Set up a Microsoft Entra application for authentication

Third party custom applications will require the use of OAuth as authentication type and you will first need to register an application in Microsoft Entra ID to enable this authentication. This application will be used to authenticate and retrieve an authorization token that is required to invoke the REST APIs used by the application. You can read more about authentication scenarios and follow the steps below:

NOTE: For a complete view of how to create and configure an Azure App Registrations, review the Quick start: Register an application with the Microsoft identity platform documentation.

  1. Provision the Assist API Service Principal:

    a. In a new browser window, navigate to the following URL:
    https://login.microsoftonline.com/common/oauth2/v2.0/authorize?client_id=2b8844d8-6c87-4fce-97a0-fbec9006e140&response_type=code&redirect_url=https://assist.microsoft.com/authenticate&response_mode=query&scope=2b8844d8-6c87-4fce-97a0-fbec9006e140/.default&state=12345

    • This URL prompts the user to log in to Microsoft Entra ID using the following parameters:
    • client_id=2b8844d8-6c87-4fce-97a0-fbec9006e140 – This is the application ID for the Business Assist API.

    • response_type=code

    • response_mode=query

    • redirect_url=https://assist.microsoft.com/authenticate – The Business Assist API authentication

    • scope=2b8844d8-6c87-4fce-97a0-fbec9006e140/.default – The default permission scope for the Business Assist API

    • state=12345 – A generic required parameter for Microsoft Entra authentication

    b. Login using your Microsoft Entra credentials for your tenant.

    c. Once the login process has completed, you will see a user token in the browser window. This token can be disregarded for now. In the background, this process will trigger the auto provisioning of the Assist API Service Principal which will be needed to complete step 4 below.

  2. Create a Microsoft Entra App Registration

    a. Navigate to https://portal.azure.com to open the Azure Portal for your tenant.

    b. Select Microsoft Entra service.

    c. In the Microsoft Entra blade, select App Registrations from the left menu.

    d. Select the + New registration button to open the new App Registration dialog.

    e. Enter the following in the new App Registration dialog:

    i. Name: Business Assist API

    ii. Supported account types: This Organization Only

    iii. Redirect URL: https://assist.microsoft.com/authenticate

    f. Click Register at the bottom of the dialog to create the App Registration.

    g. From the App Registration Overview page, note down the displayed: Application (Client) ID and the Directory (tenant) IDs as these will be required later.

App registration view

  1. Add a Client Secret to the App Registration

    a. From the left menu, select Certificates & secrets.

    b. Select + New client secret.

    i. Enter BA API Postman Secret in the Description field.

    ii. Leave the default Expires time span set at the recommended 6 months.

    iii. Select Add at the bottom of the dialog to add the secret.

    c. From the Certificates & secrets page, note the Value data shown for the new client secret. This value will only be displayed once.

Certificates and secrets

  1. Add the Required API Permissions

    a. From the left menu, select the API Permissions item.

    b. Select + Add a permission.

    i. In the Request API Permissions flyout, select the APIs my organization uses tab.

    ii. In the flyout dialog, select APIs My Organization Uses

    iii. Select AssistAPI from the list of applications.

    Request API permissions form with Business Assist selected

    iv. Select Application Permissions.

    v. Select Assist.All.

    vi. Select Delegated Permissions

    vii. Select Assist.All

    viii. Select Add Permissions.

    Add API permissions form with Add permissions selected.

  2. From the API Permissions page, grant admin consent for the Assist.All API permissions.

Note: The admin consent procedure must be completed by a Global Administrator or Privileged Role Administrator within the tenant.

At this point, you now have a valid Microsoft Entra app registration that can be used to authenticate against Microsoft Entra ID. The next step is to validate and test the connection to the Business Assist API using Postman.

Next steps

Authenticate to AD and retrieve an access token: