This will walk you through registering an Azure application that can be used by the Microsoft Office 365, Teams and OneDrive connectors in FTK Central, eDiscovery, and Enterprise.



  • FTK Central, eDiscovery 7.1.1 SP4 or newer, Enterprise 7.4.2 or newer
  • O365 Global Admin credentials for your organization



      1. Log in to the Azure Portal at with Global Admin credentials
      2. Click on App registrations (this can also be found via the Search Resources...  bar at the top of the page)
      3. On the App Registrations Page, click New registration
      4. Do the following:
        1. Provide an application Name
        2. Under Supported account types select Accounts in any organizational directory (Any Azure AD directory - Multitenant)
        3. Click Register

      5. From the Application Overview page, click Authentication on the left
      6. Under Platform configurations, click Add a platform
      7. Click Web on the right
      8. Under Redirect URI, enter one of the following URLs and click Configure:

      9. If you will be using this Azure app for multiple connectors, back on the Authentication page, click Add URI, and add any additional URLs from step 8 as necessary, then click Save
      10. Click Overview on the left
      11. At the Overview page, copy the Application (client) ID for future use
      12. Click Certificates & Secrets on the left
      13. On the lower half of the page, click New client secret
      14. Do the following:
        1. Provide a Description for the client secret
        2. In the Expires drop-down, select an expiration date for the client secret
          Note: We do not provide a recommendation on the life of the secret. This is a security consideration that is dependent on each organizations security posture and internal requirements.
        3. Click Add

      15. Copy the generated Secret Value for future use
      16. Click Manifest on the left
      17. Highlight and copy the entire JSON definition in the Manifest Editor, paste it in the box below, and click Submit.  This will insert the necessary permissions into the manifest JSON in order to work with the connectors.


      18. Highlight and copy the entire JSON definition from the box below, paste it into the Manifest Editor (replacing all existing contents) and click Save in the upper left.

      19. From the left hand side, select API permissions
      20. Click the Grant consent button, and wait for all rows under the Status column to report that consent has been granted.

Your Azure application can now be used for the desired connectors.