Azure AD App Registration
Intune Commander requires an Azure AD (Entra ID) app registration to authenticate and access Microsoft Graph API. This guide provides step-by-step instructions for creating app registrations in each cloud environment.You need separate app registrations for each cloud environment because Commercial, GCC-High, and DoD use different Azure portals and authentication endpoints.
Cloud Environment Overview
Intune Commander supports four Microsoft cloud environments:| Cloud | Azure Portal | Graph Endpoint | Authority Host |
|---|---|---|---|
| Commercial | https://portal.azure.com | https://graph.microsoft.com | AzurePublicCloud |
| GCC | https://portal.azure.com | https://graph.microsoft.com | AzurePublicCloud |
| GCC-High | https://portal.azure.us | https://graph.microsoft.us | AzureGovernment |
| DoD | https://portal.apps.mil | https://dod-graph.microsoft.us | AzureGovernment |
Commercial and GCC environments use the same portal and endpoints. GCC-High and DoD require separate portals and have isolated authentication infrastructure.
Commercial & GCC Cloud Registration
Use these steps for both Commercial and GCC environments.Navigate to Azure Portal
Open the Azure Portal:https://portal.azure.comSign in with an account that has at least Application Administrator or Global Administrator role.
Create new app registration
- Navigate to Azure Active Directory (or Microsoft Entra ID)
- Select App registrations from the left navigation
- Click + New registration
Configure basic settings
Fill in the registration form:
- Name:
IntuneCommander-Prod(or any descriptive name) - Supported account types: Select one of:
- “Accounts in this organizational directory only” (single tenant)
- “Accounts in any organizational directory” (multi-tenant, if needed)
- Redirect URI:
- Platform: Mobile and desktop applications
- URI:
http://localhost:45132
Note the application details
On the app registration overview page, copy and save:
- Application (client) ID: A GUID like
xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx - Directory (tenant) ID: A GUID like
xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx
Add API permissions
- Click API permissions in the left navigation
- Click + Add a permission
- Select Microsoft Graph
- Choose Delegated permissions
- Add the following permissions:
DeviceManagementConfiguration.ReadWrite.AllDeviceManagementManagedDevices.ReadWrite.AllDeviceManagementServiceConfig.ReadWrite.AllDeviceManagementApps.ReadWrite.All
Policy.Read.AllPolicy.ReadWrite.ConditionalAccessApplication.Read.All
Directory.Read.AllGroup.Read.AllGroupMember.Read.All
Grant admin consent
- Click Grant admin consent for [Your Organization]
- Confirm by clicking Yes in the dialog
- Wait for the status to update
- Verify all permissions show “Granted” in the Status column
(Optional) Create client secret
If you plan to use Client Secret authentication instead of interactive browser:
- Click Certificates & secrets in the left navigation
- Click + New client secret
- Add a description:
IntuneCommander-Secret - Choose an expiration period (e.g., 12 months, 24 months)
- Click Add
- Immediately copy the secret Value — you cannot retrieve it later!
- Store the secret securely (e.g., password manager, Azure Key Vault)
GCC-High Cloud Registration
GCC-High environments use a separate Azure portal and authentication infrastructure.Navigate to Azure Government Portal
Open the Azure Government portal:https://portal.azure.usSign in with your GCC-High credentials (typically
.us domain).Create new app registration
- Navigate to Azure Active Directory
- Select App registrations
- Click + New registration
Configure basic settings
- Name:
IntuneCommander-GCCHigh - Supported account types: “Accounts in this organizational directory only”
- Redirect URI:
- Platform: Mobile and desktop applications
- URI:
http://localhost:45132
Add Microsoft Graph permissions
Follow the same permission setup as Commercial/GCC:
- API permissions → Add a permission → Microsoft Graph
- Delegated permissions
- Add all permissions listed in the Commercial section
- Click Add permissions
GCC-High app registrations are completely separate from Commercial registrations. You cannot use a Commercial app registration to authenticate against GCC-High endpoints.
DoD Cloud Registration
DoD environments require registration in the DoD Azure portal.Navigate to DoD Azure Portal
Open the DoD Azure portal:https://portal.apps.milSign in with your DoD credentials.
