How do I add a Custom Microsoft Entra ID App Registration?

This Article will detail the process of adding a custom Microsoft Entra ID App registration. You will need global admin permission in Azure.

Creating the App 

  1. Login to portal.azure.com.
  2. Navigate to Microsoft Entra ID > App Registrations.
  3. Click the "+ New registration" button.
    azure new registration.png
  4.  Fill the Register an application form with the following:
    1. Name: input an appropriate name (i.e. Hook Security Entra App).
    2. Supported account type: Accounts in this organizational directory only (Single tenant).
    3. Redirect URI:
      1. Platform: Web
      2. URI: https://portal.hooksecurity.net/authorize_graph_oauth.php
  5. Click "Register".
  6. On the App's Overview page, navigate to API Permissions.
  7. Click "+ Add permission" button.
  8. Click "Microsoft Graph".
  9. Click "Delegated permissions".
  10. Add the following permissions:
    1. Mail.Read
    2. Mail.ReadWrite
    3. offline_access
    4. openid
    5. profile
    6. User.Read
  11. Click "Add permissions".
  12. Click the "Grant admin consent for {tenant name}" button.
  13. If successful, you should receive green checkmark in the "Status" column:
  14. Navigate to the Overview page.
  15. Copy the "Application (client) ID "and the "Directory (tenant) ID" and paste them into a text file (you will need these later).
  16. Navigate to the Certificates & secrets page.
  17. Click the "+ new client secret" button.
  18. Input an appropriate description and set expiration to desired value.
    NOTE: Once the secret expires you will have to update the app with a new secret.
  19. Click "Add"
  20. Copy the value that is generated and add it to the text file created on step 16.

    NOTE: You will no longer be able to copy this file after navigating away from this page.

Adding app to Hook Security

  1. In an incognito browser, Browse to the Hook Security portal.
  2. Navigate to Administration > Settings > Mail Settings > Custom Active Directory App tab.
  3. Click the "+ Add Custom App" button.
  4. Input the following values (this is where the text file values come in):
    1. App Name: an appropriate app name (i.e. Azure App).
    2. Client Id: Application (client) ID.
    3. Client Secret: Secret Value.
    4. App Type: Single.
    5. Tenant Id: Directory (tenant) ID.
      NOTE: Multi-tenant apps do not need to provide a tenant id.

  5. Click "Create App".
  6. Navigate to the Security Inboxes tab.
  7. Click the "+ Create" button.
    1. Connection Type: "Microsoft Active Directory".
    2. Microsoft App: select the app you created (it will appear with the name set on step 4).
    3. Click the "Authorize" button:
  8. If successful, you will be re-directed to a Microsoft login page.
  9. Sign in with the reporting inbox credentials.
  10. After signing in you will be redirected back to the Hook Security and you will see the success message if the inbox adds successfully.

Now the Security Inbox is ready to use.