Salt la conținutul principal

Register a custom web app in Microsoft Entra ID

Follow the steps below to register a custom web app in Microsoft Entra ID. Users can sign in to the web app using their browser and the acquired token.

Register a custom web app

  1. Sign in to the Azure portal as an admin.

  2. If you have access to multiple tenants, use the Directory + subscription filter Directory + subscription filter in the top menu to select the tenant in which you want to register an application.

  3. Search for and select Microsoft Entra ID.

  4. Under Manage, select App registrations > New registrations.

  5. Specify the name and select an account type. Select the first option unless your organization's preferences specify otherwise.

  6. Under Redirect URI (optional), select Web and specify the redirect URI. Typically, this is the URL of your web app, or localhost for development. You can add more redirect URIs under Manage > Authentication.

  7. Select Register.

Register an application

Under Overview, you can copy and make a note of the Application (client) ID. You need this value for authentication.

Create a client secret

  1. Under Manage, select Certificates & secrets > New client secret.

  2. Enter a description and how long the client secret will be valid. Then, select Add.

  3. Copy and make a note of the client secret in the Value field.

    NOTE

    Make sure you copy this value now. This value will be hidden after you leave this page.

OIDC Client secret

Configure API permissions

  1. Under Manage, select API permissions. The Microsoft Graph User.Read permissions should already be selected.

  2. Select + Add a permission. In the side panel, open the APIs my organization uses tab, and select the CDF API, for example westeurope-1.

  3. For Delegated permissions, select the required permissions for your application, for example user_impersonation. The delegated permissions filter the permissions a user has based on group memberships, but don't add any permissions.

    To use the token inspection endpoint, select IDENTITY.

    Learn more about the available permissions here.

  4. Select Add permissions. The API permissions should look similar to this:

    API permissions
  5. Select Grant admin consent for... and confirm that you want to make the new list of permissions active.