# App registrations in portal
###### tags: `Azure` `App Registrations`
## New a Azure App registration.
#### 1. Enter the Azure portal and go into App registrations

#### 2. + New registration

##### > 2-1. Fill in your app name.
##### > 2-2. Select "Accounts in any organizational directory" for the question "Who can use this application or access this API?".
##### > 2-3. Register (Keep the redirect URI clean and set it later).

#### 3. Go to your app overview and enter the Authentication.

#### 4. Add a platform and select your configurations.

#### 5. Go to Certificates & secrets and new client secret.

:::warning
Remember to record the Value, it will only show you once.
:::
#### 6. Go to API permission and select "Add a permission".

#### 7. Find the permission you want to add and push the "Add permission button".

:::warning
Don't forget to push the  button to finish permission setting.
:::
## Warning code
#### <font color="#f00">AADSTS700016: Application with identifier 'xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxxxx' was not found in the directory 'xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxxxx'</font>
Azure Active Directory > App Registrations > Your App > Advanced settings > Default client type > Treat application as a public client > Yes
#### <font color="#f00">AADSTS50011: This computer system is for authorized users only. By clicking on th e Sign in button below and logging into Wistron domain... .</font>
You cannot use Wistron account to sign in, you have to create a user in Azure AD, use the user you create to sign in. [Check this.](https://hackmd.io/uxyUhS0YTsOA1sSiAZWrxQ)
#### <font color="#f00">AADSTS50194: Application 'xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxxxx' is not configured as a multi-tenant application. Usage of the /common endpoint is not supported for such applications created after 'xx/xx/20xx'. Use a tenant-specific endpoint or configure the application to be multi-tenant.</font>
Azure Active Directory > App registrations > Your App > Authentication > Supported account types > Accounts in any organizational directory
#### <font color="#f00">AADSTS700054: response_type 'id_token' is not enabled for the application.</font>
Azure Active Directory > App Registrations > Your App > Implicit grant > ID tokens
#### <font color="#f00">AADSTS700051: response_type 'token' is not enabled for the application.</font>
Azure Active Directory > App Registrations > Your App > Implicit grant > ID tokens & Access tokens