Skip to main content

Set Up Microsoft Entra ID App Registration

Table of Contents:


Set Up Microsoft Entra ID App Registration

Microsoft Entra ID (formerly Azure Active Directory) is used to create OAuth applications for organization‑wide access in Microsoft 365. This guide walks you through registering an application, assigning Microsoft Graph permissions, and authenticating using client credentials.


Register Your App in Entra ID

  1. Go to the Azure Portal.
  2. Navigate to Microsoft Entra ID
Click '+ Microsoft Entra ID'
Click '+ Microsoft Entra ID'
  1. Navigate to App registrations.
  2. Click + New registration.
Click '+ New registration'
Click '+ New registration'
  1. Fill in:
    • Name – e.g. 360Works Email
    • Supported account types – Accounts in this organizational directory only (Single tenant)
    • Redirect URI → Web:
      • https://oauth.360works.com/oauth
Enter app details & first redirect URI
Enter app details & first redirect URI
  1. Click Register.
  2. Add the second Redirect URI (same page → Right Side Under the URI listing):
    • https://zuluauth.360works.com/zuluauth/auth
Add second Redirect URI
Add second Redirect URI

Create a Client Secret

  1. In your app, open Certificates & secrets.
Open Certificates & secrets
Open Certificates & secrets
  1. Click + New client secret.
  2. Enter a description and select an expiration (maximum 24 months).
Create a new client secret
Create a new client secret
  1. Click Add and copy the secret value (you won’t see it again).

Assign Microsoft Graph API Permissions

  1. Open API permissions.
  2. Click + Add a permissionMicrosoft GraphApplication permissions.
  3. Search Mail and add:
    • Mail.ReadWrite
    • Mail.Send
Add Microsoft Graph application permissions
Add Microsoft Graph application permissions
  1. Click Grant admin consent (Global Administrator required).
Grant admin consent
Grant admin consent

This setup allows your app to read, send, and delete mail across the organization with no per-user consent required.