Setup Guide
A

Setup Guide

Connect SignalForge to your Microsoft Sentinel workspace

Prerequisites

  • 1.An active Microsoft 365 or Azure subscription
  • 2.Microsoft Sentinel workspace with active analytics rules
  • 3.Azure AD (Entra ID) administrator access for app registration

Step 1: Register an Application in Entra ID

  1. Navigate to the Azure Portal → Microsoft Entra ID → App registrations
  2. Click "New registration"
  3. Name: SignalForge
  4. Supported account types: "Accounts in this organizational directory only"
  5. Redirect URI: http://localhost:3000/api/auth/callback/azure-ad
  6. Click "Register"

Step 2: Configure API Permissions

  1. In the app registration, go to "API permissions"
  2. Click "Add a permission" → "Microsoft Graph"
  3. Select "Application permissions"
  4. Add the following permissions:
    • SecurityIncident.Read.All
    • SecurityAlert.Read.All
  5. Click "Grant admin consent" for your organization

Step 3: Create a Client Secret

  1. Go to "Certificates & secrets"
  2. Click "New client secret"
  3. Description: SignalForge Production
  4. Expiry: 24 months (recommended)
  5. Copy the secret value immediately — it won't be shown again

Step 4: Gather Required Values

You'll need the following values for your .env file:

From App Registration → Overview

AZURE_AD_CLIENT_ID=<Application (client) ID>

From App Registration → Overview

AZURE_AD_TENANT_ID=<Directory (tenant) ID>

From Step 3

AZURE_AD_CLIENT_SECRET=<Client secret value>

Step 5: Configure SignalForge

  1. Copy .env.example to .env
  2. Fill in all the values from the previous steps
  3. Set NEXTAUTH_SECRET to a strong random string
  4. Restart the application