Skip to content

Lab MCS5 - Power Platform custom connector

In this lab, you are going to understand how to extend an agent made with Microsoft Copilot Studio using a Power Platform custom connector. Specifically, you are going to consume a custom REST API to manage a hypotethical list of candidates for a job role. The API offers functionalities to:

  • List candidates
  • Get a specific candidate
  • Add a new candidate
  • Remove a candidate

In Microsoft 365 Copilot, within Copilot Studio you will be able to rely on these functionalities and enhance the potential of the custom agent that you created in the previous Lab MCS4.

Note

This lab builds on the previous one, Lab MCS4. You should be able to continue working on the same agent, improving its functionalities with new capabilities.

In this lab you will learn:

  • How to expose a REST API through a Power Platform custom connector
  • How to secure communication to an external REST API in the Power Platform
  • How to consume a custom connector from an agent

Exercise 1 : Creating the REST API

For the sake of simplicity in this Lab you are going to use a pre-built REST API. In this exercise you are going to download and configure it, so that you can run it locally.

Step 1: Downloading and testing the REST API

The sample REST API is an Azure Function built with TypeScript and Node.js, named HR Service and you can download its source code from here.

Extract the files from the zip and open the target folder with Visual Studio Code. In the following screenshot you can have an overview of the project structure.

The outline of the HR Service project in Visual Studio Code. There are an http folder with a couple of .http files to test the API, a src folder with sample data and the actual azure function, two Open API specification files, some JSON configuration files.

The main elements of the project outline are:

  • http: in this folder you can find a couple of .http files useful for testing the REST API in Visual Studio Code.
  • src/data/candidates.json: a JSON file with an hypothetical list of candidates, used as the initial data source for the service.
  • src/functions/candidatesFunction.ts: the actual implementation of the Azure Function.
  • src/openapi.json: the Open API specification file for the Azure Function, stored in JSON format.
  • src/openapi.yaml: the Open API specification file for the Azure Function, stored in Yaml format.
  • askCandidateData.json: the JSON of an adaptive card to collect data for a new candidate.
  • dev-tunnel-steps.md: brief set of instructions to build a Dev Tunnel to have a reverse proxy for the REST API running locally.
  • local.settings.json.sample: a sample configuration file that will be used later in this lab.

Rename the file local.settings.json.sample into local.settings.json and press F5 to start the project. In Visual Studio Code, open the file http/ht-service.http and trigger a new request to get the list of candidates by selecting the Send request command near the GET request for http://localhost:7071/api/candidates. On the right side of the screen you will see the output of the request, providing you with few response headers and the JSON list of candidates.

The HTTP request in action in Visual Studio Code. On the left side there is the .http file with the list of requests and the one to list the candidates is highlighted. On the right side there is the response for the get list of candidates request, with some HTTP headers and the JSON body of the response. In the lower part of the screen there is the **Terminal** with an highlighted message about OAuth disabled.

Notice that in the Terminal window, in the lower part of the screen, there is the tracing of the API call that you just triggered and a message stating that OAuth is disabled. Skipping token validation. In fact, right now the API is accessible anonymously.


Step 2: Registering the API in Entra ID

Let's now secure access to the API. First of all, you need to open a browser and, using the work account of your target Microsoft 365 tenant, go to https://entra.microsoft.com to access the Microsoft Entra admin center. Sign in to the admin center, if asked for authentication. Then 1️⃣ select App registrations in the menu bar on the left, and then 2️⃣ select the + New registration command to register a new application in the target tenant.

The Microsoft Entra admin center user interface with highlighting of the **App registration** menu and of the **+ New registration** command.

The Register an application page will show up. Provide a name for the application, for example HR-Service-API. Choose to support authentication only in your target tenant, and select the Register button in the lower part of the screen.

The page to register a new application with the application name "HR-Service-API", the selection of single tenant authentication, and the button to register the application highlighted.

Microsoft Entra will register the application for you and show the Overview page with information about the newly registered application. Copy the value of Client ID and Tenant ID, because you will need them soon.

Select the 1️⃣ Expose an API menu item on the left menu, then 2️⃣ select + Add a scope to add a new permission scope for consuming the custom API. The very first time you add a new scope, you have to configure an Application ID URI. By default, the value will be api://<Client-Id>. Select Save and continue to save the unique URI for the application. Then, 3️⃣ configure the scope settings using the panel that appears on the righ and 4️⃣ select Add scope to confirm the operation.

Creating a scope allows you to define a custom delegated permission scope for you API. Consumers of your API will need to provide OAuth 2.0 tokens with that permission scope in order to being able to consume your API.

