Skip to main content

Registration and Permissions Assignment

This section discusses the GroupID application registration and permission assignment procedure.

  1. Login to Microsoft Entra Admin Center (https://portal.azure.com/) with a user that is part of the “Global Administrator” role or any role that has rights to register an app, such as the “Application administrator” role. This is required in order to give consent to certain permissions in the application.

  2. In the Microsoft Entra Admin Center, go to Microsoft Entra ID > App registration and click New registration.

    App registeration page

  3. On the Register an application page, specify a name for the app. Select Supported account types as Accounts in any organizational directory (Any Microsoft Entra ID – Multitenant). Leave the Redirect URI as is and click Register.

    Register an application

  4. The Overview page is displayed. Copy the Application (client) ID and keep it safe.

    Overview page

  5. Go to the Authentication node and set it as follows:

    Authenticate node

  6. Click Save.

  7. Click Roles and administrators node.

    Roles and Administration page

  8. On the All roles page, add your registered application to a directory role.

    • Global administrator: For Global administrator, type global to filter out the Global administrator role. Click Global administrator.

      All roles page

      Click Add assignments. On the Add assignment page, search your application and select it. Click the Add button. The application will be listed on the Assignments page.

      Add assignment page

    • For any role other than Global administrator, add the registered application to the following two directory roles:

      • Exchange administrators: can manage all aspects of the Exchange product

      • User administrators: (User Account Administrator) can manage all aspects of users and groups, including resetting passwords for limited administrators.

        For example, this role does not allow deleting a global administrator. User Account Administrators can change passwords for users, Helpdesk administrators, and other User Account Administrators only.

        NOTE: By default, the GroupID Administrator security role in a Microsoft Entra IDidentity store binds to Global Administrator. If minimum role assignment for the service account is used, the default Admin Security role criteria should also be changed to the User Account Administrators group.

  9. Click Add.

  10. Go to the API permissions node and select Add a permission.

    API Permission page

  11. The Request API permissions page opens. Click the Microsoft Graph API tab.

    Request API permissions page

  12. Click the Application permissions tab:

    Application permissions tab

    Permissions get listed on the page. See the Microsoft Entra ID Permissions topic for the mandatory permissions that are required for creating the desired directory object.

  13. [Optional] To add a permission from Office 365 Exchange Online API, click the Add a permission button (before the Grant admin consent for <username> button in the snapshot given in point # 14.

    Follow the steps shown on the following snapshot:

    Office 365 Exchange Online API

  14. [Optional] To access the SharePoint API for Entitlement management, click the Add a permission button (before the Grant admin consent for <username> button in the snapshot given in point # 14). Select the SharePoint API:

    SharePoint API card

  15. Select the Delegated permissions tab:

    SharePoint Delegated permissions

    See SharePoint Delegated Permissions section of the Microsoft Entra ID Permissions topic for the required permission name.

This completes the registration process of GroupID in Microsoft Entra ID.

See Also