entra app add
Creates new Entra app registration
Usage
m365 entra app add [options]
Alias
m365 entra appregistration add [options]
Options
-n, --name [name]
Name of the app. Specify either
name
ormanifest
but not both.--multitenant
Specify, to make the app available to other tenants.
-r, --redirectUris [redirectUris]
Comma-separated list of redirect URIs. Requires
platform
to be specified.-p, --platform [platform]
Platform for which the
redirectUris
should be configured. Allowed valuesspa
,web
,publicClient
.--implicitFlow
Specify, to indicate that the authorization endpoint should return ID and access tokens.
-s, --withSecret
When specified, will create a secret named
Default
and set it to expire 1 year in the future.--apisDelegated [apisDelegated]
Comma-separated list of delegated permissions to register with the app.
--apisApplication [apisApplication]
Comma-separated list of application permissions to register with the app.
-u, --uri [uri]
Application ID URI.
--scopeName [scopeName]
Name of the scope to add. Requires
uri
to be specified.--scopeConsentBy [scopeConsentBy]
Specifies if the scope can be consented only by admins or by admins and users. Allowed values
admins
,adminsAndUsers
. Defaultadmins
.--scopeAdminConsentDisplayName [scopeAdminConsentDisplayName]
Scope admin consent display name.
--scopeAdminConsentDescription [scopeAdminConsentDescription]
Scope admin consent description.
--certificateFile [certificateFile]
Path to the file with certificate public key. Specify either
certificateFile
orcertificateBase64Encoded
.--certificateBase64Encoded [certificateBase64Encoded]
Base64-encoded string with certificate public key. Specify either
certificateFile
orcertificateBase64Encoded
.--certificateDisplayName [certificateDisplayName]
Display name for the certificate. If not given, the displayName will be set to the certificate subject. When specified, also specify either
certificateFile
orcertificateBase64Encoded
.--grantAdminConsent
When specified, grants application & delegated permissions through admin consent.
--manifest [manifest]
App manifest as retrieved from Entra ID to create the app registration from. Specify either
name
ormanifest
but not both.--save
Use to store the information about the created app in a local file.
--allowPublicClientFlows
Enable the allow public client flows feature on the app registration.
-h, --help [help]
Output usage information. Optionally, specify which section of command's help you want to see. Allowed values are
options
,examples
,remarks
,response
,full
. Default isoptions
.--query [query]
JMESPath query string. See http://jmespath.org/ for more information and examples.
-o, --output [output]
Output type.
json
,text
,csv
,md
,none
. Defaultjson
.--verbose
Runs command with verbose logging.
--debug
Runs command with debug logging.
Remarks
You can use this command to create a new Entra app registration either by specifying the different configuration settings through the corresponding options or by using the manifest.
If you don't use the manifest, you must specify the name of the Entra app registration using the name
option. If you use the manifest, you can skip the name
option assuming the manifest contains the displayName
property.
You can also use the manifest to provision some of the configuration settings of your Entra app. All properties specified in the manifest are optional and will set if specified.
If you specify the manifest along with some options, values specified in the options will override settings from the manifest. One exception is the name specified in the name
option which will be overridden by the displayName
property from the manifest if specified.
The following properties specified in the manifest retrieved from Entra ID are not supported by this command:
- accessTokenAcceptedVersion
- disabledByMicrosoftStatus
- errorUrl
- oauth2RequirePostResponse
- oauth2AllowUrlPathMatching
- orgRestrictions
- samlMetadataUrl
When specifying the value for the uri
, you can use the _appId_
token, to include the ID of the newly generated Entra app registration in the Application ID URI, eg. URI api://caf406b91cd4.ngrok.io/_appId_
will become api://caf406b91cd4.ngrok.io/ab3bd119-faf7-4db5-ba99-eb7e748f778a
where the last portion is the app ID of the created Entra app registration.
When using the withSecret
option, this command will automatically generate a secret named Default
and set it to expire 1 year in the future.
After creating the Entra app registration, this command returns the app ID and object ID of the created app registration. If you used the withSecret
option, it will also return the generated secret.
If you want to store the information about the created Entra app registration, use the --save
option. This is useful when you build solutions connected to Microsoft 365 and want to easily manage app registrations used with your solution. When you use the --save
option, after you create the app registration, the command will write its ID and name to the .m365rc.json
file in the current directory. If the file already exists, it will add the information about the to it, allowing you to track multiple apps. If the file doesn't exist, the command will create it.
When specifying --grantAdminConsent
option, an enterprise application will be created for the app registration.
