IT Administrator Setup

Good news! Most users can sign in without IT administrator approval. Airgentic only requests standard OpenID Connect permissions that are user-consentable in most Azure AD / Entra ID configurations.
When is this page needed? This page is only required if your organisation has configured Azure AD / Entra ID to block all third-party applications, regardless of what permissions they request. This is a strict security policy that some organisations use to prevent any unapproved apps.

Microsoft / Azure AD Setup

What permissions does Airgentic need?

  • openid - Standard OpenID Connect authentication
  • email - Access to the user's email address
  • profile - Basic profile information (name)

These are standard OpenID Connect scopes that are user-consentable by default in Azure AD / Entra ID. Airgentic does not request access to Microsoft Graph API or any organisational data. No data is stored beyond what is needed for authentication.

Application Details:

  • Application Name: ET Admin Console / Airgentic
  • Application (Client) ID: 7e8a1998-3c5a-49c6-8a6f-9a836a9df94d
  • Publisher: admin.airgentic.com

Option 1: Grant Admin Consent

If your organisation blocks all third-party apps, click the button below to grant admin consent. You'll need to sign in with an Azure AD / Entra ID Global Administrator account.

Option 2: Approve via Azure Portal

  1. Sign in to the Azure Portal
  2. Navigate to Microsoft Entra ID > Enterprise Applications
  3. Search for Application ID: 7e8a1998-3c5a-49c6-8a6f-9a836a9df94d or "Airgentic"
  4. Go to Permissions and click Grant admin consent

Option 3: Enable User Consent (Recommended)

Instead of pre-approving Airgentic, you can enable user consent for low-risk permissions:

  1. Sign in to the Azure Portal
  2. Navigate to Microsoft Entra ID > Enterprise Applications > Consent and permissions
  3. Under User consent settings, select Allow user consent for apps from verified publishers, for selected permissions
  4. This allows users to consent to standard OpenID Connect scopes without IT involvement

Google Workspace Setup

What permissions does Airgentic need?

  • Basic profile information (email address and name)
  • OpenID Connect authentication scopes

These are standard OAuth 2.0 scopes for user authentication. No additional data access is requested.

How to pre-approve for Google Workspace:

  1. Sign in to the Google Admin Console
  2. Navigate to Security > API Controls > App access control
  3. Click Manage Third-Party App Access
  4. Search for "Airgentic" or add by Client ID
  5. Set access to Trusted for your domain

Note: Google Workspace typically allows user consent by default for basic profile scopes. Pre-approval is only needed if your organisation has restricted app access.


Need Help?

If you have questions or need assistance with the setup process, please contact our support team:

Email: support@airgentic.com

You have unsaved changes