There are different scenarios in which you might want to integrate with Microsoft Azure Active Directory (AD):You want to let users into your application from an Azure AD you or your organization controls (such as employees in your company).You want to let users coming from other companies' Azure ADs into your application.
You may want to set up those external directories as different connections.If you plan on allowing users to log in using a Microsoft Azure Active Directory account, either from your company or from external directories, you must register your application through the Microsoft Azure portal.Create a New ApplicationLogin to Microsoft Azure and choose Azure Active Directory from the sidebar.Under MANAGE, select App registrations.Click on the + ADD button to add a new application.Enter a Name for the application, select Web app/API as the Application Type, and enter your application URL for Sign-on URL.Configure the PermissionsOnce the application has been created, configure the permissions.
Locate the Multi-tenanted toggle at the bottom and select Yes.
Click on Keys from the Settings menu.Enter a name for the key and choose the desired duration.NOTE: If you choose an expiring key, make sure to record the expiration date in your calendar, as you will need to renew the key (get a new one) before that day in order to ensure users don't experience a service interruption.Click Save and the key will be displayed.
Then click Settings -> Reply URLs and add:https://YOUR_APIGATEWAY_OAUTH_DOMAIN/oauth2/callbackWe are using Postman as the call back, hence the postman callback URL has been added here.
(https://www.getpostman.com/oauth2/callback)Without this step, the App consent page will return a "Bad request" error.