Step 1: Add an App Registration to Entra ID within Azure
First, we must register the Apollo Application within your Microsoft 365 environment to allow access to APIs that share information about your users.
Navigate to Entra ID within Azure
On the left menu select App Registrations.
Click + New registration and fill in the following:
Add the Name “Apollo Secure”
Under Supported account types, select “Accounts in this organisational directory only (Default Directory only - Single tenant)“
Under Redirect URI, select “Web” and enter: https://app.apollosecure.com/oauth2callback/microsoft
Press the Register button.
Copy the Application (client) ID and Paste it into the field within Apollo’s Integration Setup dialogue (See Step 4 below).
Copy the Directory (tenant) ID and Paste it into the field within Apollo’s Integration Setup dialogue (See Step 4 below).
Step 2: Creating a secret for app authentication
On the left menu, select Certificates & secrets.
Under the Client secrets tab, click + New client secret
Set the expiry to 365 days (12 months). Once this expires you will have to re-generate the secret and add the new value into Apollo Secure.
Press the Add button to complete.
Copy the Client secret value and Paste it into the field within Apollo’s Integration Setup dialogue (See Step 4 below).
Step 3: Setting up API permissions
We need to add the permissions Apollo requires to read users and their MFA statuses
User.Read.All
Reports.Read.All
AuditLog.Read.All
GroupMember.Read.All
On the left menu, select API permissions.
Click + Add permission
Select the large Microsoft Graph button from the top right corner of the screen
Then choose Delegated permissions
Search for the first permission User.Read.All and tick the checkbox.
Then repeat the process for the other permissions before pressing the Add permissions button to complete.