Registering a Connector App for Microsoft Entra ID (formerly Azure AD)

In order to use the Verba with Microsoft Entra ID, a Connector App has to be registered with the proper settings.

Azure Active Directory is now Microsoft Entra ID.

  1. Log in to https://portal.azure.com/ .
  2. In the left menu, select Microsoft Entra ID, then in the next menu level select App Registrations.
  3. Click on the New registration button.
  4. Provide a name, then click on the Register button.
  5. Once the app is registered, click on the Authentication menu.
  6. Under the Redirect URIs section, set the Type to Web, and set the Redirect URI to the Verba web application URL the following way: https://your_verba_mr_server/verba/azureGraphApiAuthenticator.do
  7. Under the Advanced settings section, the Logout URL has to be set. Since Verba is not using this, it can be anything, so just type in the example.
  8. Click Save.
  9. Click on the Certificates & secrets menu.
  10. Under the Client secrets section, click on the New client secret button.
  11. Provide a description for the client secret, set the expiration, then click on the Add button.
  12. Once the client secret is created, click on the copy icon next to the secret, and save it for later. It cannot be copied later!
  13. Click on the API permissions menu.
  14. Click on the Add permission button.
  15. In the right panel, select Microsoft Graph, then select Application permissions.
  16. Select the following permissions, and click Add permissions:
    • Group.Read.All
    • User.Read.All
    • Team.ReadBasic.All