Configure Azure Active Directory
Some of AccessBot features require an Azure Active Directory app and here you’ll learn how to properly configure it.
Set Up Azure Active Directory App
- Go to Azure Portal, click on the top search bar and type “Azure Active Directory”, and then click on the resource:

- On the left side menu, click on “App registrations”:

- Then click on “New registration”:

- Define the name of the application, select the “Single Tenant” option for supported account types and under the “Redirect URL” select the “Web” option and paste
https://<directoryname>.onmicrosoft.com/MicrosoftGraphClient, replacing<directoryname>with your Azure Directory name. Then click on “Register”:

- After creating the resource, define the following environment variables using the specified values on the screenshot:
AZURE_AD_APP_ID- Application (client) IDAZURE_AD_TENANT_ID- Directory (tenant) ID

- Now, go to “Certificates & secrets”, click on the “Client secrets” tab and click on “New client secret”:

- Type the description, select the wanted expiry time and then click on “Add”:

- Then, copy the secret and define it in the
AZURE_AD_APP_SECRETenvironment variable:

- Now click on “API permissions”:

- Click on “Add a permission”:

- On the side modal, click on “Microsoft Graph”:

- Click on “Application permissions”, type “User.Read.All” in the search bar, expand the User permissions, click on the permission checkbox and click on “Add permissions”:

- Then click on “Grant admin consent for <directoryname>” and click on “Yes”:

That concludes the Azure Active Directory App configuration.