
Microsoft Entra ID API Integration Profile
Information and guides about integrating with Microsoft Entra ID API
Add Microsoft Entra ID Integration to Your AppTest Account
Creating Test/Developer account
An Azure account that has an active subscription.
- Create an account for free.
- The Azure account must have permission to manage applications in Microsoft Entra ID. Any of the following Microsoft Entra roles include the required permissions:
- Completion of the Set up a tenant quickstart.
API Access
Creating OAuth Application
Full article: Register an application with the Microsoft identity platform .
First of all you will need to have an MS Azure account. (See more...)
Quick step-by-step guide:
- Sign in to the Microsoft Entra admin center.
- Expand the Identity menu > expand Applications > select App registrations > New registration.
- Enter a display Name for your application.
- Specify who can use the application, sometimes called its sign-in audience.
- Don't enter anything for Redirect URI (optional). You'll configure a redirect URI later.
- Select Register to complete the initial app registration.
When registration finishes, the Microsoft Entra admin center displays the app registration's Overview pane. You see the Application (client) ID. Also called the client ID, this value uniquely identifies your application in the Microsoft identity platform.` 7. Add a redirect URI:
- Under Manage, select Authentication.
- Under Platform configurations, select Add a platform.
- Under Configure platforms, select Web.
- Enter a Redirect URI for your app:
- Select Configure to complete the platform configuration.
- Add credentials:
- Under Manage, select Certificates & secrets > Client secrets > New client secret.
- Select an expiration for the secret or specify a custom lifetime.
- Select Add.
- Record the secret's value for use in your client application code. This secret value is NEVER displayed again after you leave this page.
- Configure API permission:
- Under Manage, select API permissions > select Add API permissions.
- Select Microsoft Graph > select Delegated.
- Enter the necessary permissions for your app and select Add permissions:
- offline_access
- openid
- profile
- Team.Create
- Team.ReadBasic.All
- TeamMember.Read.All
- TeamMember.ReadWrite.All
- User.Read
- User.Read.All
- User.ReadBasic.All
- User.ReadWrite
- User.ReadWrite.All
- Channel.Create
- Channel.Delete.All
- Channel.ReadBasic.All
- Directory.ReadWrite.All
- Group.ReadWrite.All
- Group.Read.All