How to integrate Microsoft Entra account?
Overview
To authenticate, you will need to provide the following information:
- Client ID
- Client Secret
- Tenant ID
Step 1: Login to Microsoft Entra (Azure AD) Portal
- Go to Microsoft Azure
- Sign in with the Microsoft account that has access to your Teams tenant (typically an admin account).
Step 2: Register Your Application
- Once logged in, select "App registrations" from Azure Services.
- Click on "+ New registration".

- Fill the registration details:
- Name: Give your app a name (e.g., Demo App)
- Supported account types: Choose
- Accounts in any organizational directory (Any Microsoft Entra ID tenant - Multitenant)
- Redirect URI: Since there is no need for users to sign in to this application directly, you can choose ‘Single-page application (SPA)’ for the redirect URI and leave it blank.

- Click Register.
Step 3: Get the Client ID and Tenant ID
-
After the app is registered, you will land on the app overview page.
-
Copy the following:
- Application (client) ID → This is your Client ID
- Directory (tenant) ID → This is your Tenant ID
Step 4: Generate Client Secret
- Go to Certificates & secrets in the left sidebar

- Under Client secrets, click + New client secret
- Add: - Description: (e.g., App Secret) - Expires: Select an expiration duration (e.g., 6 months or 1 year)
- Click Add
- Copy the Value immediately — this is your Client Secret
Required Application Permissions
Permissions | Type |
---|---|
AuditLog.Read.All | Application |
Directory.Read.All | Application |
Group.ReadWrite.All | Application |
GroupMember.ReadWrite.All | Application |
User.Read | Application |
User.ReadWrite.All | Application |
UserAuthenticationMethod.ReadWrite.All | Application |
How to Add these Permissions
- Go to API Permissions from left navigation
- Click + Add a permission

- Select:
- Microsoft Graph
- Choose:
- Application permissions for background apps
- Add the required permissions listed above and click Add permissions
- Click Grant admin consent