Table of Contents
Introduction
This document describes how to set up Azure App registrations for enabling single sign-on in Cirrus' Connect platform:
- Web Client
- Web Supervisor
- Web Administrator
- Wallboard
How to create Azure App registrations
The actions described in this chapter must be executed to enable the login with Microsoft credentials. Separate Azure App registrations for each client are also possible. This offers the option to fine-tune access from users to the applications and will also offer the option to amend the rights that each application has.
At this moment, the only usage is to authenticate the user. This holds true for all three applications, but there is one exception: If a user wants access to its personal contacts in the WebClient these access rights have to be given to the application.
Create an app registration
- Browse to https://portal.azure.com
- Search for, and select ‘App registrations’.

- Click ‘New registration’.

- Fill in the name for the application.
- Set the supported account types to ‘Accounts in this organisational directory only’.
- Leave the Redirect URI empty.
- Press ‘Register’.
- Now that the application is created, copy the Application (client) ID, as this has to be set in the Cirrus Connect platform.
- (Optional) Repeat the steps to have a separate application ID for each web application (webclient, supervisor, etc).
API permissions
The App registrations require a combination of Application and Delegated permissions in order to work with the Microsoft Graph API:
Application permissions:
- Group.Read.All
- User.Read.All
Delegated permissions:
- User.Read
To give the App registrations the Application ‘Group.Read.All’ permission:
- Click on ‘API Permissions’.
- Click ‘Add a permission’.
- Click ‘Microsoft Graph’.
- Click ‘Application permissions’. Here we will configure the Application permissions ‘Group.Read.All’ as an example.

- Search for ‘Group’.
- Expand the Group folder, and select ‘Group.Read.All’.

- When done, click ‘Add permissions’.
- Now we have the permissions in place for ‘Group.Read.All’ we can repeat the steps to add the remaining API permissions ‘User.Read.All’ and ‘User.Read’.
API permissions (for Personal Contacts)
The App registrations is used to authenticate O365 users, but it is also possible to make available a Users Personal Contacts (created in Office 365) within the WebClient.
In order to do so the ‘Contacts.Read’ Delegated permissions for Microsoft Graph must be added.
To give the App registrations the Delegated ‘Contacts.Read’ permission:
- Click on ‘API Permissions’.
- Click ‘Add a permission’.
- Click ‘Microsoft Graph’.
- Click ‘Delegated permissions’. Here we will configure the Delegated permissions ‘Contacts.Read’.

- Search for ‘Contacts’.
- Expand the Contacts folder, and select ‘Contacts.Read’
- When done, press ‘Add permissions’.
- Now we have the permissions in place.
Authentication
Stage 1
Next, we have to configure the Authentication.
- Browse to Authentication.
- Click ‘Add a platform’.

- Select ‘Web’.
- Fill in the Redirect URI: https://<YOUR CIRRUS DOMAIN>/webclient/signin-oidc
- Press ‘Configure’.
Now that we have provided one redirect URI for the WebClient, we want the Redirect URI for the Supervisor and Administrator applications. Create a new application for it and repeat the steps.
Make sure that all your redirect URI’s are always completely lowercase because this is case-sensitive in Azure and we will always make sure it is lowercase in the software.
Stage 2
Next, we need a secret value to authenticate the App registrations, allowing the application to authenticate users against your Azure Active Directory.
- Click on New client secret to add a new secret and fill in the required fields.
- Copy the secret Value and pass to your Cirrus point of contact.
NOTE: You will only be able to copy the Secret Value once. If you navigate away from the Azure Portal you will not be able to see the Secret Value again.
Stage 3
Next, you need to expose an API by creating a scope for the App registrations, which will allow authenticated users to access Cirrus data through the API.
- Click ‘Expose an API’
- Check the ‘Application ID URI’ is populated - the format must be `api:<Application ID>` where Application ID is the ID generated by Microsoft for this App registrations
- Click ‘Add a scope’
- Enter ‘Unexus.Access’ as the ‘Scope name’
- Toggle the ‘Who can consent’ slider to ‘Admins and users’
- Provide a meaningful description to the ‘Admin consent display name’ and ‘Admin consent description’ text fields e.g., Cirrus Connect Access
- Toggle the ‘State’ slider to ‘Enabled’
- Click Save
- Once you’ve added this, you can add this permission under the API permissions menu as a Delegated permissions so that it does not ask your users for consent when they log in.
- Click “Grant admin consent for <organisation>".
- Select the registered application in the list below under APIs my organisation uses or My APIs.
- Once selected, select the created permission “Unexus.Access” and click Add permission.
- Click “Grant admin consent for <organisation>".
”
Edit App Manifest for v2 Token Support
Lastly, you need to change the Manifest of the App registrations to support v2 Tokens. This can be done as displayed in the screenshot below.

Pass to Cirrus
Now you have the App registrations ready in Azure, please send the following to your Cirrus point of contact:
- The Application (client) ID
- The Secret Value
- The Directory (tenant) ID and Primary domain