How to grant Microsoft admin consent for .id tools
Steps for IT administrators in Microsoft Entra ID (Azure Active Directory)
This article is for IT administrators who manage staff identities in Microsoft Entra ID (formerly Azure Active Directory). It explains how to grant admin consent so staff can use Microsoft sign-in with .id tools.
Before you begin
You'll need:
- A Global Administrator or Cloud Application Administrator role in Microsoft Entra ID.
- Access to https://portal.azure.com.
If your organisation's process requires you to log or document app consent decisions, you may also need these details about the .id consulting app:
- Application name: .id consulting
- Company name: ID Consulting Pty Ltd
- Reason for access: Suite of applications supplied by ID CONSULTING.
- Homepage URL: https://www.id.com.au
Steps
1. Sign in to the Azure portal.
Go to https://portal.azure.com and sign in as a Global Administrator or Cloud Application Administrator.
2. Open Microsoft Entra ID.
From the left-hand menu, select Microsoft Entra ID (formerly Azure Active Directory).
3. Open Enterprise applications.
Under 'Manage' in the left-hand menu, click 'Enterprise applications'.

4. Find '.id consulting' in the list.
In the All applications search box, type '.id consulting' and select the matching result.

On the .id consulting application page, select 'Permissions' under 'Security' in the left-hand menu. Click the 'Grant admin consent for .id consulting' button and follow the prompts to confirm.

6. Verify consent has been granted.
The permissions list now shows the consent status as 'Granted for [your organisation name]'.
What to expect
Once consent is granted, staff can use their existing Microsoft account to sign up and log in to .id tools. No further action is needed from IT for each user.
Troubleshooting
- If '.id consulting' doesn't appear in the list, contact us at support@id.com.au, including a screenshot of the search you ran in Azure.
- If you don't have the required role, ask a colleague with Global Administrator or Cloud Application Administrator privileges to complete these steps on your behalf.