Entra ID App Registration

Docusnap can automatically create an application in Azure AD for the inventory of Microsoft 365 and assign the required permissions (see chapter Create Azure Apps). Depending on the Azure policies in place in the environment, however, the automatic creation of the application or the automatic assignment of individual permissions may be blocked. In these cases, manual creation and configuration of the application in the Azure portal is required.

The registration of an application is done via the Azure Portal (portal.azure.com), in the Microsoft Entra ID section under the menu item “App Registration”.

Registering an application

Registering an application in Microsoft Azure and retrieving the required credentials

API Permissions

To access a protected resource such as Teams information or SharePoint web pages, Docusnap365 needs authorization from the resource owner. Docusnap365 needs read-only access for Microsoft 365 discovery.

Assigning Microsoft Graph API permissions to a registered application

API/Permission NameTypeDescription
AppCatalog.Read.AllApplicationRead all app catalogs
Application.Read.AllApplicationRead all applications
AuditLog.Read.AllApplicationRead all audit log data
Calendars.ReadApplicationRead calendars in all mailboxes
Channel.ReadBasic.AllApplicationRead the names and descriptions of all channels
ChannelMember.Read.AllApplicationRead the members of all channels
ChannelSettings.Read.AllApplicationRead the names, descriptions, and settings of all channels
Contacts.ReadApplicationRead contacts in all mailboxes
Device.Read.AllApplicationRead all devices
Directory.Read.AllApplicationRead directory data
Files.Read.AllApplicationRead files in all site collections
GroupMember.Read.AllApplicationRead all group memberships
Mail.ReadBasicApplicationRead basic mail in all mailboxes
MailboxSettings.ReadApplicationRead all user mailbox settings
Organization.Read.AllApplicationRead organization information
Policy.Read.AllApplicationRead your organization’s policies
Reports.Read.AllApplicationRead all usage reports
RoleManagement.Read.DirectoryApplicationRead all directory RBAC settings
SharePointTenantSettings.Read.AllApplicationRead SharePoint and OneDrive tenant settings
Sites.FullControl.AllApplicationHave full control of all site collections
Sites.Read.AllApplicationRead items in all site collections
Team.ReadBasic.AllApplicationGet a list of all teams
TeamMember.Read.AllApplicationRead the members of all teams
TeamSettings.Read.AllApplicationRead all teams settings
TeamsTab.Read.AllApplicationRead tabs in Microsoft Teams
TeamworkDevice.Read.AllApplicationRead Teams devices
TeamworkTag.Read.AllApplicationRead tags in Teams
User.ReadDelegatedSign in and read user profile
User.Read.AllApplicationRead all users full profiles
UserAuthenticationMethod.Read.AllApplicationRead all users authentication methods

“Send As” (M365 Exchange Online)

When Microsoft 365 is inventoried, all mailbox permissions in Exchange Online are correctly detected by Docusnap without requiring additional role assignments. An exception is the “Send As” permission.

This permission is managed exclusively in Exchange Online and can only be retrieved if the application used in the Entra ID app registration is assigned the optional RBAC role Exchange Recipient Administrator.

Since this is an administrative role that does not follow the principle of least privilege, it is not assigned during automatic app creation. The assignment must therefore be performed manually in the Microsoft Entra admin center.

Assignment in the Microsoft Entra admin center

  1. Open Entra IDRoles & administrators.
  2. Select Exchange Recipient Administrator.
  3. Choose Assignments → Add assignments.
  4. In the selection dialog, choose Service principals and mark the app used by Docusnap.
  5. Confirm with Add.
  6. Under Assignments, verify that the app is now listed.