Configure Azure Apps for the UTM
Last adaptation to the version: 12.7.0
New:
- Azure AD is now named Entra ID
This article refers to a Beta version
Preliminary note
This article includes descriptions of third-party software and is based on the status at the time this page was created.
Changes to the user interface on the part of the manufacturer are possible at any time and must be taken into account accordingly in the implementation.
All information without warranty.
- Application ID
- Client ID
- Secret client key
- Launch Azure Active Directory admin center
- Note down/Copy Tenant ID from the Entra ID menu
- Register new app under theApp registration menu under the New registration button
- Assign a unique name and click the register button
- Note Application ID, alternatively the Directory ID (Client ID) can be found here
- In the API permissions menu, click the Add a permission button.
- Select the Group.Read.All permission in the Application permissions tab
- Select the User.Read.All authorisation in the Application authorisation tab
- In the menu API permissions activate the entry Grant admin consent for [...].
- Create a Client secret in the Certificates & secrets menu
- Note down Value, will be entered as Secret Value
- This completes the configuration in Microsoft Azure.
The Microsoft servers may take up to 30 minutes before access works
| 1. | 2. | 3. |
| Abb.1 | Abb.2 | Abb.3 |
| Abbildungen | ||

Fig.4
A summary of the newly registered app is displayed
The Object ID displayed here does not belong to the app and is not needed!
Select API permissions menu

Fig.6

Fig.7

Fig.8








