Registering a Connector App for Microsoft Entra ID (formerly Azure AD)

In order to use the Verba with Microsoft Entra ID, a Connector App has to be registered with the proper settings.

Azure Active Directory is now Microsoft Entra ID.

Step 1 - Log in to https://portal.azure.com/ .

Step 2 - In the left menu, select Microsoft Entra ID, then in the next menu level select App Registrations.

Step 3 - Click on the New registration button.

Step 4 - Provide a name, then click on the Register button.

Step 5 - Once the app is registered, click on the Authentication menu.

Step 6 - Under the Redirect URIs section, set the Type to Web, and set the Redirect URI to the Verba web application URL the following way: https://your_verba_mr_server/verba/azureGraphApiAuthenticator.do

Step 7 - Under the Advanced settings section, the Logout URL has to be set. Since Verba is not using this, it can be anything, so just type in the example.

Step 8 - Click Save.

Step 9 - Click on the Certificates & secrets menu.

Step 10 - Under the Client secrets section, click on the New client secret button.

Step 11 - Provide a description for the client secret, set the expiration, then click on the Add button.

Step 12 - Once the client secret is created, click on the copy icon next to the secret, and save it for later. It cannot be copied later!


Step 13 - Click on the API permissions menu.

Step 14 - Click on the Add permission button.

Step 15 - In the right panel, select Microsoft Graph, then select Application permissions.

Step 16 - Select Directory.Read.All, Group.Read.All and User.Read.All, then click on the Add permissions button.