You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: concepts/security-ediscovery-appauthsetup.md
+5-5Lines changed: 5 additions & 5 deletions
Original file line number
Diff line number
Diff line change
@@ -40,7 +40,7 @@ Implementing app-only access involves registering the app in Azure, creating cli
40
40
41
41
5. You can now see the newly created app registration and the details.
42
42
43
-

43
+

44
44
45
45
### Step 2: Create client secrets or certificates
46
46
@@ -50,19 +50,19 @@ For a client secret, select **New client secret**, add a description, and select
50
50
51
51
You can optionally upload a certificate to use along with the App ID for automation purposes.
52
52
53
-

53
+

54
54
55
55
### Step 3: Assign API permissions
56
56
57
57
You need to set the correct API permissions for your application. Expand **Manage** and select **API permissions**, then add `eDiscovery.Read.All` and `eDiscovery.ReadWrite.All`. These permissions enable your app to read and write eDiscovery data, respectively. The tenant admin must consent to these application permissions to enable them for use.
58
58
59
-

59
+

60
60
61
61
### Step 4: Set up a service principal
62
62
63
63
1. In **Microsoft Entra ID** on the left of the Azure portal, select **Enterprise Applications** and search your application by name to get the **Object ID** for your application.
64
64
65
-

65
+

66
66
67
67
2. Open a new PowerShell session to create a service principal that you can add to the eDiscoveryManager role group:
68
68
@@ -101,7 +101,7 @@ Add service principal object id to the eDiscoveryAdministrator role using [Add-e
101
101
Get-eDiscoveryCaseAdmin
102
102
```
103
103
104
-

104
+

105
105
106
106
### Step 5: Connect to Microsoft Graph API using app-only access
0 commit comments