O365 Tenant

Register App on Azure AD

Note: The permissions may require authorization from an administrator.

  1. Sign in to the Azure Portal using your credentials.

  2. From Azure services, locate and open Azure Active Directory (also known as Azure AD).

  1. Under the Manage section, select App registrations.

  1. In the App registrations screen, click + New registration.

  1. The Register an application screen displays. Enter the user-facing display name for the App in Name.

  1. Select one of the following account types depending on your needs:

  • Accounts in any organizational directory (Any Azure AD directory Multitenant) and personal Microsoft accounts (e.g. Skype, Xbox)

  • Accounts in any organizational directory (Any Azure AD directory Multitenant)

  1. Leave the option Redirect URI (optional) as is.

  1. Click Register to complete the App registration. This will return you to the screen for the new App.

  2. In the App screen, locate the Application (client) ID. Copy it to be used when configuring email import for DocBits.

  1. From left panel, select Certificates & secrets:

  1. In the Certificates & secrets screen, click on + New client secret button under Client secrets section:

  1. In the Add a client secret dialog box, click the Add button:

It is recommended to fill in a description to identify this secret among many (as of now the limit is 2 secrets per App).

Note: Select this expiration date according to your company policy. Once expired, a new client secret will need to be created and specified for each email configuration where it was used previously.

  1. The newly generated client secret will be visible. Copy this client secret to be used when configuring email import for DocBits

Important: Ensure that you have copied the client secret as the client secret will not display again once it is closed.

  1. Select Authentication on the left panel. This will present the Authentication screen on the right-hand side.

  1. In the Advanced settings section, click Yes for Default client type.

  1. Click Save to confirm changes.

  1. Select API permissions on the left panel. This will present the API permissions screen.

  1. By default the User.Read permission from Microsoft Graph is present, leave this as is.

Note: This is a required permission. If this permission is not available, then add the permission with the steps mentioned below for Mail.ReadWrite permission.

  1. Click + Add a permission.This will open the Request API permissions panel.

  1. Click Microsoft Graph.

  1. From the two sub-categories, select Delegated permissions.

  1. Type Mail.ReadWrite in the search box. Select the Mail.ReadWrite checkbox for the permission.

  1. This will enable the Add permissions button at the bottom of the panel. Click Add permissions.

  1. This will add the Mail.ReadWrite permission to the list of Configured permissions for the App.

Note: Administrator permissions may be required. The administrator will have to authorize the App for using these permissions. Once authorized the granted status will be indicated as follows:

Last updated

Was this helpful?