App Registration
Step 4 of onboarding - Connect your Microsoft 365 tenant to Securtea
App Registration
The final onboarding step connects your Microsoft 365 environment to Securtea. This requires creating an Azure app registration with appropriate permissions.
What is an App Registration?
An app registration is a secure identity in Microsoft Entra ID (formerly Azure AD) that allows Securtea to access your Microsoft 365 configuration data. It uses:
- Client ID - A unique identifier for the application
- Client Secret - A password-like credential for authentication
- Permissions - Scoped access to specific Microsoft Graph APIs
Securtea only requests read-only permissions. We never modify your Microsoft 365 configuration.
Prerequisites
Before starting, ensure you have:
- Azure Portal access - You'll create resources in Azure
- Administrative role - Global Administrator, Application Administrator, or Cloud Application Administrator
- Your Microsoft 365 tenant - The tenant you want to connect
Step-by-Step Guide
Step 1: Open Azure Portal
- Navigate to portal.azure.com
- Sign in with your administrative account
- Search for Microsoft Entra ID in the top search bar
- Click on Microsoft Entra ID from the results
Step 2: Create App Registration
- In the left sidebar, click App registrations
- Click + New registration at the top
- Fill in the registration form:
| Field | Value |
|---|---|
| Name | Securtea Integration (or your preferred name) |
| Supported account types | Accounts in this organizational directory only (Single tenant) |
| Redirect URI | Leave blank for now |
- Click Register
Step 3: Copy Application IDs
After registration, you'll see the app overview page. Copy these values:
- Application (client) ID - The unique identifier for your app
- Directory (tenant) ID - Your Microsoft 365 tenant ID
Store these securely - you'll enter them into Securtea.
Step 4: Create Client Secret
- In the left sidebar, click Certificates & secrets
- Click + New client secret
- Enter a description:
Securtea Access - Select an expiration period: 24 months recommended
- Click Add
Immediately copy the secret Value (not the Secret ID). It's only shown once and cannot be retrieved later.
Step 5: Configure API Permissions
- In the left sidebar, click API permissions
- Click + Add a permission
- Select Microsoft Graph
- Select Application permissions (not Delegated)
- Search for and add the following permissions:
| Permission | Purpose |
|---|---|
User.Read.All | Read user profiles |
Directory.Read.All | Read directory configurations |
SecurityEvents.Read.All | Access security alerts |
Policy.Read.All | Read Conditional Access policies |
Group.Read.All | Read group settings |
RoleManagement.Read.Directory | Read role assignments |
- Click Add permissions
Step 6: Grant Admin Consent
After adding permissions:
- Click Grant admin consent for [Your Organization]
- Confirm by clicking Yes
- Verify all permissions show a green checkmark under "Status"
Admin consent is required because these are application-level permissions that access data across your entire tenant.
Step 7: Enter Credentials in Securtea
Return to the Securtea onboarding page and enter:
- Tenant ID - The Directory (tenant) ID from Step 3
- Client ID - The Application (client) ID from Step 3
- Client Secret - The secret value from Step 4
Click Connect to establish the connection.
Step 8: Test the Connection
Securtea will verify the connection by:
- Authenticating with Microsoft Entra ID
- Testing access to Microsoft Graph API
- Confirming permissions are correctly configured
If successful, you'll see a success message and can proceed to your dashboard.
Troubleshooting
Invalid Client Error
Cause: Client ID or secret is incorrect.
Solution:
- Verify the Client ID matches Azure Portal
- Generate a new client secret if needed
- Ensure you copied the secret Value, not the ID
Insufficient Privileges Error
Cause: Missing permissions or admin consent.
Solution:
- Review the permissions in Azure Portal
- Ensure all required permissions are added
- Click "Grant admin consent" again
- Verify checkmarks appear for all permissions
Connection Timeout
Cause: Network or Azure service issues.
Solution:
- Check your internet connection
- Verify Azure services are operational
- Try again in a few minutes
- Check if your firewall blocks Azure endpoints
Tenant Not Found
Cause: Incorrect Tenant ID.
Solution:
- Return to Azure Portal > Microsoft Entra ID > Overview
- Copy the correct Directory (tenant) ID
- Update the value in Securtea
Secret Expired
Cause: The client secret has reached its expiration date.
Solution:
- Go to Azure Portal > App registrations > Your app
- Navigate to Certificates & secrets
- Create a new client secret
- Update the secret in Securtea settings
Security Best Practices
Secret Management
- Rotate secrets regularly - Set a calendar reminder before expiration
- Use appropriate expiration - Balance security with maintenance burden
- Never share secrets - Don't send credentials via email or chat
Permission Scoping
- Request minimum permissions - Only enable what you need
- Review periodically - Remove unused permissions
- Monitor access logs - Azure provides sign-in logs for apps
Access Control
- Limit admin access - Only necessary personnel should manage the app
- Enable alerts - Configure Azure to alert on suspicious app activity
- Document the setup - Keep internal records of the configuration
Managing the Connection
After onboarding, manage your Microsoft 365 connection from Settings > Integrations:
- Test connection - Verify the integration is working
- Update credentials - Change the client secret when needed
- View permissions - See what data Securtea can access
- Disconnect - Remove the integration if needed
What's Next?
Congratulations! You've completed onboarding. You can now:
- Explore the Dashboard - See your security posture at a glance
- Run a Compliance Assessment - Evaluate against security frameworks
- Configure Drift Detection - Monitor for configuration changes
- Invite Team Members - Add your colleagues