Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Table of Contents
minLevel1
maxLevel6
outlinefalse
typelist
printablefalse

...

Creating Azure Application for Microsoft Partner Center

  • Step 1a: Login to https://portal.azure.com/ using MFA Enabled Global Administrator Role to get Client ID, Secret ID and set permissions.

  • Step 1b: In the Microsoft Azure Portal, search for Azure Active Directory and select it.

...

  • Step 3c: Under API Permissions, Click on Microsoft Graph.

  • Search permission for the name Organization and select the Organization.Read.All permissions.

  • Search permission for the name User and select the User.Read permissions.

  • Once done, click on Update Permissions.

...

  • Step 3d: Once permissions are set, on the same page, please grant admin access by clicking on the Grant admin consent for Connect Secure and click on Yes button

...

  • On Granting the Consent it will redirect to the Microsoft User login screen.

  • Provide user email used (MFA Enabled Global Administrator)

...

Click on Accept under permissions requested.

...

  • On Granting the Consent it will redirect to the Microsoft User login screen.

  • Provide user email used (MFA Enabled Global Administrator)

...

  • Click on Accept under permissions requested.

...

  • Click on + to add Azure AD CSP credentials.

  • Choose a Name for the credentials for your reference.

  • By default Azure CSP Authentication Endpoint will be Global Service, it can be changed by dropdown if the Microsoft login mail id is associated with .us or .com (US government/ Global Service)

  • Provide Tenant ID - This is the Tenant ID from the created applications. (This is same for both the applications created- Single tenant and Multi Tenant).

  • Provide Client ID and Client Secret for created Azure application for Microsoft Partner Center (Single Tenant).

  • Provide Client ID and Client Secret for created Azure application for Azure Active Directory(Multi Tenant).

  • Click on Save to save these credentials successfully. This will lead to Microsoft login page to ask for a consent.

  • Once the login is successful, the Azure AD Credentials will be stored successfully.

  • A user having a Global MFA EnabledGlobal Administrator role/permissions is required to be used for login.

  • Using above method you can add multiple credentials.

...