If multi-factor authentication is enabled for your global administrator account, you must manually create the Azure Active Directory application.
Log On to the Azure Portal as the Global Administrator
Log on to the Azure portal (https://portal.azure.com/) using your global administrator account.
Go to Azure Active Directory.
Register Azure Active Directory in the Azure Portal
In the navigation pane, click App registrations.
The App registrations page appears.
Click New registration.
The Register an application screen appears.
In the Name box, type a name for the app.
Under Supported account types, select Accounts in this organizational directory only (tenant_prefix - Single tenant).
Click Register.
Copy and paste the following values in a file or other document that you can access later:
Application (client) ID
Directory (tenant) ID
You will enter these values in the Commvault software when you create the Azure AD app.
From the left navigation pane, click Certificates & secrets, and then copy the client secret value shown in the page.
In the navigation pane, click API permissions.
Click Add a permission.
The Request API permissions page appears.
Click Microsoft Graph and complete the following steps:
Click Application Permissions.
Select the following permissions:
Application: Application.ReadWrite.All. This API permission is required to backup and restore the Registry and Enterprise applications.
AppRoleAssignment: AppRoleAssignment.ReadWrite.All. This API permission is required to backup and restore the Registry and Enterprise applications.
AuditLog: AuditLog.Read.All. This API permission is required to backup the Office 365 agents.
Directory: Directory.ReadWrite.All. This API permission is required to backup your organization's directory.
Domain: Domain.ReadWrite.All
Group: Group.ReadWrite.All. This API permission is required to backup and restore Groups.
Reports: Reports.Read.All. This API permission is required to backup the Office 365 agents.
RoleManagement: RoleManagement.ReadWrite.Directory. This API permission is required to backup and restore the Azure Active Directory objects.
User: User.ReadWrite.All. This API permission is required to backup and restore the user profiles.
Click Add permissions.
For more information regarding permissions, see Microsoft Permissions.
Return to the Request API permissions page.
On the app API permissions page, click Grant admin consent for tenant_name.
Add an App for Azure Active Directory
From the navigation pane, go to Protect > Azure Active Directory.
The Azure Active Directory page appears.
In the upper-right corner of the page, click Add, and then click Azure Active Directory.
The Azure Active Directory page appears.
In the Name box, enter a name for the app.
From the Server plan list, select the server plan to use for the app.
Under Infrastructure settings, enter the following information:
From the Index server list, select the index server to use for the app.
From the Access node list, select the access node to use for the app.
Under Azure AD connection settings, enter the following information:
From the Azure AD cloud region list, select the region where your company is located.
Select Custom configuration (Advanced).
In the Application ID box, type the application (client) ID.
In the Application secret box, type the client secret value that you copied from the Azure portal.
In the Azure directory ID box, type the tenant ID.