Skip to content

Commit 0a5fe04

Browse files
updates
1 parent 875f7c1 commit 0a5fe04

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

concepts/security-ediscovery-appauthsetup.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ Implementing app-only access involves registering the app in Azure, creating cli
4040

4141
5. You can now see the newly created app registration and the details.
4242

43-
![Screenshot of the app registration page.](images/security-ediscovery-appauthsetup-step1.png)
43+
![Screenshot of the app registration page.](images/security-ediscovery-appauthsetup-step1.png)
4444

4545
### Step 2: Create client secrets or certificates
4646

@@ -50,19 +50,19 @@ For a client secret, select **New client secret**, add a description, and select
5050

5151
You can optionally upload a certificate to use along with the App ID for automation purposes.
5252

53-
![Screenshot of the app registration client secret page.](images/security-ediscovery-appauthsetup-step2.png)
53+
![Screenshot of the app registration client secret page.](images/security-ediscovery-appauthsetup-step2.png)
5454

5555
### Step 3: Assign API permissions
5656

5757
You need to set the correct API permissions for your application. Expand **Manage** and select **API permissions**, then add `eDiscovery.Read.All` and `eDiscovery.ReadWrite.All`. These permissions enable your app to read and write eDiscovery data, respectively. The tenant admin must consent to these application permissions to enable them for use.
5858

59-
![Screenshot of the app registration api permissions page.](images/security-ediscovery-appauthsetup-step3.png)
59+
![Screenshot of the app registration api permissions page.](images/security-ediscovery-appauthsetup-step3.png)
6060

6161
### Step 4: Set up a service principal
6262

6363
1. In **Microsoft Entra ID** on the left of the Azure portal, select **Enterprise Applications** and search your application by name to get the **Object ID** for your application.
6464

65-
![Screenshot of the enterprise applications page.](images/security-ediscovery-appauthsetup-step4_1.png)
65+
![Screenshot of the enterprise applications page.](images/security-ediscovery-appauthsetup-step4_1.png)
6666

6767
2. Open a new PowerShell session to create a service principal that you can add to the eDiscoveryManager role group:
6868

@@ -101,7 +101,7 @@ Add service principal object id to the eDiscoveryAdministrator role using [Add-e
101101
Get-eDiscoveryCaseAdmin
102102
```
103103

104-
![Screenshot of the exchange online shell.](images/security-ediscovery-appauthsetup-step4_2.png)
104+
![Screenshot of the exchange online shell.](images/security-ediscovery-appauthsetup-step4_2.png)
105105

106106
### Step 5: Connect to Microsoft Graph API using app-only access
107107

0 commit comments

Comments
 (0)