Creating an App Registration in Microsoft Entra
Required Role: Microsoft Azure Admin (Global Admin preferred)
To connect your tenant to Active Directory, you must first create an app registration.
- Log in to Microsoft Entra as an admin user (Global Admin is recommended).
- Navigate to Entra ID > App registrations.
- Click + New registration.
- Enter the following details:
- Name: Use a clear, identifiable name (e.g.,
Barista-[TenantName]) - Supported account types: Select Accounts in this organizational directory only to map to a directory in Microsoft Azure.
- If this option is unavailable, you are not registering the app within a directory.
- Name: Use a clear, identifiable name (e.g.,
- Click Register.
From the Overview page, copy and securely save the following values (you will need them to setup the integration with Barista):
- Application (client) ID
- Directory (tenant) ID
Grant Permissions in Microsoft Graph
Required Role: Global Administrator
If you do not have this role, coordinate with a Global Admin to grant consent. The integration will not work without admin consent.
- Open your Barista app registration.
- Navigate to API permissions in the left menu (or search in the top search bar)
- Click + Add a permission.
- Select Microsoft Graph.
- Choose Application permissions.
- Add the following permissions:
Directory.Read.AllFiles.ReadWrite.AllGroup.Read.AllSites.ReadWrite.AllUser.Read.AllUser.ReadBasic.All
- Click Add permissions.
Add delegated permissions:
- Click + Add a permission again.
- Select Microsoft Graph > Delegated permissions.
- Add the following:
emailoffline_accessopenidprofile
- Click Add permissions.
- Click Grant admin consent for [tenant name]
Assign Password Administrator Role
Required Role: Microsoft Azure Admin
This section is only required if Barista will perform password resets.
- Go to Microsoft Entra ID (previously called Azure Active Directory).
- Click Roles and administrators.
- Search for “password”.
- Click “Password administrator”.
- Click Add assignments.
- On the left side menu, search for your app registration name.
- Select the app registration listed.
- Click Add.
Create a Client Secret
Required Role: Microsoft Azure Admin
- Open your Barista app registration.
- Navigate to Certificates & secrets.
- Select the Client secrets tab.
- Click + New client secret.
- Enter:
- Description: (e.g.,
Barista-[TenantName]-Secret) - Expiration: Set as required
- Description: (e.g.,
- Click Add.
Copy and securely store the Client Secret value.
Important:
- The Client Secret is shown only once.
- If lost, you must delete and recreate it.
- Use the value under the VALUE column, not the Secret ID. Using the Secret ID will cause the integration to fail.
Identify Your Azure Group
The Azure group determines which users receive proactive notifications, including the Welcome message, ITSM ticket updates, announcements, and approvals.
Users outside of this group can still interact with Barista, but will not receive proactive notifications.
- Navigate to Entra ID > Groups > All groups.
- Search for and select the appropriate group.
Supported group types:
- Security Group
- Mail-enabled Security Group
- Distribution Group
- Microsoft 365 Group
- Open Properties.
- Copy and save the Object ID. This will be required to complete the integration.