Examples
Create new Entra app registration with the specified name
m365 entra app add --name 'My Entra app'
Create new Entra app registration from the manifest retrieved from the Azure Portal stored in a local file named manifest.json
m365 entra app add --manifest @manifest.json
Create new multitenant Entra app registration
m365 entra app add --name 'My Entra app' --multitenant
Create new Entra app registration for a web app with the specified redirect URIs
m365 entra app add --name 'My Entra app' --redirectUris 'https://myapp.azurewebsites.net,http://localhost:4000' --platform web
Create new Entra app registration for a desktop app
m365 entra app add --name 'My Entra app' --redirectUris 'https://login.microsoftonline.com/common/oauth2/nativeclient' --platform publicClient
Create new Entra app registration with an auto-generated secret (secret returned in the command output)
m365 entra app add --name 'My Entra app' --withSecret
Create new Entra app registration for a daemon app with specified Microsoft Graph application permissions
m365 entra app add --name 'My Entra app' --withSecret --apisApplication 'https://graph.microsoft.com/Group.ReadWrite.All,https://graph.microsoft.com/Directory.Read.All'
Create new Entra app registration for a single-page app with specified Microsoft Graph delegated permissions
m365 entra app add --name 'My Entra app' --platform spa --redirectUris 'https://myspa.azurewebsites.net,http://localhost:8080' --apisDelegated 'https://graph.microsoft.com/Calendars.Read,https://graph.microsoft.com/Directory.Read.All' --implicitFlow
Create new Entra app registration with Application ID URI set to a fixed value
m365 entra app add --name 'My Entra app' --uri https://contoso.onmicrosoft.com/myapp
Create new Entra app registration with Application ID URI set to a value that contains the ID of the app registration, designated with the _appId_
token and a custom API scope that can be consented by both admins and users
m365 entra app add --name 'My Entra app' --uri api://caf406b91cd4.ngrok.io/_appId_ --scopeName access_as_user --scopeAdminConsentDescription 'Access as a user' --scopeAdminConsentDisplayName 'Access as a user' --scopeConsentBy adminsAndUsers
Create new Entra app registration for a daemon app with specified Microsoft Graph application permissions, including admin consent
m365 entra app add --name 'My Entra app' --apisApplication 'https://graph.microsoft.com/Group.ReadWrite.All' --grantAdminConsent
Create new Entra app registration with the specified name. Store information about the created app registration in the .m365rc.json file in the current directory.
m365 entra app add --name 'My Entra app' --save
Create new Entra app registration with a certificate
m365 entra app add --name 'My Entra app' --certificateDisplayName "Some certificate name" --certificateFile "c:\temp\some-certificate.cer"
Create a new Entra app registration with the allow public client flows feature enabled.
m365 entra app add --name 'My Entra app' --allowPublicClientFlows
Response
Standard response
- JSON
- Text
- CSV
- Markdown
{
"appId": "68e9f0dd-c743-4693-9ba4-d78e91bd13cc",
"objectId": "d4d7d33a-d40e-4606-b67d-de6cdbfaa01f",
"tenantId": "1e852b49-bf4b-4ba5-bcd4-a8c4706c8ed4"
}
appId : 908db832-dac2-4622-98b3-b492fdc74f80
objectId: 089066cc-2c81-4188-9b6b-7b86e861a169
tenantId: 1e852b49-bf4b-4ba5-bcd4-a8c4706c8ed4
appId,objectId,tenantId
9db26abb-dd17-48f1-b790-765d14d834b6,5c803709-e0b8-4a4f-a43f-f4ad39fdee45,1e852b49-bf4b-4ba5-bcd4-a8c4706c8ed4
# entra app add --name "My Entra app"
Date: 2023-06-01
## 8e60ecac-34b4-404c-832d-f1c77bc27b78
Property | Value
---------|-------
appId | f86600df-9842-4f25-b7cf-242f3736b137
objectId | 8e60ecac-34b4-404c-832d-f1c77bc27b78
tenantId | 1e852b49-bf4b-4ba5-bcd4-a8c4706c8ed4
withSecret
response
When we make use of the option withSecret
the response will differ.
- JSON
- Text
- CSV
- Markdown
{
"appId": "efb2ec4c-d247-446b-9efd-0f8141652711",
"objectId": "c8bdc471-ba5a-45c9-b725-5fc83bfc9c59",
"tenantId": "1e852b49-bf4b-4ba5-bcd4-a8c4706c8ed4",
"secrets": [
{
"displayName": "Default",
"value": "Bhc8Q~EhE26SCWAxSlKpfwTkbfdHtsXxVJNTtagT"
}
]
}
appId : 748e1b24-8fa6-4f54-a3f2-5f84ffcffdbe
objectId: 6aa9fde7-d58a-4211-a84a-b7252ac6087b
secrets : [{"displayName":"Default","value":"6JA8Q~_4SzAbj3bQgzap~vNscazQzXBBEcxDHdd5"}]
tenantId: 1e852b49-bf4b-4ba5-bcd4-a8c4706c8ed4
appId,objectId,tenantId
06700d67-0c97-402a-8c09-802049ffd70f,1eb0491f-1c88-490f-b2b3-18dc501938a1,1e852b49-bf4b-4ba5-bcd4-a8c4706c8ed4
# entra app add --name "My Entra app" --withSecret "true"
Date: 2023-06-01
## a5cb917a-ebf3-4c3c-82db-90aa122495b4
Property | Value
---------|-------
appId | 3d1a4664-2634-4b35-9e42-1fa24abfda89
objectId | a5cb917a-ebf3-4c3c-82db-90aa122495b4
tenantId | 1e852b49-bf4b-4ba5-bcd4-a8c4706c8ed4