Skip to main content

Mobile AAD Setup – Creating Azure AD Client Registration (Client Side)

Written by Denisa Arjoca
Updated over 2 months ago

This is effectively creating the registration for the client side applications that are allowed to authenticate against the Azure Active Directory.

  1. Open the Azure portal (https://portal.azure.com) and log in with your credentials.

  2. Make sure that you are using the appropriate Azure tenant domain. We recommend that the default xxx.onmicrosoft.com tenant be used (eg. mytenant.onmicrosoft.com)

  3. Find the menu item “Azure Active Directory”. As there are a few ways to find the link on the portal, the simplest way is to perform a search for “Active Directory” and it will be listed as a service.

  4. Once you have found the option, select it and then select “App registrations”; you will be presented with the following screen:

    App registrations screen

  1. Select “+ New application” at the top, you will get the following screen:

    Open

    Register an application screen

  2. Fill in the following details:

    • Name – This is the name of the application, it must be the value M1xApps

    • Supported account types – Select “Accounts in this organizational directory only

    • Platform configuration – Select “Client Application (Web, iOS, Android, Desktop+Devices)

      Once the details are filled in, click the “Register” button.

  3. Click “API Permissions” on the left menu. On the right of “Microsoft Graph (1)”, there are three dots. Right-click to bring up a menu, then select “Remove all permissions”. A prompt will ask you to confirm, click “Yes, remove” to remove this item:

    A screenshot of a cell phone

Description automatically generated
  4. Click “+ Add a permission”, ensure “Microsoft APIs” are selected at the top and click on “Microsoft Graph

    Open

    Request API permissions screen

    A screenshot of a cell phone

Description automatically generated
  5. Select “Delegated permissions”, scroll down to “User” and expand the tree. Tick the item “User.Read” and then click “Add permissions”:

    Open

    Request API permissions screen

    A screenshot showing User.Read ticked
  6. Click “+ Add a permission” again, ensure “My APIs” are selected at the top and click on “M1x”:

    A screenshot of a cell phone

Description automatically generated
  7. Expand “User” then tick the boxes that correspond to “user_impersonation” and “User.Read”. Click “Add permissions” when done:

    Open

    Select permissions screen

    A screenshot of a cell phone

Description automatically generated
  8. Click “Expose an API” on the left side menu.

  9. Note that the heading “Application ID URI” near the top will have a “Set” link, click “Set” to open the dialogue that will allow you to set an application ID URI:

    A screenshot of text

Description automatically generated
  10. Enter the Application ID URI as the combination of the default tenant with HTTPS at the beginning and the GUID that was originally in the dialogue after “api://” value (eg. https://mytenant.onmicrosoft.com/xxxxxx-xxx-xxx-xxxxxxxxxx). Click “Save” to set the Application ID URI.

  11. Click “+ Add a scope” and you will see the following dialogue:

    Open

    Add a scope dialogue

    A screenshot of a cell phone

Description automatically generated
  12. Fill in the following details:

    • Scope name – This is the name of the scope, it must be the value user_impersonation

    • Who can consent? – Select “Admins and users

    • Admin consent display name – Enter the value Access M1x

    • Admin consent description – Enter: Allow the application to access M1x on behalf of the signed-in user.

    • User consent display name - Enter the value Access M1x

    • User consent description – Enter: Allow the application to access M1x on your behalf.

      Once the details are filled in, click the “Add scope” button.

  13. Select “Authentication” on the left menu; you will see:

    Open

    Authentication screen

    A screenshot of a cell phone

Description automatically generated
  14. Click “+ Add a Platform”, then select “Web”:

    Open

    Configure platforms screen

    A screenshot of a cell phone

Description automatically generated
  15. Enter the default tenant address with the M1xApps directory at the end (eg. https://mytenant.onmicrosoft.com/M1xApps) as the value within “Redirect URIs” and ensure that “Access tokens” and “ID Tokens” are ticked. Click “Configure” when done”:

    Open

    Configure Web screen

  16. The following steps are for M1x iOS applications, skip to step 22 if you are not using iOS-based applications. Click “+ Add a Platform”, then select “Mobile and desktop applications”:

    Open

    Configure platforms screen

    A screenshot of a cell phone

Description automatically generated
  17. In the prompt “Custom redirect URIs”, enter the value urn:ietf:wg:oauth:2.0:oob and then click “Configure”:

    Open

    Configure Desktop + devices screen

    A screenshot of a cell phone

Description automatically generated
  18. The following steps are for M1x Android applications, skip to step 27 if you are not using Android based applications. Click “+ Add a Platform”, then select “Android”:

    Open

    Configure platforms screen

    A screenshot of a cell phone

Description automatically generated
  19. The following screen will be presented after clicking “Android”:

    Open

    Configure your Android app screen

    A screenshot of a cell phone

Description automatically generated
  20. Fill in the following details:

    • Package name – This is the name M1x application package, the full list will be presented below. (eg. com.coins.mobile.mtech)

    • Signature hash – This should be the value bgwlNQRdrlgStkPJCxMddteK5X8=

      Once the details are filled in, click the “Configure” button.

      The full list of production M1x Android package names are as follows (for development or QA versions, contact Mobile Support or Mobile Development):

      com.coins.mobile.mtech

      com.coinsglobal.mtech

      com.pervasic.mfm

      com.pervasic.mcare

      com.pervasic.mtick

      com.pervasic.msite

      com.coinsglobal.poreceipts

      com.coinsglobal.mforms

      com.coinsglobal.msales

      com.coinsglobal.crm

  21. Once you have clicked “Configure”, you will see the following screen. Click “Done” to save:

    Android configuration screen

    A screenshot of a cell phone

Description automatically generated
  22. Repeat steps 22 to 25 for each M1x Android application that will be used.

  23. Click on “Branding” on the left menu, then fill in the “Home” with the default tenant URL and the M1xApps directory (eg. https://mytenant.onmicrosoft.com/M1xApps). Click “Save” when done:

    Open

    Branding screen

    A screenshot of a cell phone

Description automatically generated
Did this answer your question?