Entra Application Registration
Register the Opsole Migrate application in Microsoft Entra ID, grant Microsoft Graph permissions, create a client secret, and validate authentication.
Entra Application Registration
Opsole Migrate requires an application registration in Microsoft Entra ID to enable Microsoft Graph API access for device, identity, Intune, recovery, and post-migration assignment operations.
Tenant Scope
Create the application registration in the tenant or tenants required for your migration scenario.
| Migration scenario | Where to create the app registration |
|---|---|
| AD-to-Entra or Hybrid-to-Entra | Tenant where migration operations are performed |
| Tenant-to-Tenant | Both source and target tenants |
Sign in with an account that can register applications, create client secrets, assign Microsoft Graph application permissions, and grant admin consent. Common roles include Global Administrator, Privileged Role Administrator, and Cloud Application Administrator or Application Administrator.
Your organization may require separate approval for granting tenant-wide application permissions.
Step 1 - Register Application
- Go to entra.microsoft.com.
- Navigate to Home > Applications > App registrations.
- Click + New registration.

- Enter a name for the application, for example
OpsoleMigrateApp. - Retain all other settings at their default values.
- Click Register.

Step 2 - Save Identifiers
From the application's Overview page, copy and save the following values:
- Application (client) ID
- Directory (tenant) ID
These values are required later when configuring and validating the Opsole Migrate portal connection.

Step 3 - Add API Permissions
- Go to API permissions.
- Click + Add a permission.

- On the Request API permissions page, select Microsoft Graph.

- Select Application permissions.

- Use the search bar to add the required Microsoft Graph permissions.

| Permission | Type | Scope |
|---|---|---|
User.Read.All | Application | Required |
Device.ReadWrite.All | Application | Required |
Directory.Read.All | Application | Required |
DeviceManagementManagedDevices.ReadWrite.All | Application | Required |
DeviceManagementServiceConfig.ReadWrite.All | Application | Required |
DeviceManagementConfiguration.ReadWrite.All | Application | Feature-dependent |
GroupMember.ReadWrite.All | Application | Feature-dependent |
DeviceLocalCredential.Read.All | Application | Feature-dependent |
DeviceLocalCredential.ReadBasic.All | Application | Feature-dependent |
Feature-dependent permissions are required only when the corresponding capability is enabled, such as LAPS retrieval, group restoration, or configuration profile handling.

- After adding the permissions, click Grant admin consent for
[TENANT NAME]. - Click Yes at the grant admin consent confirmation prompt.

- Confirm that all permissions display Granted for [TENANT NAME].

Step 4 - Generate Client Secret
- Go to Certificates & secrets > Client secrets.
- Click + New client secret.

- Fill in the following:
- Description: for example
OpsoleSecretKey - Expires: select a duration aligned with your organization's secret rotation policy, for example 180 days
- Description: for example
- Click Add.

Step 5 - Save the Secret Value
Copy the Value of the new client secret immediately and save it securely.
The client secret value is shown only once. Do not navigate away from the page until the value has been copied and stored.
Store the secret in an approved secrets vault or password management system. Do not email it, store it in scripts, save it in source control, or share it through chat.
Record the secret expiry date and assign an owner for rotation before expiry.

2.2 Validate the Entra App Registration
Validate the Microsoft Entra app registration before using it in the Opsole Migrate portal. This confirms that the app registration can authenticate successfully and that permissions, admin consent, or tenant policies are not blocking access.
Step 1 - Download the Validation Script
Download the PowerShell validation script here: Download link
Right-click the link and select Save link as... to download the file.
Step 2 - Save the Script Locally
Save the script in a dedicated folder on a secure admin workstation, for example D:\Temp.
Run the validation script from a trusted administrative workstation. If your organization requires script review, have the script reviewed and approved before execution.
Step 3 - Run the Script
Open Windows PowerShell or PowerShell 7.
Navigate to the folder where the script is saved, then run:
.\Opsole_Entra_AppAuth_Validation.ps1Step 4 - Provide the Requested Details
When prompted, enter:
- Directory (tenant) ID
- Application (client) ID
- Client secret
The client secret input is hidden.

Step 5 - Confirm Success
If the script returns PASS, the app registration authentication is working and can be safely used in the Opsole Migrate portal.

If the script returns FAIL, re-check the entered values and review tenant configuration, permissions, admin consent, Conditional Access restrictions, and secret validity before proceeding with migration activity.
Next Steps
- Continue to Provisioning Package Configuration
How is this guide?
Overview
Everything you need in place before running your first migration - licensing, supported device states, network access, identity configuration, Microsoft Graph permissions, application registration in Microsoft Entra ID, and pilot readiness.
Provisioning Package
Create, secure, and validate the bulk enrollment provisioning package with Windows Configuration Designer (WCD) for AD-to-Entra, Hybrid-to-Entra, and Tenant-to-Tenant migrations.