This article goes through all the steps to import employees from your Azure Active Directory to VisitLog. This requires admin access to the Azure Active Directory admin center.
1. Register the app in the portal
You can create a new Azure AD web application registration using the Azure Active Directory admin center and grant administrator consent to the required permission scopes.
- Open a browser and navigate to the Azure Active Directory Admin Center (https://aad.portal.azure.com).
- Select Azure Active Directory in the left-hand navigation, then select App registrations under Manage.

- Select New registration. On the App registration page.

- Set the values as follows:
- Name: VisitlogApp
- Supported account types: Select appropriate
- Redirect URI: Not required
- Click on Register.

2. Configure Certificate & Secrets and API Permission
- On the VisitlogApp page, copy the value of the Application (client) ID and Directory (tenant) ID and save it in notepad, you will need them in future step.

- Under Manage go to Certificates & secrets.
- Click on New client secret.

- Enter a value in Description and select one of the options for Expires, click on Add.

Important
This client secret is never shown again, so make sure you copy it now. you will need them in the next step (In Visitlog/Easyvisit application)

- Under Manage go to API Permissions.
- Click on Add a permission and select Microsoft Graph.

- Select Application Permission, expand the User group and select User.Read.All scope.
- Select Add permissions to save your changes.

- Select Delegated Permission, expand the User group and select User.Read and User.Read.All scope.
- Select Add permissions to save your changes.

- Select Grant admin consent for your account, then select Yes to consent this application and grant the application access to your tenant using the scopes you specified.


- Successfully granted admin consent for the requested permissions message will be displayed as shown below.

3. Configuring Azure Directory in Visitlog
- Open VisitLog Manager and go to Administraiton.

- Go to General settings.

- Click on Azure Active Directory settings and then click on Edit.

- Request URL:
- Http Method:
- GET
- Authorization:
- Authorization Type : No Auth
- Tenant ID : Tenant id generated in Azure
- Client ID : Application id generated in Azure
- Client Secret : Client secret generated in Azure
- Grant Type: client_credentials

- Header:
- Content type : Application/json
- Charset : Blank

- Body:
- Body Type : Form data
- ParameterName : Authorization
- ParameterValue : 123
- Click on OK.

- Set columns as per your requirement and click on Save & Close.
