Skip to main content
Skip table of contents

Microsoft Azure Active Directory

The Microsoft Azure Active Directory connector is authenticated with the OAuth2.0 protocol. You will need to register an application and provide the connector with that application's Client ID (Application ID) and Client Secret.

Please follow Microsoft's official guide to registering an application in Azure Active Directory. That documentation can be found here.

  • For "Supported account types" you should select "Accounts in any organizational directory (Any Azure AD directory - Multitenant)"

  • Redirect URI should be {% raw %}https://{{Your Cyclr service domain e.g. }}/connector/callback{% endraw %}

  • Client ID (Application ID) is displayed in the overview of your created app

  • Generate a Client Secret by following these steps

Permissions must be set for the application. The following table details the permissions required for each method category in the connector.




Group.Read.All, GroupMember.Read.All









In addition to the category specific permissions, you should add permissions for offline_access and Directory.Read.All.

To add these permissions in Azure Active Directory:

  1. From App registrations in the Azure portal select your application

  2. Select API permissions from the menu on the left

  3. Click + Add a permission. This will open the permissions menu

  4. From Microsoft APIs select Microsoft Graph and then Delegated permissions

  5. You will be presented with a series of permissions categories

  6. Select the checkboxes for the appropriate permissions and click Add permissions

  7. You must then Grant admin consent for organization

Connector Setup

To allow your clients to access their own data through your Active Directory App, you must save the Client ID and Client Secret values in your Cyclr Console.

  1. Locate the Microsoft Azure Active Directory connector

    Cyclr Console > Connectors > Application Connector Library > Microsoft Azure Active Directory

  2. From the Edit Connector interface click 'Setup'

  3. Enter your Client ID and Client Secret then click 'Save Changes'

The Microsoft Azure Active Directory Connector can now be installed and the user will only be asked to authenticate your App.

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.