How to Connect to Active Directory with App-Credential Authentication
Sophia Ho avatar
Written by Sophia Ho
Updated over a week ago
  1. Navigate to portal.azure.com

  2. Select App Registrations from the left panel

  3. Select +New registration

4. Name the application (e.g., “Logikcull Active Directory Integration”)

5. Under “Supported account types > Who can use this application or access this API?”, select “Accounts in this organizational directory only

6. Click Register. This should redirect you automatically to the new App's registration overview page.

7. On the “Logikcull Active Directory Integration” app registration overview page, click “API permissions” from the left-side panel

8. Under Configured Permissions, click “+ Add a permission".

9. Click “Microsoft Graph.

10. Under What type of permissions does your application require, click “Application permissions

11. Under Select permissions, type “User.Read.All” to search for the appropriate permission required.

12. In the search results, select under the “User” permission group “User.Read.All

13. Finish this step by clicking “Add permissions

14. Click Grant admin consent for logikcullsupport > “Yes

15. Open a new Tab and go to Logikcull > Account Page > Preferences and scroll down to the “Third-Party Integrations” section. Click “Connect” next to "Microsoft Active Directory".

16. From the “Logikcull Active Directory Integration” app registration overview page in the Azure portal, copy and paste the “Application (client) ID”, “Object ID”, and “Directory (tenant) ID” values into their corresponding fields in the Logikcull.

From the Logikcull configuration modal, click Generate new certificate > Download certificate.

17. In Azure, click Certificates & secrets from the left panel.

18. Click Upload certificate and select the key you just downloaded from Logikcull. Name the certificate “Logikcull Active Directory Integration Certificate” or something similar.


19. Back in Logikcull, click “Connect to Active Directory”. If you see “Integration connected”, your Active Directory Integration is configured properly!

Did this answer your question?