Registering a Connector App for Microsoft Entra ID (formerly Azure AD)
In order to use the Verba with Microsoft Entra ID, a Connector App has to be registered with the proper settings.
Azure Active Directory is now Microsoft Entra ID.
- Log in to https://portal.azure.com/ .
- In the left menu, select Microsoft Entra ID, then in the next menu level select App Registrations.
- Click on the New registration button.
- Provide a name, then click on the Register button.
- Once the app is registered, click on the Authentication menu.
- Under the Redirect URIs section, set the Type to Web, and set the Redirect URI to the Verba web application URL the following way: https://your_verba_mr_server/verba/azureGraphApiAuthenticator.do
- Under the Advanced settings section, the Logout URL has to be set. Since Verba is not using this, it can be anything, so just type in the example.
- Click Save.
- Click on the Certificates & secrets menu.
- Under the Client secrets section, click on the New client secret button.
- Provide a description for the client secret, set the expiration, then click on the Add button.
- Once the client secret is created, click on the copy icon next to the secret, and save it for later. It cannot be copied later!
- Click on the API permissions menu.
- Click on the Add permission button.
- In the right panel, select Microsoft Graph, then select Application permissions.
- Select the following permissions, and click Add permissions:
- Group.Read.All
- User.Read.All
- Team.ReadBasic.All