- Use Built-in Roles:
- Microsoft Entra ID provides built-in roles that can be assigned to app registrations. For example, the
Application Administrator
role allows managing app registrations without giving access to all users and groups. - To assign a built-in role to an app registration:
- Go to the Microsoft Entra admin portal (https://entra.microsoft.com/).
- Navigate to
Identity
>Roles and administrators
. - Select the role you want to assign (e.g.,
Application Administrator
). - Click on
Add assignments
and select the app registration to which you want to assign the role.
- Microsoft Entra ID provides built-in roles that can be assigned to app registrations. For example, the
- Use Specific API Permissions:
- You can also use specific API permissions to restrict permissions to an app registration.
- To configure API permissions:
- Go to the Microsoft Entra admin portal.
- Navigate to
Azure Active Directory
>App registrations
. - Select the app registration to which you want to assign permissions.
- Go to
API permissions
and click onAdd a permission
. - Select
Microsoft Graph
and choose the necessary permissions (e.g.,Application.ReadWrite.All
). - Click on
Add permissions
to save the changes.
- Restrict Access to the Microsoft Entra Administration Portal:
- You mentioned that you set the option "Restrict access to Microsoft Entra administration portal" to "yes." This means only users with specific roles can access the administration portal. Ensure that the relevant users have the necessary roles to access the features they need.
Example Configuration
In the image you provided, you assigned the ReadAppReg
role with the scope type Application
to a specific user. This means that this user will have read permissions for app registrations, but only within the context of the specified application.