Office365
Last updated
Last updated
Navigate to the Azure portal.
Sign in with your Azure account credentials.
In the left-hand navigation pane, click on "App registrations."
Click on "New registration" to create a new application.
Fill in the required information:
Name: Give your application a meaningful name.
Supported account types: Choose the appropriate option (e.g., "Accounts in this organizational directory only").
Click on "Register" to create the application.
After registering the application, go to the "Overview" page.
Note down the "Application (client) ID" and "Directory (tenant) ID." The client ID is used for authentication, and the tenant ID is needed to identify the Azure AD directory.
In the left-hand navigation pane, click on "Certificates & Secrets."
Under the "Client secrets" section, click on "New client secret."
Enter a description, choose the expiry period, and click "Add."
After creation, note down the secret value. This is your Client Secret. Copy it immediately, as it won't be visible again.
In the Azure portal, go to "App Registrations."
Select the app you are configuring.
Under "Manage," select "API permissions."
Under "Configured permissions," select "Add a permission."
Choose "Microsoft APIs" tab, then select "Microsoft Graph."
Select "Application permissions."
Expand the appropriate permission groups and select the checkboxes for the following permissions:
Directory.AccessAsUser.All
Directory.ReadWrite.All
User.ReadWrite.All
UserAuthenticationMethod.ReadWrite.All
Select "Add permissions" and wait a few minutes before proceeding to the next step.
Select "Grant admin consent for (your tenant name)."
If not signed in with a Global Administrator account, sign in with an account in your Azure AD B2C tenant assigned at least the Cloud application administrator role.
Select "Grant admin consent for (your tenant name)."
Select "Refresh," and verify that "Granted for..." appears under Status. It may take a few minutes for the permissions to propagate.