Skip to main content

Create Entra App for Universal Controller

We will begin by setting up Entra for the Universal Controller.

Step 1

Log into the Microsoft Azure Portal using your admin credentials.

Step 2

Go to Azure > Enterprise Applications.

Step 3

From Enterprise applications, click New application.

Then click create your own application.

Step
4

When creating a new application in Microsoft Entra ID, enter a descriptive name for the application that will be used to integrate with the Universal Controller. This application represents the Universal Controller. In this example, we will call it universal-controller-app.

Select the Register an application to integrate with Microsoft Entra ID (App you're developing) option**.**

Then, click create.

Your newly registered application should now be available under Enterprise applications.

Step
5

Select Single tenant for those who can access the application

Add a Web Redirect URI in the format {Cluster Node Base Redirect URL} (for example, https://uacURL/login/oauth2/code/default).

Click Register.

Step
6

Go to Enterprise Applications > All Applications

Click Refresh and select the universal-controller-app from the list.

Click Single sign-on from the left navigation, and then click Go to Application.

Step
7

From the Overview, take note of both the Application (client) ID and Directory (tenant) ID, as we will need this information later.

Click Endpoints. Find the OpenID Connect metadata documentvalue.

Open this URL in your browser and take note of the Issuer.

Step
8

Go to Certificates & Secrets > Client secrets.

Click New client secret.

Specify a Description with expiry time interval according to your company's standards. Click Add.

Click the clipboard icon to copy the Value and store it securely, as you will need this information later.

Step
9

Go to Token configuration. Click Add groups claim.

In the opened dialog, select Security Groups, and assign sAMAccountName to the ID and Access token properties.

Click Add.

Step
10

Go to Token configuration. Click Add optional claim.

Select ID from the options, and choose email, family_name and given_name.

Click Add.

Check Turn on the Microsoft Graph email, profile permission (required for claims to appear in token).

Click Add.

Step
11

Go to Token configuration. Click Add optional claim again.

This time, select Access from the options, and choose email, family_name and given_name.

Click Add.

Step
12

Go to Token configuration

Once you are all done, confirm you have all the claims in place.

Step
13

Go to Manifest

Select AAD Graph APP Manifest.

Find this line:

"accessTokenAcceptedVersion": null

Update the value to 2:

"accessTokenAcceptedVersion": 2

Click Save.

Step
14

Go to Manifest

Select Microsoft Graph App Manifest (New).

Find this line:

"requestedAccessTokenVersion": null

Update the value to 2:

"requestedAccessTokenVersion": 2

Click Save.

Step
15

Go to Users and groups.

Assign the users and groups you would like to give access to Universal Controller and Universal Portal.