Amazon Quick Suite Microsoft Teams extension
The Quick Suite extension for Microsoft Teams integrates AI-powered assistance directly into your team communication workflows. Users can mention @Amazon Quick Suite in conversations to access company knowledge, use configured action connectors, and get contextual assistance without leaving their Teams environment.
The Teams extension enables users to:
-
Mention @Amazon Quick Suite in conversations in Teams channels to add it as a collaborator.
-
Use actions from action connectors configured in Amazon Quick Suite.
-
Access any company knowledge sources added to your Amazon Quick Suite instance from within Microsoft Teams.
Important
-
The Amazon Quick Suite customer integrating Microsoft Teams must have a paid Microsoft Teams organization with an M365 subscription for their organization.
-
Amazon Quick Suite does not use your user data for service improvement or for training its underlying large language models (LLMs).
Prerequisites for Microsoft Teams extension
Before configuring access for the Amazon Quick Suite extension to Microsoft Teams, administrators must complete the following steps:
-
Have a Microsoft 365 Business subscription and be a Global Admin or have administrative permissions (specifically
AppCatalog.ReadWrite.All). -
Have a Amazon Quick Suite instance.
-
Your Microsoft 365 tenant ID. You can find this by going to the Azure portal > Azure Active Directory > Properties, or by using PowerShell. For detailed steps, see How to find your tenant ID - Microsoft Entra
in the Microsoft Learn portal.
If you configured the authentication to connect to Amazon Quick Suite with IAM Identity Center, complete the following additional steps:
-
Ensure you have an IAM Identity Center instance enabled on your AWS account.
-
Use Microsoft Entra ID as your identity provider.
-
Ensure that every user under your Entra ID provider configuration has an email associated with them.
-
Set up SCIM identity propagation between the Microsoft Entra ID instance and IAM Identity Center. For detailed steps, see Configure SAML and SCIM with Microsoft Entra ID and IAM Identity Center.
Note
The Microsoft Teams extension supports only Entra ID authentication with IAM Identity Center.
Configure Microsoft Teams extension access
As an administrator, you must allow the Amazon Quick Suite Microsoft Teams to connect to your Amazon Quick Suite application environment. You can use the Amazon Quick Suite console to manage extension access configurations.
User attribute mapping
When you configure a Microsoft Teams extension, user identity is mapped by default using the following attributes:
-
Amazon Quick Suite user attribute - Email address is used to map Amazon Quick Suite users to their corresponding Microsoft 365 accounts. The system uses the email address to establish the connection between user identities.
-
M365 Office add-in user attribute - User Principal Name (UPN) is used to match against Microsoft 365 user accounts. Users need to use the User Principal Name (UPN) to sign in to Microsoft 365. Email address that works on both cloud and on-premise systems.
These default mappings ensure secure and accurate user identification across both platforms without requiring additional configuration.
Topics
Add Microsoft Teams extension access for accounts using IAM Identity Center and Entra ID
Follow these steps to set up and configure an Azure tenant on your Microsoft Azure portal:
To set up an Azure tenant
-
In the Azure account, create a new app registration.
-
Go to App registrations.
-
In the App registrations screen, choose New registration. Under the Supported account types option, choose Accounts in this organizational directory only (Personal use only - Single tenant). Once finished, choose Register.
-
Note the client ID. You will need this later.
-
Create a client secret for the app registration and keep note of it. You will need this later.
-
-
Add callback URLs for each Region in which your Teams extension will be installed.
-
Navigate to the app registration's Authentication tab.
-
Choose Platform Configurations, Add a platform.
-
Choose Web.
-
Compose a callback URL using the following format, replacing
your-regionwith your Amazon Quick Suite instance Region. The Teams extension supports the following Regions:ap-southeast-2,eu-west-1,us-west-2, andus-east-1.qbs-cell001.dp.appintegrations.your-region.prod.plato.ai.aws.dev/auth/idc-tti/callback -
Insert the callback URL as the redirect URI and choose Configure when done.
-
Follow these steps to configure a Trusted Token Issuer on your IAM Identity Center instance in your AWS Console:
To configure a Trusted Token Issuer
-
Go to your AWS account and navigate to your IAM Identity Center instance.
-
Navigate to Settings, Authentication.
-
Choose Create trusted token issuer.
-
Add the issuer URL, which should follow this template, where
Tenant IDrefers to your Entra tenant ID:login.microsoftonline.com/Tenant ID/v2.0Note
The issuer URL should be the OIDC discovery endpoint of your identity without the well-known document URI path. If you include the well-known document URI path, this will not work. See Trusted token issuer configuration settings.
-
Choose Email as the Identity Provider attribute and IAM Identity Center attribute.
Follow these steps to set up permissions on AWS Console:
To set up permissions
-
Navigate to Secrets Manager on AWS console.
-
Choose Store a new secret.
-
Choose Other type of secret and choose the Plaintext tab.
-
Your secret should be in the following format and use the app registration client ID and app registration client secret that you saved from the earlier steps:
{ "client_id":"Your app registration client ID", "client_secret":"Your app registration client secret" } -
Navigate to the secret you just created and save the ARN for later.
-
Now navigate to IAM on AWS console.
-
Choose Access Management, Roles in the left navigation bar.
-
Choose Create role.
-
Choose Custom trust policy.
-
Configure the role to trust our service principal for the relevant Region that you selected when configuring your Azure app registration by adding the following statement replacing
your-regionwith the Region you chose when creating the Azure app registration:{ "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Principal": { "Service": "your-region.prod.appintegrations.plato.aws.internal" }, "Action": "sts:AssumeRole", "Condition": {} } ] } -
Choose Next.