The page to configure a new permission scope for the application. On the right side there is a panel to configure bunch of settings for the new permission scope.

Here you can see some suggested values for the permission scope configuration:

  • Scope name: the actual name of the scope. For example: HR.Consume.
  • Who can consent?: defines whether the scope can be consented by admins only, or both by admins and regular users. Choose Admins and users.
  • Admin consent display name: the short display name of the scope for admin consent. For example: HR.Consume.
  • Admin consent description: the description of the scope for admin consent. For example: Allows consuming the HR Service.
  • User consent display name: the short display name of the scope for user consent. For example: HR.Consume.
  • User consent description: the description of the scope for user consent. For example: Allows consuming the HR Service.
  • State: defines whether the scope is Enabled or Disabled. Let's keep it enabled.

Once the permission scope is configured, you will see the new scope in the list of scopes defined for the application.

The permission scope configured for the current application. There is the scope name, who can consent, the admin consent display name, the user consent display name, and the state as enabled.

Now, 1️⃣ select the Manifest menu item on the left menu, 2️⃣ edit the content of the manifest file using the Microsoft Graph App Manifest (new), and 3️⃣ update the requestedAccessTokenVersion property to the value 2. This specifies that the API expects a JWT token of type v2.0.

Note

You can find additional information about the Microsoft Graph App Manifest and the token v2.0 in the article Understand the app manifest (Microsoft Graph format).

The page to edit the manifest of the Entra application. There is the editor with highlighted the property requestedAccessTokenVersion and value of "2".

Now you can go back to Visual Studio Code and configure the local.settings.json file accordingly to the settings of the just registered application. Replace the <Client-ID> and the <Tenant-ID> placeholders with the actual values and turn the UseOAuth property to true.

{
  "IsEncrypted": false,
  "Values": {
    "AzureWebJobsStorage": "UseDevelopmentStorage=true",
    "FUNCTIONS_WORKER_RUNTIME": "node",
    "AAD_APP_CLIENT_ID": "<Client-ID>",
    "AAD_APP_TENANT_ID": "<Tenant-ID>",
    "AAD_APP_OAUTH_AUTHORITY": "https://login.microsoftonline.com/<Tenant-ID>",
    "UseOAuth": false
  }
}

Restart the REST API project and now the API will be secured and will be looking for an OAuth 2.0 token in the Authorization header. If the token will not be provided, or if an invalid token will be provided, the API will respond with a HTTP status 401 (Unauthorized).


Step 3: Configure the dev tunnel

Now, you need to expose the REST API with a public URL. Since you are running the API project locally on your development machine, you need to rely on a reverse proxy tool to expose your localhost via a public URL. For the sake of simplicity, you can use the dev tunnel tool provided by Microsoft, following these steps:

  • Install dev tunnel on your environment following these instructions
  • Login with dev tunnel, executing the following command:
devtunnel user login
  • Host your dev tunnel, executing the following commands:
devtunnel create hr-service -a --host-header unchanged
devtunnel port create hr-service -p 7071
devtunnel host hr-service

The command line will display the connection information, such as:

The devtunnel running in a console window showing the hosting port, the connect via browser URL, and the URL to inspect network activity.

Copy the "Connect via browser" URL and save it in a safe place.

Be sure to leave the devtunnel command running as you do the exercises in this lab. If you need to restart it, just repeat the last command devtunnel host hr-service.


Step 4: Registering the Consumer in Entra ID

In order to consume the API from the Power Platform using a custom connector, you also need to register a consumer application in Microsoft Entra ID. Go back to the Microsoft Entra admin center and select again App registrations in the menu bar on the left, and then select the + New registration command to register a new application in the target tenant. This time, name the new application as HR-Service-Consumer. As like as in Step 1, configure the new application for single tenant authentication and register it.

Microsoft Entra will register the application for you and show the Overview page with information about the newly registered application. Copy the value of Client ID and Tenant ID, because you will need them soon.

The page to create a new client secret for the consumer application in Microsoft Entra ID. There are fields to configure description and duration of the secret, and a command to add the secret.

Select the 1️⃣ Certificates & Secrets menu item on the left menu, then 2️⃣ select + New secret to add a new client secret. Then, 3️⃣ configure a name and a duration for the secret and 4️⃣ select the Add command to create the new secret. Copy the value of the new secret in a safe place, together with the Client ID and Tenant ID that you copied before.

