Displaying Microsoft Entra ID app registration main data
The information about the Microsoft Entra ID app registration is loaded into One Identity Manager during synchronization. You cannot edit Microsoft Entra ID app registration main data.
To display a Microsoft Entra ID app registration's main data
-
In the Manager, select the Microsoft Entra ID > App registrations category.
-
Select the Microsoft Entra ID app registration in the result list.
-
Select Change main data.
Table 45: Main data of a Microsoft Entra ID app registration
Display name |
Display name of the application. |
Client |
Microsoft Entra ID tenant of the app registration. |
Token issuance policies |
Name of the policy for issuing tokens. |
Token lifetime policy |
Name of the policy for token lifetimes. |
Owner (Application Role) |
Application roles whose members can configure the app registration. |
Registration date |
Date and time when the application was registered. |
Logo URL |
Link to the application's logo. |
Marketing URL |
Link to the application's marketing page. |
Privacy statement URL |
Link to the application's privacy statement. |
Service URL |
Link to the application's support page. |
Terms of service URL |
Link to the application's terms of service. |
Publisher domain |
Name of the application's verified publisher domain. |
Group membership claim |
Group membership claim expected by the application. Group types that are included in the access, ID, and SAML tokens. |
Supported user accounts |
Specifies which Microsoft user accounts for the current application are supported. Permitted values are:
-
Accounts in this organizational directory only
-
Accounts in any organizational directory
-
Accounts in any organizational directory and personal Microsoft accounts
-
Only personal Microsoft accounts |
Tags |
User-defined string to use for categorizing and identifying the application. |
Fallback public client |
Specifies whether the fallback application type is a public client, such as an application installed and running on a mobile device. The default value is false meaning the fallback application type is a confidential client such as a web application. If the option is disabled, it means that the fallback application type is a confidential client, such as a web application (default). |
Displaying information about Microsoft Entra ID service principals
When an application is registered in a Microsoft Entra ID tenant in Microsoft Azure Management Portal, it creates an associated Microsoft Entra ID service principal.
The information about the Microsoft Entra ID service principal is loaded into One Identity Manager during synchronization. You cannot create new Microsoft Entra ID service principals in One Identity Manager.
If a Microsoft Entra ID application is used in a Microsoft Entra ID tenant that is registered in another Microsoft Entra ID tenant, only the Microsoft Entra ID service principal and not the Microsoft Entra ID app registration is loaded into One Identity Manager.
To display information about a Microsoft Entra ID service principal
-
In the Manager, select the Microsoft Entra ID > Service principals category.
-
In the result list, select the Microsoft Entra ID service principal.
-
Select one of the following tasks:
-
Microsoft Entra ID service principal overview: This shows you an overview of the Microsoft Entra ID service principal and its dependencies.
-
Change main data: This displays the Microsoft Entra ID service principal's main data.
-
Assign owners: This displays the Microsoft Entra ID service principals owners. You can assign owners to a service principal or remove them.
-
Assign authorizations: This displays user accounts, groups, and service principals with their assigned app roles. You can create more authorizations or removed them.
Assigning owners to Microsoft Entra ID service principals
Use this task to assign owners to a Microsoft Entra ID service principal or to remove them from a service principal.
To assign owners to a Microsoft Entra ID service principal
-
In the Manager, select the Microsoft Entra ID > Service principals category.
-
In the result list, select the Microsoft Entra ID service principal.
-
Select the Assign owner task.
-
In the Table drop-down, select one of the following entries.
-
In the Add assignments pane, assign owners.
TIP: In the Remove assignments pane, you can remove assigned owners.
To remove an assignment
- Save the changes.
Editing authorizations for Microsoft Entra ID service principals
There are so-called app roles defined for app registrations. Microsoft Entra ID users, Microsoft Entra ID groups, or Microsoft Entra ID service principals can use app roles to provide permissions or functions for the application.
App roles and their assignments are loaded into One Identity Manager by synchronization. However, you cannot create new app roles in . In , you can add or remove authorizations for the service principals and their app registrations respectively.
To assign authorizations to a Microsoft Entra ID service principal
-
In the Manager, select the Microsoft Entra ID > Service principals category.
-
In the result list, select the Microsoft Entra ID service principal.
-
Select the Assign authorizations task.
-
In the Assignments pane, click Add and enter the following data.
-
Authorized for: Specify the user account, group, or service principal for the authorization.
-
Click next to the field.
-
Under Table, select one of the following tables:
-
To authorize a user account, select AADUser.
-
To authorize a group, select AADGroup.
-
To authorize a service principal, select AADServicePrincipal.
-
Under Authorized for, select the user account, group, or service principal.
-
Click OK.
-
App role: Select the app role for the authorization.
NOTE: If there is no app role defined for a service principal, leave this item empty to authorize the user account, group, or service principal.
-
Save the changes.
To remove authorizations from a Microsoft Entra ID service principal
-
In the Manager, select the Microsoft Entra ID > Service principals category.
-
In the result list, select the Microsoft Entra ID service principal.
-
Select the Assign authorizations task.
-
In the Assignments pane, select the authorization you want to remove.
-
Click Remove.
-
Save the changes.