Register the app in the portal
You can create a new Azure AD web application registration using the Azure Active Directory admin center and grant administrator consent to the required permission scopes.
- Open a browser and navigate to the Azure Active Directory Admin Center (https://aad.portal.azure.com). Login using a Work or School Account.
- Select Azure Active Directory in the left-hand navigation, then select App registrations under Manage.

- Select New registration. On the Register an application page.

Set the values as follows:
- Name: VisitlogApp
- Supported account types: Select appropriate
- Redirect URI: – (Not required)

Click on Register.
Configure Certificate & Secrets and API Permission
On the VisitlogApp page, copy the value of the Application (client) ID and Directory (tenant) ID save it on a notepad, you will need them in the next step (In Visitlog/Easyvisit application)

Select Manage > Certificates & secrets.
Click on New client secret.

Enter a value in Description and select one of the options for Expires and select Add.

Copy the client secret value before you leave this page. You will need it in the next step.
Important
This client secret is never shown again, so make sure you copy it now. you will need them in the next step (In Visitlog/Easyvisit application)

Select Manage > API Permissions.
Select Add a permission and select Microsoft Graph.

Select Application Permission, expand the User group and select User.Read.All scope.
Select Add permissions to save your changes.

Select Delegated Permission, expand the User group and select User.Read and User.Read.All scope.
Select Add permissions to save your changes.

Select Grant admin consent for your account, then select Yes to consent this application and grant the application access to your tenant using the scopes you specified.


Successfully granted admin consent for the requested permissions message will be displayed as shown in below screen.

Configuring Azure Directory in Visitlog
Now open Visitlog manager > Administrator > General setting
Click on Azure Active Directory settings and then click on Edit

Enter your username and password
Url: https://graph.microsoft.com/v1.0/users
Http method: GET
Authorization:
Authorization Type : No Auth
Tenant ID : Tenant id generated in Azure
Client ID : Application id generated in Azure
Client Secret : Client secret generated in Azure

Header :
Content type : Application/json
Charset : Blank

Body :
Body Type : Form data
ParameterName : Authorization
ParameterValue : 123
Click on Ok

Set columns as requirement and click on Save & Close.
