Part of AppConfig² Suite

AppTooling — Entra ID Administration Toolkit

Nine focused Entra ID management tools in a single browser-based SPA. Fills the operational gap between the Azure Portal's form-based UI and scripted automation — for privileged tasks that are too complex for Portal forms yet too infrequent to justify bespoke scripts.

AppTooling — Entra ID Administration Toolkit screenshot

Why AppTooling?

The Azure Portal is great for one-off changes through its UI, and PowerShell/CLI scripts are ideal for fully automated pipelines. AppTooling targets the gap in between: privileged, interactive Entra ID administration tasks that require judgment and confirmation — performed through a purpose-built interface with guardrails built in.

No Portal Context-Switching

Consent cleanup, role assignments, and credential rotation — all in one interface instead of navigating across multiple Portal blades.

Confirmation on Every Write

Every DELETE, PATCH, and POST operation requires explicit confirmation. Mistakes are surfaced before they happen, not after.

Guided Operations

Templates for workload identity federation, a curated optional claims catalog, and built-in schema validation eliminate error-prone manual JSON editing.

Nine Focused Tools

Organised into four functional areas covering the full scope of Entra ID application administration.

Identity Management
Consent Manager

List all OAuth 2.0 delegated permission grants in the tenant. Filter by client or resource service principal. Revoke individual grants with a confirmation step. Distinguishes admin consent (AllPrincipals) from user consent (Principal) and surfaces the granting user's UPN.

Required: Directory.ReadWrite.All

AppRole Assignment Manager

View app role assignments from both the principal's perspective (appRoleAssignments) and the resource's perspective (appRoleAssignedTo). Create new assignments by searching for service principals and selecting from their exposed app roles. Delete with confirmation.

Required: AppRoleAssignment.ReadWrite.All

Credentials & Trust
Credential & Secret Manager

Browse all client secrets and certificates across app registrations with colour-coded expiry status (configurable warning threshold). Create new secrets with configurable default lifetime. Certificates display thumbprint, type, and usage. New secret values are shown exactly once at creation.

Required: Application.ReadWrite.All

Federated Identity Credentials

Create and manage workload identity federation (WIF) credentials. Guided templates eliminate manual subject construction for the four most common issuers: GitHub Actions (branch / environment / PR), Azure DevOps, Kubernetes (service account), and Google Cloud. Custom issuers are also supported.

Required: Application.ReadWrite.All

Policies
Claims Mapping Policy Tool

Full CRUD for claimsMappingPolicy objects. Built-in templates cover the most common customisations: department, employee ID, job title, extension attributes, group claims, and SAML name identifier. JSON editor with schema validation. Assign and unassign policies to service principals without leaving the tool.

Required: Policy.ReadWrite.ApplicationConfiguration

Configuration & Advanced
Manifest Editor

Search any application registration and load its manifest in a syntax-highlighted JSON editor. Edit and save using Graph's JSON Merge Patch semantics. Displays app type chips (Web / SPA / Native / multi-tenant). Diff-detects unsaved changes and prompts before navigation.

Required: Application.ReadWrite.All

Optional Claims Editor

Configure optionalClaims (ID token, access token, SAML2 token) through a structured UI backed by a curated claim catalog. Each claim includes a plain-language description, supported token types, and available additionalProperties. Changes are diffed against saved state and can be reverted before saving.

Required: Application.ReadWrite.All

Graph Explorer

Execute arbitrary Microsoft Graph REST calls (GET / POST / PATCH / DELETE) against v1.0 or beta. Auto-detects required scopes per endpoint and triggers just-in-time consent. Syntax-highlighted JSON response panel with status code display. Built-in JWT decoder for the current session token. Common endpoint suggestions with scope hints.

Varies — JIT consent per endpoint

JWT Token Decoder

Paste any JWT (access token, ID token, or custom token) for a fully annotated breakdown. Auto-detects token type and validity (valid / expired / not-yet-valid). Token Summary shows type, expiry, subject, audience, issuer, lifetime in minutes, and a plain-English scope and app-role summary. Claims tab renders every claim with a colour-coded category dot (Identity, Authorization, Timing, Application, Security, Tenant, Device) — click any claim to expand its documentation and a Microsoft Docs link. Header and Raw JSON tabs also available. Decoding is entirely client-side; no Graph calls are made.

Required: None — client-side only

See It In Action

A closer look at six of the nine tools — click any screenshot to expand.

