Register a company application in Microsoft Entra ID

Last modified by Sabrina V. on 2025/06/05 11:26

Enterprise applications are often used as an interface between Microsoft Entra and internally used applications, for example to give employees access to Microsoft 365. To do this, you need to register one or more applications centrally. This chapter provides an introduction to how you can register enterprise applications and assign permissions to them. It applies to the following areas of application:

Preparing for the Microsoft Entra ID

In order to work in one of the above application areas, you must first open the Microsoft Entra Admin Centre and register a company application. You will then need to grant the necessary permissions within that application. These steps are necessary to enable ACMP to access and import the required data.

Register an Enterprise Application

First, log in to your Microsoft Entra ID. Click the Identity > Manage tab > Enterprise Applications and create a new application registration.

68_Unternehmensanwendung registrieren_App Registrierung Oberfläche_1919.png

App registrations in Microsoft Entra ID

Enter all the necessary information there: Assign an app name and select the accounts to be supported. Complete the process by clicking Register.

68_Unternehmensanwendung registrieren_App Registrierung neue anlegen_1919.png

Register an application

When you open the application you have created, you will see a summary of the information you have added. This includes the display name, details of the supported account types and the various IDs (application, object and directory ID). You will need the latter details (the IDs) if, for example, you want to create a new portal for Microsoft 365.

68_Unternehmensanwendung registrieren_Zusammenfassung der Anwendungsinformationen_1919.png

Summary of application information

Distribute permissions

Next, grant the company application the necessary permissions so that it can access the interface. To do this, switch to the Permissions area within the registered app (Manage > API permissions).

68_Unternehmensanwendung registrieren_Berechtigungen hinzufügen_1919.png

Add permissions

Add permissions Click on Add permission. A page will open where you can request API permissions. In this step, you must select Microsoft Graph.

68_Unternehmensanwendung registrieren_API-Berechtigungen Microsoft Graph anfordern_850.png

API permissions: Request Microsoft Graph

Depending on the area for which you want to grant authorisations, a distinction is made between ‘Delegated authorisations’ and ‘Application authorisations’. The tables below show the authorisations that you must insert here for the respective area.

Microsoft 365

Only the application permissions are required to use Microsoft 365. Insert the following values individually and repeat the procedure until both list entries have been added:

Type: Application
User.Read.All
Organization.Read.All

Warning  Warning:  

Only the application authorisations need to be assigned, not the delegated authorisations!

Setting up OAuth 2 on the ACMP Server

Type: Delegated
IMAP.AccessAsUser.All
POP.AccessAsUser.All
SMTP.Send
offline_access

ACMP Intune Connector

Type: DelegatedType: Applicatione
DeviceManagementManagedDevices.Read.AllDeviceManagementApps.Read.All
DeviceManagementManagedDevices.ReadWrite.AllDeviceManagementConfiguration.Read.All
User.ReadDeviceManagementManagedDevices.PrivilegedOperations.All
 DeviceManagementManagedDevices.Read.All
 DeviceManagementManagedDevices.ReadWrite.All
 DeviceManagementServiceConfig.Read.All

Once you have selected all permissions, click Add permissions. You can then see the items in the overview (the following example describes the application permissions added for Microsoft 365).

68_Unternehmensanwendung registrieren_Anwendungsberechtigungen erteilen_1914.png

Grant application permissions (without consent)

You may need to grant your consent to the permissions if you have not already done so. To do this, click on the field Grant administrator consent for ‘%Your company%’. This changes the status and the user consent is deployed.

68_Unternehmensanwendung registrieren_Status gewährt_1919.png

Approved application authorisations

Specify authentication types: Secret client key or upload certificates

Regardless of the application, you must specify authentication types for all areas. You can choose between two methods supported by the Microsoft Client Credentials Provider: Certificate or Secret Client Key.

Hinweis  Note:  

The procedure varies depending on the authentication type selected. Read below to find out what you need to bear in mind for each method.

Upload certificate

Hinweis  Note:  

Due to the higher security level, Microsoft recommends using a certificate as login information.

Certificates can be used as an authentication method to log in to Microsoft Entra ID. A certificate always consists of a public and a private part, with the public key being loaded directly into Microsoft Entra ID. Both parts are required at a later stage when you add the certificate to the connection information for creating a new portal. This certificate pair must be generated in advance. Read here how to create a certificate via Microsoft or Open SSL. Due to the higher security level, Microsoft recommends using a certificate as login information

Hinweis  Note:  

The PKCS#12 or PFX/P12 format is often used for certificates. This is not supported by ACMP, as the certificate and key files are combined in a single file. However, you can use the OpenSSL commands openssl pkcs12 -in path.p12 -out newfile.crt -clcerts –nokeys for the certificate and openssl pkcs12 -in path.p12 -out newfile.pem -nocerts –nodes for the private key to generate two files from the file.
You can find continuing info on this topic in the section Managing certificates.

Navigate to the Certificates & Secrets item within the previously registered application. Click on the Certificates tab in the details and upload the certificate you created earlier.

68_Unternehmensanwendung registrieren_Zertifikat_1915.png

Upload a certificate

A field will open on the right-hand side where you can upload the certificate. Browse to the appropriate folder, upload the file and enter an optional description for the certificate. Then click Add and the certificate will be stored for the application.

Hinweis  Note:  

Please note that only .cer, .pem and .crt file types are supported when uploading a certificate.

68_Unternehmensanwendung registrieren_Hochgeladenes Zertifikat in Microsoft Entra_1919.png

Certificate uploaded to Microsoft Entra

Add secret client key

The secret client key is a character string that is used in the company application as an authentication key or proof of identity when requesting the token. To do this, switch to the Certificates & Secrets area within the registered application. Click on the Secret Client Keys tab in the details and create a new key.

68_Unternehmensanwendung registrieren_Geheimen Clientschlüssel_1919.png

Secret client key

When creating a new secret client key, you have the option of configuring its validity period. Please note that once the validity period has expired, a new key must be created and stored.

68_Unternehmensanwendung registrieren_Geheimen Clientschlüssel_1919.png

Add secret client key

Hinweis  Note:  

If you want to use the secret client key for the ACMP Intune Connector, you must create a new key after the validity period has expired and store it in the AESB.

Hinweis  Note:  

You will need the secret client key you created at a later point (e.g. when setting up AESB or in Microsoft 365 to create new portals in the ACMP Console). Therefore, save the secret client key so that you can access it later.

Next steps

Now that you have registered the company application and granted the necessary permissions, you can switch to the respective application area and continue with your work: 

© Aagon GmbH 2025
Besuchen Sie unsere neue Aagon-Community