Azure and Power Platform — application registration¶
This guide explains how to register an application in Microsoft Entra ID, create a client secret, and link the app to Power Platform with appropriate roles so integrations can use secure, read-only API access to your Microsoft cloud and Dataverse environments.
1. Register an application in Azure¶
Follow Microsoft’s guide: Register an application in Microsoft Entra ID.
Summary of steps:
- Open the Azure Portal.
- Search for App registrations.
- Click New registration.
- Provide:
- Name — e.g.,
Trust3-Integration(choose a name that matches your organization’s naming policy) - Supported account types — Single tenant (recommended for most organizations)
- Name — e.g.,
- Click Register.
Record the Application (client) ID and Directory (tenant) ID from the app overview. You will map them to configuration such as AZURE_CLIENT_ID and AZURE_TENANT_ID in your environment or secret store.
2. Create a client secret¶
- Open the registered application.
- Go to Manage -> Certificates & secrets.
- Click New client secret.
- Add a description and expiry, then create the secret.
- Copy and store the secret value immediately; it is shown only once.
Typical mapping:
| Portal label | Typical configuration name |
|---|---|
| Application (client) ID | AZURE_CLIENT_ID |
| Directory (tenant) ID | AZURE_TENANT_ID |
| Client secret value | AZURE_CLIENT_SECRET |
Protect secrets
Store AZURE_CLIENT_SECRET in a secret manager or restricted configuration. Do not commit secrets to source control.
3. Add the app as a user in Power Platform¶
- Open the Power Platform admin center.
- Go to Manage -> Environments and select your target environment.
- Navigate to Settings → Users + permissions → Application users.
- Click + New app user.
- Click on + Add an app
- Select the registered application from step 1 -> Click on Add.
- Select Business unit same as your environment name.
- Edit Security roles, Select Service Reader
- Click on Add and Create
This links the Entra ID application to the environment so APIs can act in a controlled, non-interactive way.
Avoid assigning System Administrator when Service Reader (or a narrower custom role) is enough — it is over-privileged for typical read-only use.
5. Troubleshooting access issues¶
Ensure environment membership¶
If you see permission or “access denied” style errors:
- In the same environment, go to Settings → Users + permissions → Users.
- Use Add user so the relevant human operator or service principal context matches your organization’s policies.
- Confirm the application user from step 3 is still present and licensed according to your tenant rules.
Wait for permission propagation¶
After role or membership changes, allow 5–10 minutes before retrying API calls or integration steps.
Summary¶
| Do | Don’t |
|---|---|
| Use Service Reader (or similar least-privilege reader) when it meets your integration needs | Use System Administrator unless you have a clear requirement |
| Store secrets securely and rotate on schedule | Commit secrets to Git |
| Wait for IAM and Power Platform propagation after changes | Assume permissions apply instantly |