Before You Begin

AppConfig² requires administrator consent for successful onboarding. Please ensure you have the following prerequisites before starting:

👤
Administrator Account
You must have Global Administrator role in your Entra ID tenant
🔒
Permission to Grant Consent
Authority to grant application permissions at the organizational level

Onboarding Process

Step 1: Sign In

Sign in with your Microsoft Entra ID account. You'll be directed to Microsoft's authentication page.

Sign in screen

Step 2: Administrator Consent

After signing in, you'll be prompted to grant administrator consent for the required permissions. You must be signed in with an administrator account for this step.

Admin consent screen

Step 3: Access the Application

Once consent is granted, you'll have full access to all features of AppConfig².

Application dashboard
Information: On-Demand Tool Permissions

AppConfig² follows the principle of least privilege. Advanced tools request additional permissions only when you first access them, not during the initial admin consent process. Here's what happens when you use advanced tools:

Tool Additional Permissions Requested When Requested Purpose
Directory Extensions Manager Directory.ReadWrite.All First access to the tool Create and manage custom directory schema extensions
Claims Mapping Policy Tool Policy.Read.All When accessing advanced policy features Read comprehensive policy information beyond basic application configuration

⚠️ Important to Understand

  • Initial Setup: Only core permissions are requested during admin consent - faster onboarding with minimal required permissions
  • Tool Access: Additional permissions requested only when you access specific advanced tools
  • User Choice: You can choose to grant or deny additional permissions for individual tools
  • Graceful Degradation: Core AppConfig² functionality works without advanced tool permissions
  • Admin Consent Requirement: Advanced tool permissions still require admin consent and cannot be granted by regular users
  • Organization-wide Impact: Once granted, these permissions apply organization-wide for all users
  • Independent Management: You can revoke tool permissions independently without affecting core functionality
  • Security Best Practice: Follows Microsoft's principle of least privilege with transparent usage

✅ Benefits of This Approach

  • Reduced Initial Consent: Faster onboarding with minimal required permissions
  • Transparent Usage: Clear understanding of why each permission is needed
  • Selective Access: Use only the tools and permissions your organization needs
  • Security Best Practice: Follows Microsoft's principle of least privilege
Return to Application