Access to the DoD portal requires appropriate DoD credentials and network access. Contact your DoD Azure administrator if you cannot access the portal.
Create new app registration
- Navigate to Azure Active Directory
- Select App registrations
- Click + New registration
Configure basic settings
- Name:
IntuneCommander-DoD - Supported account types: “Accounts in this organizational directory only”
- Redirect URI:
- Platform: Mobile and desktop applications
- URI:
http://localhost:45132
Add Microsoft Graph permissions
- API permissions → Add a permission → Microsoft Graph
- Delegated permissions
- Add all required permissions (same as Commercial)
- Click Add permissions
Automated Setup with PowerShell
For automated app registration setup, Intune Commander includes a PowerShell script that creates the app registration with all required permissions. Script location:scripts/Setup-IntegrationTestApp.ps1
Usage:
- Create a new app registration named
IntuneCommander-Auto - Configure the redirect URI
- Add all required Microsoft Graph permissions
- Prompt you to grant admin consent
- Display the Tenant ID and Client ID
Configuring Profiles in Intune Commander
After creating app registrations, add them to Intune Commander as profiles.Manual Profile Configuration
In Intune Commander’s login screen:- Profile Name:
Contoso-Commercial(descriptive name) - Tenant ID: Paste your Directory (tenant) ID
- Client ID: Paste your Application (client) ID
- Cloud: Select
Commercial,GCC,GCCHigh, orDoD - Auth Method: Choose
InteractiveorClientSecret - Client Secret: (if using ClientSecret auth) Paste your secret value
- Click Save Profile
Profile Import from JSON
Download the profile template from.github/profile-template.json:
- Click Import Profiles
- Select your JSON file
- Profiles are imported and encrypted automatically
Verifying Permissions
After connecting to a tenant, Intune Commander can verify your permissions:- Connect to a tenant using your profile
- Navigate to Tools → Check Permissions (if available)
- Review the permission check results
- Missing permissions will be highlighted
You can also view permissions in the Debug Log window during authentication. Any permission issues will be logged there.
Common Issues
”The application does not have permission to access this resource”
Cause: Missing Microsoft Graph API permissions or admin consent not granted. Solution:- Return to the app registration in Azure Portal
- Navigate to API permissions
- Verify all required permissions are listed
- Click “Grant admin consent for [Organization]” again
- Wait 5-10 minutes for permission propagation
- Try reconnecting in Intune Commander
”AADSTS700016: Application not found in the directory”
Cause: Using the wrong cloud configuration for your tenant. Solution:- Verify you’re using the correct cloud setting:
- Commercial/GCC → Cloud:
Commercial - GCC-High → Cloud:
GCCHigh, use app from portal.azure.us - DoD → Cloud:
DoD, use app from portal.apps.mil
- Commercial/GCC → Cloud:
”AADSTS50011: The redirect URI specified in the request does not match”
Cause: Redirect URI not configured correctly in app registration. Solution:- Open your app registration in Azure Portal
- Navigate to Authentication
- Under “Platform configurations” → “Mobile and desktop applications”
- Ensure
http://localhost:45132is listed - Save changes
Client Secret Expired
Cause: Client secrets expire after the configured period (typically 12-24 months). Solution:- Create a new client secret in Azure Portal
- Copy the new secret value
- Update your profile in Intune Commander with the new secret
- Delete the old secret from Azure Portal
Security Best Practices
Use Interactive Auth
Prefer interactive browser authentication over client secrets when possible. Interactive auth supports MFA and conditional access policies.
Rotate Secrets Regularly
If using client secrets, set a reminder to rotate them before expiration. Use shorter expiration periods (12 months) for better security.
Principle of Least Privilege
Only grant the permissions your use case requires. Use read-only permissions if you don’t need to modify configurations.
Monitor App Usage
Review sign-in logs in Azure AD to monitor app registration usage and detect unauthorized access.
Next Steps
Quickstart Guide
Use your app registration to connect and start managing Intune
Prerequisites
Review all system and permission requirements