Breadcrumbs

Microsoft Entra ID Domains - Register application in Azure

This guide will show you how to configure Azure to integrate MS Entra ID with Portal 360.

After completing the settings below, you will have configured the Azure portal and will have the information necessary to register the Microsoft Entra ID domain with the NDD Print Portal Portal 360.

The permissions requested in this guide are necessary for subsequent mapping of attributes suggested on the screen for creating the domain integrated with MS Entra in Portal 360.


Access the Azure Dashboard

  1. Log in to the Azure Portal and access the Home Page.

    RegistrodeApp 1-20260303-130120.png


  2. In the search bar, type ‘entra’ and select the Microsoft Entra ID option.

    RegistrodeApp 2-20260303-131552.png


The account used to log in to Azure must have management permissions over the domain to be integrated.

  1. Go to the Users tab to verify that you are managing the correct domain.


Creating the Application

  1. Within the settings of the domain to be integrated, in the side menu, search for and select ‘Application registrations’.

    RegistrodeApp 3-20260303-131416.png


  2. On the next screen, click ‘New registration’.

    RegistrodeApp 4-20260303-132125.png


  3. On the creation screen, provide a suggestive name for the application.

    RegistrodeApp 5-20260303-132225.png


  4. For supported account types, select the option indicated according to the context of your environment.

    RegistrodeApp 6-20260303-130120.png

At this point, we will not configure the redirect URLs.

  1. Click ‘Register’ to complete the creation.

  2. The newly created application will appear in the application list, as shown below:

    RegistrodeApp 7-20260303-132510.png

Setting Application Permissions

NDD Print Portal 360 will perform a data synchronisation with the MS Entra ID domain, using the newly created application. To do this, you will need to configure the appropriate permissions.

RegistrodeApp 8-20260303-130120.png

How to add new permissions:

  1. Access the application in the list.

  2. In the side menu, select ‘API Permissions’.

    RegistrodeApp 9-20260303-132601.png


  3. Click on the ‘Add a permission’ button.

    RegistrodeApp 10-20260303-132715.png


  4. In the flyout that opens, select the ‘Microsoft Graph’ option.

    RegistrodeApp 11-20260303-132758.png


Selecting the type of permission:

  • The flyout will display two categories:

    • Delegated Permissions

    • Application Permissions

      RegistrodeApp 12-20260303-132845.png


The choice depends on the permission to be configured:

  • If it is delegated, select Delegated Permissions

  • If it is application, select Application Permissions

  1. After choosing the category, enter the name of the permission, select the corresponding checkbox, and click ‘Add Permissions’.

RegistrodeApp 13-20260303-133040.png

Administrator Consent:

  1. Some permissions require the consent of the administrator of the domain. These permissions will be highlighted in the list.

    RegistrodeApp 14-20260303-133146.png


  2. If your account has administrative privileges, the button will be displayed: ‘Grant administrator consent for [Domain Name]’. Click on it to complete the process:

    RegistrodeApp 15-20260303-133211.png

Gathering Information for the 360 Portal

To complete the integration, you will need to gather the following information:

  • Application ID (Client)

  • Application Domain

  • Directory ID (Tenant)

  • Client Secret

Obtaining the information

Application ID (Client):

  • Go to the ‘Overview’ tab of the application.

    RegistrodeApp 16-20260303-133305.png


Application Domain:

  • Find this information using the path shown in the application panel.

Tip: It is usually visible next to the tenant identifier and other basic information.

RegistrodeApp 17-20260303-133436.png

Next:

RegistrodeApp 18-20260303-133522.png

Directory ID (Tenant):

  • Also located in the ‘Overview’ tab of the application.

    RegistrodeApp 19-20260303-133638.png


Client Secret:

  • In the side menu, access the ‘Certificates and Secrets’ tab.

RegistrodeApp 20-20260303-133714.png


  • Click on ‘New Client Secret’.

    RegistrodeApp 21-20260303-133742.png


  • Add a descriptive name, choose the latest expiry date available and client in ‘Add’

    RegistrodeApp 22-20260303-133905.png


  • The secret will be displayed in the list.

    Copy the value using the button next to the secret.

    RegistrodeApp 23-20260303-133959.png

The secret value must be stored in a secure location and shared only with the necessary people.


If you need more information about application registrations in environments that use Azure AD,

follow the official link:

https://learn.microsoft.com/pt-br/entra/identity-platform/howto-create-service-principal-portal