Skip to content

Configuring Microsoft Azure

This guide walks you through creating an Azure app registration with the required permissions for integration. Complete these steps in the Azure Portal before configuring the service account.

Prerequisites

  • Access to the Azure Portal.
  • Azure Active Directory administrator permissions to create app registrations and grant admin consent.
  • Permissions to create client secrets.

Access App Registrations

  1. Log in to the Azure Portal.
  2. Type App Registrations in the search bar at the top of the page.
  3. Select App Registrations from the search results. microsoft-azure-access-app

Register New Application

  1. Click New Registration in the toolbar.
  2. Enter a descriptive Application Name. microsoft-azure-register-app

  3. Select the appropriate Tenant Type:

    • Single tenant: Only users in your organization can access this application.
    • Multi-tenant: Users from multiple organizations can access this application.
  4. Click Register.

Azure creates the app registration and displays the Overview page.

Configure Microsoft Graph API Permissions

The app registration requires specific Microsoft Graph permissions to access user directories, groups, and organizational data.

Add Application Permissions

  1. Click API Permissions in the left sidebar.
  2. Click Add a Permission in the main panel.
  3. Select Microsoft Graph from the right sidebar. microsoft-azure-graph

  4. Click Application Permissions (not Delegated permissions). microsoft-azure-permissions

Select Required Permissions

Add the following permissions by searching for each one and checking its checkbox:

  • User.ReadBasic.All: Read basic profiles of all users
  • People.Read.All: Read all users' relevant people lists
  • Group.Read.All: Read all groups
  • Directory.Read.All: Read directory data
  • User.Read.All: Read all users' full profiles
  • GroupMember.Read.All: Read all group memberships
  • AuditLog.Read.All: Read audit log data

After selecting all permissions, click Add Permissions at the bottom of the panel.

Application permissions require administrator consent before they take effect.

  1. Click Grant Admin Consent for [Your Organization] in the API permissions page.
  2. Review the permissions in the confirmation dialog.
  3. Click Yes to grant consent.

Azure marks all permissions with a green checkmark, indicating admin consent was granted successfully.

Retrieve Authentication Credentials

The platform requires three pieces of information from your app registration: Client ID, Tenant ID, and Client Secret.

Copy Client ID and Tenant ID

  1. Click Overview in the left sidebar (if not already on the Overview page).
  2. Locate the Application (client) ID field.
  3. Click the copy icon next to the ID to copy it to your clipboard.
  4. Store this value securely, you'll enter it as the Client ID.
  5. Locate the Directory (tenant) ID field.
  6. Click the copy icon next to the ID to copy it to your clipboard.
  7. Store this value securely, you'll enter it as the Tenant ID.

Create Client Secret

Client secrets authenticate the platform when accessing Microsoft Graph APIs.

Generate New Secret

  1. Click Certificates & Secrets in the left sidebar.
  2. Click the Client Secrets tab.
  3. Click New Client Secret.
  4. Enter a Description for the secret. microsoft-azure-description

  5. Select an Expiration Period:

    • 90 days (3 months): Highest security, requires frequent rotation.
    • 180 days (6 months): Balanced security and maintenance.
    • 365 days (12 months): Lower maintenance, requires careful monitoring.
    • Custom: Set a specific expiration date.
  6. Click Add.

Azure generates the secret and displays it in the client secrets list.

Copy Secret Value

Critical: Azure displays the secret value only once at creation. You cannot retrieve it later.

  1. Locate the Value column in the client secrets list.
  2. Click the copy icon next to the secret value.
  3. Store this value securely, you'll enter it as the Client Secret.

Note

If you lose the secret value, you cannot retrieve it from Azure. You must create a new client secret and update the configuration.

Set Expiration Reminders

Client secrets expire based on the period you selected. Set calendar reminders to rotate secrets before they expire to prevent service disruptions.

Recommended reminder schedule:

  • 30 days before expiration: Begin planning secret rotation.
  • 7 days before expiration: Create a new secret and test in the non-production environment.
  • 2 days before expiration: Update production configuration with the new secret.

Next Steps

You now have all the credentials required to configure the Microsoft Azure service account:

  • Client ID: Application (client) ID from the Overview page.
  • Tenant ID: Directory (tenant) ID from the Overview page.
  • Client Secret: Secret value you copied when creating the client secret. Return to the platform and enter these credentials in the Microsoft Azure service account configuration form. Refer to the Service Account guide for detailed instructions.