Switch to the permissions page, 1️⃣ select the API permissions menu item on the left menu, then 2️⃣ select + Add a permission. In the panel that shows up on the right side, 3️⃣ select APIs my organization uses, search and 4️⃣ select HR-Service-API.

The page of Microsoft Entra admin center to grant a new permission to the consumer application. There is a panel on the right side with the list of APIs registered in the tenant and the "HR-Service-API" highlighted.

Once you select the targe API, the side panel updates and allows you to select the delegated permission of type HR.Consume that you configured before. Once you picked the permission, select the Add permission command to add it to the consumer application. When the permission has been added, select the Grand admin consent for ... command to grant the permission to the application.

The panel of Microsoft Entra admin center to grant a permission to an application. The group of **Delegated permissions** is selected and the permission of type **HR.Consume** is selected. The **Add permission** command is highlighted.

At the end of this process, the consumer application will be configured with the permissions highlighted in the following screenshot.

The permissions for the consumer applicaiton. There is the permission **User.Read** and there is the permission **HR.Consume**. Both permissions are of type Delegated.

Keep the consumer application tab open, because you will need to update its configuration in the upcoming steps.


Exercise 2 : Creating the custom connector

In this excercise you are going to create the Power Platform custom connector to consume the HR Service API.

Step 1: Creating the custom connector

To create a new custom connector, open a browser and, using the work account of your target Microsoft 365 tenant, go to https://make.powerautomate.com to access Power Automate. On the left-side menu panel, select More, then Discover all, then look for Custom connectors. You can eventually pin the menu item if you plan to use it frequently. The page with the list of custom connectors will appear. Select the command + New custom connector and choose Import an OpenAPI file.

The menu to create a new Power Platform custom connector, highlighting the **Import an OpenAPI file** option.

Provide a name for the connector and browse for the OpenAPI JSON file of the HR-Service. You can also find the file here. Once you have provided a name and the Open API specification file, select the Continue button to complete the connector creation.

The dialog to create a new custom connector starting from an OpenAPI JSON file. There is the name of the connector and the path of the OpenAPI specification file. The **Continue** command is highlighted.

You will see a multi-step/multi-tab registration process showing up. The first tab is the General one, where you can configure a custom icon, color, and description for the connector. In the General tab you also need to configure the Host value, which has to be the host name of the dev tunnel URL that you copied in Exercise 1 - Step 3. Last but not least, you need to configure the Base URL, where you can leave the default value /.

The tab to configure **General** settings for the Power Platform custom connector. There are fields to configure icon, background color, description, protocol (HTTP or HTTPS), hostname, and base URL. There is a **Security** command at the bottom of the page.

Select the Security command at the bottom of the page to switch to the security settings for the connector. In the Security tab select OAuth 2.0 as the authentication type. Then choose Azure Active Directory as the flavor of OAuth 2.0 protocol to support.

The authentication type settings for the **Security** tab of the custom connector. The selected value is OAuth 2.0.

Once you have selected OAuth 2.0 as the authentication type and Azure Active Directory, the tab will prompt you to provide all the needed settings to properly configure security for the custom connector. Specifically, you need to provide:

  • Client ID: the <Client-Id> of the consumer application that you registered in Exercise 1 - Step 4.
  • Client secret: the <Client-Secret> of the consumer application that you registered in Exercise 1 - Step 4.
  • Authorization URL: the Entra ID authorization URL. Should always be the default one, unless you are using GCC tenants.
  • Tenant ID: the <Tenant-Id> of the consumer application that you registered in Exercise 1 - Step 4.
  • Resource URL: The <Application-ID-URI> that you registered in Exercise 1 - Step 2 for the HR-Service-API application. Should be something like api://<Client-Id>, where this time the <Client-Id> is the one of the HR-Service-API application.
  • Enable on-behalf-of login: Keep it with value False.
  • Scope: the scope that you configured for the HR-Service-API application in Exercise 1 - Step 2. It should be HR.Consume.
  • Redirect URL: this is a read-only field that you will use soon.

The settings for OAuth 2.0 when Azure Active Directory is selected. There are settings for Client ID, Client secret, Authorization URL, Tenant ID, Resource URL, Enabled on-behalf-of login, Scope, Redirect URL.

Now save the connector settings by selecting the Create connector command in the upper right corner of the tab. Once the connector will be saved, the Security tab reloads and you will be able to see an actual value for the Redirect URL field. Copy that value and go back to Microsoft Entra ID admin center. Go to the consumer application that you registered in Exercise 1 - Step 4 and 1️⃣ select the Authentication menu item on the left menu, then 2️⃣ select + Add a platform. In the panel that shows up on the right side, 3️⃣ select Web, and the 4️⃣ paste the Redirect URL that you just copied from the custom connector interface and 5️⃣ select Configure to confirm the new settings.

