Configure Azure Active Directory
Some of AccessBot features require an Azure Active Directory app and here you’ll learn how to properly configure it.
Set Up Azure Active Directory App
- Go to Azure Portal, click on the top search bar and type “Azure Active Directory”, and then click on the resource:
- On the left side menu, click on “App registrations”:
- Then click on “New registration”:
- Define the name of the application, select the “Single Tenant” option for supported account types and under the “Redirect URL” select the “Web” option and paste
https://<directoryname>.onmicrosoft.com/MicrosoftGraphClient
, replacing<directoryname>
with your Azure Directory name. Then click on “Register”:
- After creating the resource, define the following environment variables using the specified values on the screenshot:
AZURE_AD_APP_ID
- Application (client) IDAZURE_AD_TENANT_ID
- Directory (tenant) ID
- Now, go to “Certificates & secrets”, click on the “Client secrets” tab and click on “New client secret”:
- Type the description, select the wanted expiry time and then click on “Add”:
- Then, copy the secret and define it in the
AZURE_AD_APP_SECRET
environment variable:
- Now click on “API permissions”:
- Click on “Add a permission”:
- On the side modal, click on “Microsoft Graph”:
- Click on “Application permissions”, type “User.Read.All” in the search bar, expand the User permissions, click on the permission checkbox and click on “Add permissions”:
- Then click on “Grant admin consent for <directoryname>” and click on “Yes”:
That concludes the Azure Active Directory App configuration.