Skip to main content

Setting up the Microsoft App ID

To establish a secure trust relationship between the EmpowerID Chatbot and the Microsoft identity platform, you must register the Bot as an application in Microsoft Entra ID (formerly Azure Active Directory). This registration enables the Bot to perform secure authentication and authorization operations using OAuth 2.0.

Upon completing this setup, you will obtain the Microsoft App ID (Client ID) and Client Secret, which are required to configure the Azure App Service hosting the EmpowerID Bot microservice.

🔐 Prerequisites

Ensure the following before proceeding:

  • Administrative access to the Azure Portal
  • Contributor or higher role in the Azure subscription
  • Access to the target App Service (Linux Web App) hosting the EmpowerID Bot
  • Familiarity with Microsoft Entra ID (Azure Active Directory) and App Registration concepts

🔧 Procedure Overview

This setup includes the following key tasks:

  1. Register the EmpowerID Bot in Microsoft Entra ID
  2. (Optional) Remove existing Service Principal
  3. Create a new Application Secret
  4. Configure the Bot’s Azure App Service with App ID and Secret

Step 1: Register the EmpowerID Bot in Entra ID

  1. Sign in to the Azure portal.
  2. Navigate to Azure Active Directory.
  3. In the left menu, under Manage, select App registrations.
  4. Click + New registration.
  5. In the Register an application page:
    • Supported account types: Select
      Accounts in any organizational directory (Any Azure AD directory - Multitenant)
    • Leave other settings as default or as appropriate for your deployment.
  6. Click Register.

Register Application

Step 2: Delete Existing Service Principal (If Applicable)

If a Service Principal was previously created for this application, delete it to avoid configuration conflicts:

  1. In Azure Active Directory, go to Enterprise applications.
  2. Search for the application you just registered and click on it.
  3. Click on Managed application in local directory. Managed Application
  4. Select the Properties tab.5. Click Delete to remove the Service Principal.

Delete Properties

⚠️ Important: Only perform this step if an existing Service Principal is interfering with the current registration. This action is not always required and should be used with caution.

Step 3: Create an Application Secret

  1. In the App Registration for the Bot, navigate to Certificates & secrets.
  2. Under Client secrets, click + New client secret.
  3. Enter a description and set an expiration of 24 months or more (recommended for long-term deployments).
  4. Click Add.
  5. Copy the generated secret value immediately — you will not be able to retrieve it again later. Create Secret

⚙️ Step 4: Configure the Azure App Service

  1. Navigate to the App Service (Linux Web App) where the EmpowerID Bot is hosted.

  2. In the App Service menu, go to Settings > Configuration.

  3. Under Application settings, add the following key-value pairs:

    Setting KeyValue Description
    MicrosoftAppIdPaste the Application (Client) ID from registration
    MicrosoftAppPasswordPaste the Secret value you created earlier

    App Service Configuration

  4. Click Save to apply the configuration settings.

Next Step

Next, Publish the Bot Microservice to Azure.