-
Provide a name and description and choose Create role.
-
Navigate to the role you just created and choose it.
-
Choose Add Permissions, Create inline policy.
-
Choose JSON.
-
Configure the role with permissions to read secrets from Secrets Manager and permissions to invoke
sso:DescribeTrustedTokenIssuerby adding the following statement:{ "Version": "2012-10-17", "Statement": [ { "Sid": "BasePermissions", "Effect": "Allow", "Action": [ "secretsmanager:GetSecretValue", "sso:DescribeTrustedTokenIssuer" ], "Resource": "*" } ] } -
Provide a policy name and choose Create policy.
-
Copy and save the ARN of the IAM role you created for later. You will need it in the next steps.
Now you can follow these steps to create a new extension access configuration that will allow Amazon Quick Suite to integrate with your Microsoft Teams environment:
To create an extension access configuration
-
Sign in to the Amazon Quick Suite console.
-
In the top right, choose the profile picture icon.
-
From the drop-down menu, choose Manage account.
-
Under Permissions, choose Extension access.
-
In the top right, choose New extension access.
-
Select Microsoft Teams. Then, choose Next.
-
Configure the following fields:
-
Name - A name for your extension is pre-filled for you. You can edit this and enter a descriptive name for the Teams extension (maximum 512 alphanumeric characters, hyphens allowed but no spaces).
-
Description (optional) - A description for your extension is pre-filled for you. You can edit this and enter a new description to provide additional context about this extension configuration (maximum 1000 characters).
-
M365 tenant ID - Enter your Microsoft 365 tenant identifier (must be 36 characters).
-
Secrets Role ARN - Paste the ARN of the IAM role you created from the previous steps.
-
Secrets ARN - Paste the ARN of the Secrets Manager secret you created from the previous steps.
-
-
Choose Add to save the new access configuration.
A success message will open up on the top right of your screen.
-
From the success message, choose View extensions to finish installing your extension.
Note
You can also navigate to the installation screen from Connections > Extensions in the Amazon Quick Suite menu.
Once created, this extension access configuration enables authors and other admins in your organization to deploy your Microsoft Teams Amazon Quick Suite extension within your Microsoft Teams environment.
Note
For your end users to begin using your Microsoft Teams extension, an admin or author must finish deploying a extension after you configure extension access. Notify your authors that they can view, edit, and complete installation of this extension under Extensions in the left navigation once it has been shared. To learn how to do this see Installing your Microsoft Teams extension in the Microsoft Teams extension author guide.
Add Microsoft Teams extension access for accounts using other authentication methods
Follow these steps to create a new extension access configuration that will allow Amazon Quick Suite to integrate with your Microsoft Teams environment.
-
Sign in to the Amazon Quick Suite console.
-
In the top right, select the profile picture icon.
-
From the drop-down menu, select Manage account.
-
Under Permissions, select Extension access.
-
In the top right, select New extension access.
-
Select Microsoft Teams, then, Next.
-
Configure the following fields:
-
Name - A name for your extension is pre-filled for you. You can edit this and enter a descriptive name for the Teams extension (maximum 512 alphanumeric characters, hyphens allowed but no spaces).
-
Description (optional) - A description for your extension is pre-filled for you. You can edit this and enter a new description to provide additional context about this extension configuration (maximum 1000 characters).
-
M365 tenant ID - Enter your Microsoft 365 tenant identifier (must be 36 characters).
-
-
Select Add to save the new access configuration.
A success message will open up on the top right of your screen.
-
From the success message, select View extensions to finish installing your extension.
Note
You can also navigate to the installation screen from Connections > Extensions in the Amazon Quick Suite menu.
Once created, this extension access configuration enables authors and other admins in your organization to deploy your Microsoft Teams Amazon Quick Suite extension within your Microsoft Teams environment.
Note
For your end users to begin using your Microsoft Teams extension, an admin or author must finish deploying a extension after you configure extension access. Notify your authors that they can view, edit, and complete installation of this extension under Extensions in the left navigation once it has been shared. To learn how to do this see Installing your Microsoft Teams extension in the Microsoft Teams extension author guide.
Edit Microsoft Teams extension access
Use these steps to modify the configuration settings of an existing Microsoft Teams extension access.
-
Sign in to the Amazon Quick Suite console.
-
In the top right, select the profile picture icon.
-
From the drop-down menu, select Manage account.
-
Under Permissions, select Extension access.
-
Select the three dot menu icon for the Microsoft Teams extension you need to edit.
-
Select Edit.
-
Edit the configuration as required and select Save to confirm the changes.
Your changes to the Microsoft Teams extension access configuration are saved and will take effect immediately.
Delete Microsoft Teams extension access
Follow these steps to permanently remove a Microsoft Teams extension access configuration. This action cannot be undone.
-
Sign in to the Amazon Quick Suite console.
-
In the top right, select the profile picture icon.
-
From the drop-down menu, select Manage account.
-
Under Permissions, select Extension access.
-
Select the three dot menu icon for the Microsoft Teams Extension you need to delete.
-
Select Delete.
-
Enter the word, "confirm", and select DELETE.
Note
Deleting a extension access removes access for all users in your M365 tenant and deletes all extensions created for Teams. If delete extension access fails, the admin must switch to the author view and delete the Teams extensions that are using the configured extension access before returning to delete the extension access.
With Microsoft Teams extension access configured, your team can now use @Quick Suite mentions in conversations to access AI assistance, company knowledge, and action connectors directly within their Teams environment.