# App registrations in portal ###### tags: `Azure` `App Registrations` ## New a Azure App registration. #### 1. Enter the Azure portal and go into App registrations ![](https://i.imgur.com/Mv5bwhg.png) #### 2. + New registration ![](https://i.imgur.com/OevWt3Y.png) ##### > 2-1. Fill in your app name. ##### > 2-2. Select "Accounts in any organizational directory" for the question "Who can use this application or access this API?". ##### > 2-3. Register (Keep the redirect URI clean and set it later). ![](https://i.imgur.com/EQdbK54.png) #### 3. Go to your app overview and enter the Authentication. ![](https://i.imgur.com/rzriZ6i.png) #### 4. Add a platform and select your configurations. ![](https://i.imgur.com/Bc4K076.png) #### 5. Go to Certificates & secrets and new client secret. ![](https://i.imgur.com/BVmyK52.png) :::warning Remember to record the Value, it will only show you once. ::: #### 6. Go to API permission and select "Add a permission". ![](https://i.imgur.com/vswN2Jf.png) #### 7. Find the permission you want to add and push the "Add permission button". ![](https://i.imgur.com/qXl3chm.png) :::warning Don't forget to push the ![](https://i.imgur.com/tWUmPpU.png =200x) button to finish permission setting. ::: ## Warning code #### <font color="#f00">AADSTS700016: Application with identifier 'xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxxxx' was not found in the directory 'xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxxxx'</font> Azure Active Directory > App Registrations > Your App > Advanced settings > Default client type > Treat application as a public client > Yes #### <font color="#f00">AADSTS50011: This computer system is for authorized users only. By clicking on th e Sign in button below and logging into Wistron domain... .</font> You cannot use Wistron account to sign in, you have to create a user in Azure AD, use the user you create to sign in. [Check this.](https://hackmd.io/uxyUhS0YTsOA1sSiAZWrxQ) #### <font color="#f00">AADSTS50194: Application 'xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxxxx' is not configured as a multi-tenant application. Usage of the /common endpoint is not supported for such applications created after 'xx/xx/20xx'. Use a tenant-specific endpoint or configure the application to be multi-tenant.</font> Azure Active Directory > App registrations > Your App > Authentication > Supported account types > Accounts in any organizational directory #### <font color="#f00">AADSTS700054: response_type 'id_token' is not enabled for the application.</font> Azure Active Directory > App Registrations > Your App > Implicit grant > ID tokens #### <font color="#f00">AADSTS700051: response_type 'token' is not enabled for the application.</font> Azure Active Directory > App Registrations > Your App > Implicit grant > ID tokens & Access tokens