Your OAuth redirect issue requires addressing all three key areas systematically.
OAuth App Registration:
In Azure AD, your app registration needs these exact settings:
Application Type: Web
Redirect URIs:
- https://your-instance.aras.cloud/oauth/callback
- https://your-instance.aras.cloud/auth/msproject/callback
API Permissions:
- Microsoft Graph: Tasks.ReadWrite, Project.Read
- Grant admin consent: Yes
The MS Project connector uses a specific callback path that’s different from general OAuth flows. You need both URIs registered because Aras cloud uses different paths for initial auth versus refresh token flows.
Redirect URI Configuration:
In your Aras cloud instance, navigate to Administration > OAuth Providers and configure the MS Project integration:
Provider: Microsoft Project Online
Client ID: {your-azure-app-id}
Client Secret: {your-azure-secret}
Redirect URI: https://your-instance.aras.cloud/auth/msproject/callback
Tenant ID: {your-azure-tenant-id}
Critical point: The redirect URI in Aras MUST exactly match one of the URIs registered in Azure AD, including the protocol (HTTPS), domain, and path. Case sensitivity matters.
Azure AD Integration:
The MS Project integration requires additional Azure AD configuration beyond basic authentication:
- Enable ID tokens in Azure AD app manifest:
"oauth2AllowIdTokenImplicitFlow": true
-
Configure token version to v2.0 for better compatibility with cloud services
-
Add the Microsoft Graph API with delegated permissions (not application permissions) - this is crucial for accessing user-specific Project data
-
Grant admin consent at the tenant level, not just user level
For the specific error you’re seeing, the mismatch between /auth/callback and /callback suggests your Aras OAuth configuration is using a generic callback path instead of the MS Project-specific one. Update your OAuth provider configuration to use the correct path: /auth/msproject/callback.
Also verify in your Azure AD app’s Authentication settings that you’ve enabled “Access tokens” and “ID tokens” under Implicit grant and hybrid flows. MS Project integration requires both token types.
If you’re still seeing issues after these changes, check the Aras server logs for the exact redirect URI being sent to Azure. There might be a proxy or load balancer rewriting the URL. You can verify this by capturing the actual OAuth request with browser developer tools - compare the redirect_uri parameter in the authorization request to what’s registered in Azure AD.
One final note: After updating Azure AD settings, there’s sometimes a propagation delay of 5-10 minutes before changes take effect globally. Clear your browser cache and test the OAuth flow again after waiting a bit.