If multi-factor authentication is enabled for your global administrator account, you must manually create the Azure Active Directory application.
Log On to the Azure Portal as the Global Administrator
-
Log on to the Azure portal (https://portal.azure.com/) using your global administrator account.
-
Go to Azure Active Directory (now Microsoft Entra ID).
Register Azure Active Directory in the Azure Portal
-
In the navigation pane, click App registrations.
The App registrations page appears.
-
Click New registration.
The Register an application screen appears.
-
In the Name box, type a name for the app.
-
Under Supported account types, select Accounts in this organizational directory only (tenant_prefix - Single tenant).
-
Click Register.
-
Copy and paste the following values in a file or other document that you can access later:
-
Application (client) ID
-
Directory (tenant) ID
You will enter these values in the Commvault software when you create the Azure AD app.
-
-
From the left navigation pane, click Certificates & secrets, and then copy the client secret value shown in the page.
-
In the navigation pane, click API permissions.
-
Click Add a permission.
The Request API permissions page appears.
-
Click Microsoft Graph and complete the following steps:
-
Click Application Permissions.
-
Select the following permissions:
-
AdministrativeUnit: AdministrativeUnit.ReadWrite.All. This API permission is required to read and write all administrative units.
-
Application: Application.ReadWrite.All. This API permission is required to backup and restore the Registry and Enterprise applications.
-
AppRoleAssignment: AppRoleAssignment.ReadWrite.All. This API permission is required to backup and restore the Registry and Enterprise applications.
-
AuditLog: AuditLog.Read.All. This API permission is required to backup the Office 365 agents.
-
DelegatedPermissionGrant: DelegatedPermissionGrant.ReadWrite.All. This API permission is required to read and write Azure AD object permission relationships.
-
Device: Device.ReadWrite.All. This API permission is required to read and write to devices.
-
Directory: Directory.ReadWrite.All. This API permission is required to backup your organization's directory.
-
Domain: Domain.ReadWrite.All. This API permission is required to read and write to domains.
-
Group: Group.ReadWrite.All. This API permission is required to backup and restore Groups.
-
Policy: Policy.Read.All. This API permission is required to backup and restore your organization's policies.
-
Policy: Policy.ReadWrite.ConditionalAccess. This API permission is required to read and write to your organization’s conditional access policies.
-
RoleManagement: RoleManagement.ReadWrite.Directory. This API permission is required to read and write to directory RBC settings.
-
User: User.ReadWrite.All. This API permission is required to backup and restore the user profiles.
-
UserAuthenticationMethod: UserAuthenticationMethod.ReadWrite.All. This API permission is required to read and write to a user’s authentication methods.
-
-
Click Add permissions.
-
-
Click Microsoft Graph again and complete the following steps:
-
Click Delegated Permissions.
-
Select the following permissions:
- Directory: Directory.AccessAsUser.All. This API permission is required for restore.
For more information regarding permissions, see Microsoft Permissions.
-
-
Return to the Request API permissions page.
-
On the app API permissions page, click Grant admin consent for tenant_name.
Add an App for Azure Active Directory
-
From the navigation pane, go to Protect > Azure Active Directory.
The Azure Active Directory page appears.
-
In the upper-right corner of the page, click Add, and then click Azure Active Directory.
The Azure Active Directory page appears.
-
In the Name box, enter a name for the app.
-
From the Server plan list, select the server plan to use for the app.
-
Under Infrastructure settings, enter the following information:
-
From the Index server list, select the index server to use for the app.
-
From the Access node list, select the access node to use for the app.
-
-
Under Azure AD connection settings, enter the following information:
-
From the Azure AD cloud region list, select the region where your company is located.
-
Select Custom configuration (Advanced).
-
In the Application ID box, type the application (client) ID.
-
In the Application secret box, type the client secret value that you copied from the Azure portal.
-
In the Azure directory ID box, type the tenant ID.
-