The page to configure **Web** authentication for the consumer application.

You have just configured the consumer application to support the Power Platform as a redirect URL when completing the authentication flow.

The panel to configure the consumer application with **Redirect URL** for **Web** authentication.

Now you can go back to the custom connector definition and you can move to the Definition tab. There you will find all the operations exposed by the REST API. Their definition was retrieved by the OpenAPI specification file. You don't need to do anything here. You can simply switch to the Test tab, if you like, in order to test that the REST API is working as expected.


Step 2: Testing the custom connector

In he Test tab you can see the list of operations on the left side. Choose one operation, like for example getCandidates, then connect to the target connector selecting the + New connection command and following the prompts of Power Platform to authenticate. Once the connection is ready, you can test the selected operation by selecting the Test operation command and looking for the output in the lower part of the screen.

The test page of the Power Platform custom connector, where you can invoke the target API providing credentials through a connection. In the upper part of the screen there is the configured connection. In the middle of the screen there is the operation to test. In the bottom part of the screen there is the output of the test HTTP request.


Exercise 3 : Consuming the custom connector

In this excercise you are going to consume the custom connector that you created in Exercise 2.

Step 1: Consuming the custom connector from the agent

In this step you are going to consume the custom connector from the agent for Microsoft 365 Copilot Chat that you created in Lab MCS4.

Open a browser and, using the work account of your target Microsoft 365 tenant, go to https://copilotstudio.microsoft.com to start using Microsoft Copilot Studio.

Then 1️⃣ browse the list of agents in Copilot Studio and 2️⃣ select the agent with name Copilot for Microsoft 365.

The interface of Microsoft Copilot Studio when browsing the whole list of agents and selecting the **Copilot for Microsoft 365** agent.

Now, edit the Agentic HR agent, go to the Actions section and select + Add action. Follow the instructions that you have already seen in Lab MCS4 - Exercise 2 - Step 1. However, this time select the Custom connector group of actions and search for HR-Services. You will see the actions defined in the HR-Services connector that you created in Exercise 2 - Step 1.

Select the Get all candidates action and confirm to connect to the target custom connector. Configure the action as follows:

  • Name: Get all candidates.
  • Description: Lists all the HR candidates from an external system.
  • Authentication: User authentication.

Add the action by selecting the Add action command. Once you have created the new action, disable the old action that you created in Lab MCS4 - Exercise 2 - Step 1. To disable an action, click on the three dots (...) beside the action and toggle the Status to Off.

The status menu item do enable/disable an action in an agent for Microsoft 365 Copilot Chat.

Publish the updated agent and once it is ready and updated, test the new action providing the following prompt in the Microsoft 365 Copilot Chat:

Lists all the HR candidates from an external system

Microsoft 365 Copilot Chat will ask you to allow consuming the external REST API. Select the command Allow once if you want to test the whole process multiple times, or Always allow if you want to consent consuming the REST API for any further request.

Microsoft 365 Copilot Chat prompting the user to consent consumption of the HR Service external REST API. There are commands to **Always allow**, **Allow once**, or **Cancel**.

Then Microsoft 365 Copilot Chat will then ask you to sign-in to securely access the external REST API, providing you a message like the following one.

Microsoft 365 Copilot Chat prompting the user to sign-in to consume the external REST API. There is a command **Sign in to Agentic HR** to trigger authentication.

Select Sign in to Agentic HR to authenticate and connect to the target custom connector. Once the connection is established, go back to the Microsoft 365 Copilot Chat and run one more time the same prompt as before. You will see the list of candidates as they are defined in the HR Service project and, in the lower part of the response, you can notice there is the icon informing you that the response came from the external service.

Microsoft 365 Copilot Chat providing the list of candidates retrieved from the external API.

For the sake of completeness, go to Visual Studio Code and notice that in the Terminal area, in the lower part of the screen, there is tracing of to the REST request processed by the API. Notice also the message Token is valid for user <username> highlighted in the following screenshot and showing that the request was authenticated for the user consuming the API from within Microsoft 365 Copilot.

The **Terminal** window of Visual Studio Code with tracing information.

Wonderful! You were able to configure a custom connector and consume it within Microsoft 365 Copilot Chat!


CONGRATULATIONS!

You have completed Lab MCS5 - Power Platform custom connector!

Congratulations! You have completed all the labs in the Make path!