Key Capabilities

Consent Lifecycle

List, filter, and revoke OAuth 2.0 delegated permission grants. See exactly which users granted consent and to which resources.

Workload Identity Federation

Guided templates for GitHub Actions, Azure DevOps, Kubernetes, and Google Cloud. Eliminate long-lived secrets for CI/CD and service workloads.

Manifest Editing

Load, edit, and save application manifests with a JSON Merge Patch workflow. Diff detection prevents accidental overwrites.

Optional Claims (Structured UI)

Configure optional claims for ID, access, and SAML2 tokens through a structured UI with a curated catalog — no raw JSON required.

Credential Management

Browse client secrets and certificates across app registrations with expiry alerts. Create secrets with configurable lifetimes; values shown once only.

Claims Mapping Policies

Full CRUD for claimsMappingPolicy objects with built-in templates and SP assignment — without hand-editing JSON policy documents.

Who is AppTooling for?

Purpose-built for roles that need privileged Entra ID operations with guardrails.

Entra ID Admins

Day-to-day consent cleanup, role assignments, and credential rotation without navigating multiple Azure Portal blades.

DevSecOps Engineers

Configure workload identity federation for GitHub Actions, Azure DevOps, and Kubernetes — eliminating long-lived secrets from pipelines.

Identity Architects

Configure claims mapping policies and optional claims for custom token shapes without hand-editing raw JSON policy documents.

Developers

Inspect application manifests, test Graph API calls interactively with live JWT decoding, and validate optional claims behaviour end-to-end.

Security & Compliance

Audit and revoke OAuth consent grants. Monitor credential expiry across all app registrations. Evidence-based compliance reporting.

Cloud Architects

Design and validate token customisation strategies, workload identity trust chains, and application permission models at scale.

Security-First Design

AppTooling is a write-capable tool. Every security decision was made to prevent accidental or malicious misuse — without getting in the way of legitimate administration.

Authentication & Authorization
  • MSAL Authorization Code Flow with PKCE — no implicit flow, no client secrets in the browser
  • Single-tenant enforcement — only accounts from the configured Entra ID tenant can sign in
  • sessionStorage cache — sessions are isolated per browser tab, not shared across tabs
  • JIT scope consent — Graph permissions are requested on demand per tool, not upfront
  • Silent sign-out — uses the login_hint optional claim to avoid extra server round-trips
OWASP Client-Side Controls
  • X-Frame-Options: DENY — blocks clickjacking attacks
  • X-Content-Type-Options: nosniff — prevents MIME-type sniffing
  • Referrer-Policy: strict-origin-when-cross-origin
  • Permissions-Policy — restricts camera, microphone, geolocation
  • Security headers applied at SWA layer — via staticwebapp.config.json
Write Operation Guardrails
  • Confirmation dialogs on every write (DELETE / PATCH / POST) — no silent mutations
  • Secrets shown once — new credential values are displayed immediately after creation and cannot be retrieved again
  • Unsaved changes detection — Manifest Editor and Optional Claims Editor prompt before navigation away
  • No client-side secret storage — no secrets or tokens written to localStorage beyond short-lived Graph response caches
Infrastructure & Data Residency
  • Fully static SPA — no server-side code, no backend, no data processed outside Microsoft's infrastructure
  • Azure Static Web Apps hosting — all requests go directly from the browser to Microsoft Graph
  • In-memory + localStorage caching of Graph responses with short TTLs (5–30 min) to reduce redundant API calls
  • No telemetry or third-party analytics beyond what Azure SWA platform collects

How AppTooling Fits the Suite

AppTooling is complementary to the other tools — it covers a distinct set of administrative operations not addressed elsewhere in the suite.

Dimension AppConfig AppTesting AppDashboard AppTooling
Write capable?
Authentication flow testing
Tenant-wide analytics & security scoring
Consent Manager (OAuth grant audit & revoke)
Workload Identity Federation / Federated Credentials
AppRole Assignment Manager
Application Manifest Editor (JSON Merge Patch)
Optional Claims Editor (structured UI)
Graph Explorer
Included | Not Available

Ready to Streamline Your Entra ID Administration?

Get AppTooling as part of the AppConfig² Suite on Azure Marketplace

Get Started on Azure Marketplace Explore the Full Suite

Questions About AppTooling?

Want to learn more or report an issue? Our team is here to help.