CtrlK
BlogDocsLog inGet started
Tessl Logo

entra-app-registration

Guides Microsoft Entra ID app registration, OAuth 2.0 authentication, and MSAL integration. USE FOR: create app registration, register Azure AD app, configure OAuth, set up authentication, add API permissions, generate service principal, MSAL example, console app auth, Entra ID setup, Azure AD authentication. DO NOT USE FOR: Azure RBAC or role assignments (use azure-rbac), Key Vault secrets (use azure-keyvault-expiration-audit), Azure resource security (use azure-security).

68

Quality

60%

Does it follow best practices?

Impact

Pending

No eval scenarios have been run

SecuritybySnyk

Passed

No known issues

Optimize this skill with Tessl

npx tessl skill review --optimize ./.github/skills/entra-app-registration/SKILL.md
SKILL.md
Quality
Evals
Security

Quality

Discovery

100%

Based on the skill's description, can an agent find and select it at the right time? Clear, specific descriptions lead to better discovery.

This is an excellent skill description that clearly defines its scope with specific capabilities, comprehensive trigger terms covering both legacy and current Azure naming, and explicit boundary conditions. The DO NOT USE FOR clause with named alternative skills is a best practice that minimizes conflict risk. The description uses proper third-person voice throughout.

DimensionReasoningScore

Specificity

Lists multiple specific concrete actions: app registration, OAuth 2.0 authentication, MSAL integration, API permissions configuration, service principal generation, and console app auth setup.

3 / 3

Completeness

Clearly answers 'what' (guides app registration, OAuth, MSAL integration) and 'when' with explicit USE FOR triggers. Additionally includes DO NOT USE FOR clauses with alternative skill recommendations, which further clarifies scope.

3 / 3

Trigger Term Quality

Excellent coverage of natural terms users would say: 'create app registration', 'register Azure AD app', 'configure OAuth', 'set up authentication', 'MSAL example', 'Entra ID setup', 'Azure AD authentication'. Covers both old (Azure AD) and new (Entra ID) naming conventions.

3 / 3

Distinctiveness Conflict Risk

Highly distinctive with explicit boundary-setting via DO NOT USE FOR clauses that redirect to specific alternative skills (azure-rbac, azure-keyvault-expiration-audit, azure-security). The niche of Entra ID/OAuth/MSAL is clearly carved out from other Azure-related skills.

3 / 3

Total

12

/

12

Passed

Implementation

20%

Reviews the quality of instructions and guidance provided to agents. Good implementation is clear, handles edge cases, and produces reliable results.

This skill reads more like a documentation overview for a human developer than an efficient instruction set for Claude. It spends significant tokens explaining concepts Claude already knows (identity concepts, application types, Graph permissions) while deferring all actionable content to reference files, leaving the main skill with no executable examples. The workflow structure is reasonable but lacks validation steps and has significant redundancy in how references are listed.

Suggestions

Remove the Key Concepts and Application Types tables—Claude already knows these. Replace with only project-specific conventions or non-obvious gotchas.

Include at least one complete, executable CLI example inline (e.g., `az ad app create --display-name 'MyApp' --sign-in-audience AzureADMyOrg`) rather than deferring all concrete commands to reference files.

Add validation checkpoints to the workflow, e.g., after Step 1: 'Verify with `az ad app show --id <app-id>` that the registration exists' and after Step 3: 'Test permissions with a token request before proceeding.'

Consolidate the three separate reference listings (inline links, References section, Reference Index table) into a single Reference Index with clear 'when to load' guidance.

DimensionReasoningScore

Conciseness

The skill explains many concepts Claude already knows (what App Registration is, what a Tenant ID is, what MSAL is, application types). The Key Concepts table, Application Types table, and descriptions of common Graph permissions are all things Claude has deep knowledge of. The content is also duplicative—references are listed in multiple places (inline, in a References section, and again in a Reference Index table).

1 / 3

Actionability

The skill contains no executable code, no concrete CLI command examples with arguments, and no copy-paste ready snippets. Nearly every actionable detail is deferred to reference files. The portal method is a vague UI walkthrough, and patterns describe what information is needed but don't provide concrete implementation steps.

1 / 3

Workflow Clarity

The 5-step workflow is clearly sequenced and logically ordered, which is good. However, there are no validation checkpoints—no step to verify the app registration succeeded, no step to test that permissions are correctly configured, and no error recovery guidance. For a multi-step process involving security-sensitive configuration, this is a significant gap.

2 / 3

Progressive Disclosure

The skill does use references well with one-level-deep links to detailed files, which is good. However, the main file is bloated with content that should either be in reference files (concept tables, permission lists) or removed entirely (things Claude knows). References are also listed three times (inline, References section, Reference Index), creating redundancy.

2 / 3

Total

6

/

12

Passed

Validation

100%

Checks the skill against the spec for correct structure and formatting. All validation checks must pass before discovery and implementation can be scored.

Validation11 / 11 Passed

Validation for skill structure

No warnings or errors.

Repository
jonathan-vella/azure-agentic-infraops
Reviewed

Table of Contents

Is this your skill?

If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.