Creating a Teams App and app configuration

In order to use Microsoft Teams, an app will be need to be created to allow access to Microsoft Teams.



  • Your company must have Azure
  • The user account that creates the app must be present in the Azure AD directory of your company and have the rights to create apps (this is possible by default unless limited by an admin)
  • A global admin will have to go to an admin consent url in order to allow accounts of this Azure AD directory to use it, since Teams requires permissions normally reserved for admins. By consenting a global admin allow regular users to have these permissions in the app.



This Azure application can be used by both the Snapper as well as the Web Extension Window, to authenticate Agents and provide them a full featured experience.


  1. Navigate to

  2. Select ‘Azure Active Directory’

  3. From here collect your tenant domain for later use (e.g. or

  4. Select ‘App registrations’

  5. Click ‘New Registration’

    1. Give the application a name (e.g. A365-Azure-Application)

    2. Under ‘Supported account types’ select ‘Accounts in any organizational directory’

    3. Add the following redirect URI

      Type: Public client (mobile & desktop)

      Redirect URI: urn:ietf:wg:oauth:2.0:oob

  6. Click ‘Register’

  7. Select ‘Authentication’

    1. Under ‘Suggested Redirect URIs for public clients (mobile, desktop)’ check all three options

      1. msal<application_client_id>://auth



    2. Under ‘Implicit grant’ select both options:

      1. Access tokens

      2. Id tokens

    3. Double check if ‘Supported account types’ is set to:

      1. Accounts in any organizational directory

  8. Click ‘Save’

  9. Click ‘API Permissions’

    1. Click ‘Add a permission’

    2. Click ‘Microsoft Graph’

    3. Click ‘Delegated permissions’

    4. Open 'User'

    5. If 'User.Read' is not selected, select it and click 'Add permissions'

  10. Click ‘Overview’

    1. Collect the following values for later use:

      1. Application (client) id

      2. Directory (tenant) id

    2. You should now have a working Azure application along with the following values:

      1. Tenant domain name

      2. Client secret

      3. Application (client) id

      4. Directory (tenant) id