LogoLogo
  • Welcome
  • StifleR
  • 2PXE Server
  • iPXE WS
  • OSD Toolkit
  • DeployR
  • Introduction
    • Your DeployR guide
  • SETUP
    • Prerequisites
    • Installation
    • Securing
      • Entra ID authentication
      • Passcode authentication
      • Certificate authentication
      • Anonymous authentication
      • Other security settings
  • Generate Windows PE Boot Images
  • Generate Linux Boot Images
  • Configuring PXE booting
    • Using 2PXE
    • Using 2PXE with iPXE Anywhere Web Service
    • Using WDS or third-party PXE servers
  • Microsoft Graph API access
  • Getting Started
    • Creating a Content Item
      • Applications
      • Driver packs
      • Operating system
    • Creating a Task Sequence
    • Performing a Bare Metal Deployment
  • Starting a task sequence in an existing OS
  • Running a task sequence from Intune
  • Reference
    • Step Definitions
      • Apply ChromeOS Flex
      • Apply IGEL image
      • Apply operating system
      • Apply operating system from cloud
      • Capture image
      • Configure operating system
      • Enable Administrator account
      • Enable BranchCache
      • Format disk
      • Inject driver pack
      • Inject drivers
      • Inject drivers from cloud
      • Install application
      • Install multiple applications
      • Install updates
      • Offline domain join
      • Prepare for capture
      • Prepare operating system
      • Reboot
      • Run command line
      • Run PowerShell script
      • Run task sequence
      • Set variable
    • Task Sequence Templates
      • Windows bare metal
      • Windows bare metal from cloud
      • Windows build and capture
      • Autopilot from cloud
      • Autopilot pre-provisioning
      • ChromeOS Flex
      • IGEL 12
  • PowerShell Modules
  • Task Sequence Variables
Powered by GitBook
On this page

Microsoft Graph API access

PreviousUsing WDS or third-party PXE serversNextCreating a Content Item

Last updated 7 days ago

LogoLogo

About

  • Let's connect
  • Engineering team
  • Our story
  • Blog
  • Events
  • Youtube

Products

  • Product overview
  • RecoveR
  • DeployR
  • OSD Toolkit
  • iPXE Anywhere
  • StifleR
  • CacheR
  • MOM
  • RemoteR

Support

  • Resources
  • Knowledge base
  • 2Pint Software support
  • FAQs

Pricing

  • Private sector
  • Public sector
  • Services

© Copyright 2025 2Pint Software | All rights reserved

CtrlK

The following task sequence step definitions use the Microsoft Graph API indirectly; the DeployR server performs the actual Graph API calls on behalf of the clients. This ensures that the Graph API application secrets are never transmitted from the DeployR server and are therefore kept secure.

  • Register with Windows Autopilot

  • Add to Entra ID group

  • Set Intune device owner

In order for the DeployR server to perform these actions, an Entra ID application needs to be created with the required permissions. The Entra ID app will authenticate to Entra using a certificate that you select; the public key of this certificate will be uploaded to Entra so that it can confirm that the requests are indeed coming from the defined application.

Perform the following steps to create the Entra ID application.

From the Entra ID "App registrations" node, click "New registration" to create an app. Specify a unique, descriptive name and then click "Register."

This will create the application. Click on the "API permissions" node, then add the needed application permissions:

  • Device.ReadWrite.All (for Add to Entra ID group)

  • DeviceManagementConfiguration.ReadWrite.All (for Register with Windows Autopilot)

  • DeviceManagementManagedDevices.ReadWrite.All (for Register with Windows Autopilot and Set Intune device owner)

  • DeviceManagementServiceConfig.ReadWrite.All (for Register with Windows Autopilot)

  • Group.Read.All (for Add to Entra ID group)

  • GroupMember.ReadWrite.All (for Add to Entra ID group)

  • User.Read.All (for Add to Entra ID group)

  • User.Read (delegated permission, present by default)

Once these are added, click the "Grant admin consent" button to grant the needed rights.

Next, export a certificate that exists in the computer's personal certificate store. Using the Certificates MMC, select the needed certificate then right click and choose Export. Specify "No, do not export the private key."

Choose the default "DER encoded binary X.509 (.CER)" format, and specify a file location, then click "Next" and "Finish" to complete the export.

Back in the Entra ID portal, select the "Certificates & secrets" node. Click the "Upload certificate" button and then select the file for the certificate that you previously executed.

Next, DeployR needs to be configured with the Entra ID tenant ID, application ID, and the cert thumbprint of the exported certificate. Open the "Configure DeployR" config utility and select "Show advanced." Scroll to the "Entra ID Settings" section and fill in the tenant ID and application ID from the Entra ID app's "Overview" page:

For the Entra ID certificate thumbprint, copy it from the "Certificates & secrets" page:

Once all of the values have been configured in the Config Editor (your specific values will be different):

Click "Verify" and then "Save" to save the configuration, then ensure that the DeployR service starts as expected.