Skip to content

Latest commit

 

History

History
58 lines (35 loc) · 2.94 KB

Lab-03-App-Registration-AAD.md

File metadata and controls

58 lines (35 loc) · 2.94 KB
title description audience ms.date author ms.topic ms.custom
Set up your Azure Active Directory App registration
In this section, you will configure your Microsoft 365 tenant and enable it to use Data Connect.
Developer
04/30/2021
fercobo-msft
tutorial
scenarios:getting-started, languages:ASP.NET

Set up your Azure Active Directory App registration

In this exercise you will create, run, and approve an Azure Data Factory pipeline to extract data from Microsoft 365 to an Azure Storage Blob for additional processing.

Create a Microsoft Azure Active Directory application registration

The first step is to create an Azure AD application that will be used as the security principal to run the data extraction process.

  1. Open a browser and go to your Azure Portal.

  2. Sign in using an account with Global administrator rights to your Azure and Microsoft 365 tenants.

  3. On the sidebar navigation, select Azure Active Directory (Azure AD).

  4. On the Azure AD Overview page, select App registrations from the Manage section of the menu.

  5. Select the New registration button.

    A screenshot showing the App registrations in the Azure Active Directory service in the Azure portal.

  6. Use the following values to create a new Azure AD application and select Register.

    • Name: Microsoft Graph Data Connect Data Transfer
    • Supported account types: Accounts in this organizational directory only.
    • Redirect URI: Leave the default values.

    A screenshot showing the steps to register a new application registration in the Azure portal.

  7. Locate the Application (client) ID and copy it as you will need it later in this tutorial. This will be referred to as the service principal ID.

  8. Locate the Directory (tenant) ID and copy it as you will need it later in this tutorial. This will be referred to as the tenant ID.

  9. On the sidebar navigation, select Certificates and secrets under Manage.

  10. Select the New client secret button. Set Description to any name, set Expires to any value in the dropdown and choose Add.

    A screenshot showing the process to create a new client secret in the Azure portal.

    • After the client secret is created, make sure you save the Value somewhere safe, as it will no longer be available later, and you will need to create a new one.
    • This will be referenced as the service principal key.
  11. On the sidebar navigation for the application, select Owners.

  12. Verify that your account is listed as an owner for the application. If it isn't listed as an owner, add it.

    A screenshot showing a user verifying that their account is set as owner for the application registration in the Azure portal.