied from your azure application.

SMTP OAuth Tenant ID

Enter the tenant ID for operating mails through SMTP in microsoft modern authentication. This can be copied from your azure application.

To configure the SMTP server configuration, click the pencil icon next to the SMTP Configuration field. Click the edit check to confirm the edit settings. Use either of the following methods to configure the SMTP configurations:

  • Basic SMTP Configuration

  • Microsoft Modern Authentication (OAuth)

The Basic SMTP Authentication method uses SMTP server, SMTP username and SMTP password for authentication. The following parameters are configured for Basic SMTP configuration:

Figure 6. SMTP Username and Password for Authentication

Parameter

Type

Description

SMTP Username

String

(Optional) SMTP server username

SMTP Password

String

(Optional) SMTP server password for the user (if given)

SMTP Server

String

IP address or hostname of the SMTP server

SMTP Port

Number

Listening port of the SMTP server

Secure Connection

Check box

Email address from which alerts are sent

Default Recipients

String

Comma-separated list of recipient email addresses

The Microsoft Modern Authentication (OAuth) method uses SMTP username and password for authentication. The following parameters are configured for Microsoft Modern Authentication:

Configure SMTP server settings using the Microsoft Modern Authentication for Secure Workload clusters with the following details:

  • Client ID: The Application (client) ID copied during registration.

  • Tenant ID: The Directory (tenant) ID copied earlier.

  • Client Secret: The secret value copied when creating the client secret.


    Note


    The SMTP server: office365.microsoft.com and SMTP Port: 587 are the only values that are supported for Modern Microsoft Authentication at this point.


  • The token endpoint in the Modern Microsoft Authentication scenario would be:

    https://login.microsoftonline.com/<tenant-id>/oauth2/v2.0/token
  • The scope for client-credentials grant type would be:

    https://outlook.office365.com/.default
Figure 7. Configure SMTP Using the Microsoft Modern Authentication

Field

Description

SMTP Server

The name or IP adddress of an SMTP server that can be used by Secure Workload to send email.

SMTP Port

The port number of the SMTP server provided above.

SMTP Username

The username for SMTP authentication.

SMTP OAuth Tenant ID

Enter the tenant Id for operating mails via SMTP in microsoft modern authentication. This can be copied from your Azure application.

SMTP OAuth Client ID

Enter the client Id for operating mails via SMTP in microsoft modern authentication . This can be copied from your Azure application.

SMTP OAuth Client Secret

Enter the client secret for operating mails via SMTP in microsoft modern authentication. This can be copied from your Azure application.