ערוך

שתף באמצעות


Register mobile apps that call web APIs

This article contains instructions to help you register a mobile application that you're creating.

Supported account types

The account types that your mobile applications support depend on the experience that you want to enable and the flows that you want to use.

Audience for interactive token acquisition

Most mobile applications use interactive authentication. If your app uses this form of authentication, you can sign in users from any account type.

Audience for integrated Windows authentication, username-password, and B2C

If you have a Universal Windows Platform (UWP) app, you can use integrated Windows authentication (IWA) to sign in users. To use IWA or username-password authentication, your application needs to sign in users in your own line-of-business (LOB) developer tenant. In an independent software vendor (ISV) scenario, your application can sign in users in Microsoft Entra organizations. These authentication flows aren't supported for Microsoft personal accounts.

Platform configuration and redirect URIs

Interactive authentication

When you build a mobile app that uses interactive authentication, the most critical registration step is the redirect URI. This experience enables your app to get single sign-on (SSO) through Microsoft Authenticator (and Intune Company Portal on Android). It also supports device management policies.

  1. Sign in to the Microsoft Entra admin center as at least an Application Developer.

  2. Browse to Identity > Applications > App registrations.

  3. Select New registration.

  4. Enter a Name for the application.

  5. For Supported account types, select Accounts in this organizational directory only.

  6. Select Register.

  7. Select Authentication and then select Add a platform.

    Add a platform.

  8. When the list of platforms is supported, select iOS / macOS.

    Choose a mobile application.

  9. Enter your bundle ID, and then select Configure.

    Enter your bundle ID.

When you complete the steps, the redirect URI is computed for you, as in the following image.

Resulting redirect URI.

If you prefer to manually configure the redirect URI, you can do so through the application manifest. Here's the recommended format for the manifest:

  • iOS: msauth.<BUNDLE_ID>://auth
    • For example, enter msauth.com.yourcompany.appName://auth
  • Android: msauth://<PACKAGE_NAME>/<SIGNATURE_HASH>
    • You can generate the Android signature hash by using the release key or debug key through the KeyTool command.

Username-password authentication

Tip

Steps in this article might vary slightly based on the portal you start from.

If your app uses only username-password authentication, you don't need to register a redirect URI for your application. This flow does a round trip to the Microsoft identity platform. Your application won't be called back on any specific URI.

However, identify your application as a public client application. To do so:

  1. Still in the Microsoft Entra admin center, select your app in App registrations, and then select Authentication.

  2. In Advanced settings > Allow public client flows > Enable the following mobile and desktop flows:, select Yes.

    Enable public client setting on Authentication pane in Azure portal

API permissions

Mobile applications call APIs for the signed-in user. Your app needs to request delegated permissions. These permissions are also called scopes. Depending on the experience that you want, you can request delegated permissions statically through the Azure portal. Or you can request them dynamically at runtime.

By statically registering permissions, you allow administrators to easily approve your app. Static registration is recommended.

Next steps

Move on to the next article in this scenario, App code configuration.