CtrlK
BlogDocsLog inGet started
Tessl Logo

entra-app-registration

Guides Microsoft Entra ID app registration, OAuth 2.0 authentication, and MSAL integration. USE FOR: create app registration, register Azure AD app, configure OAuth, set up authentication, add API permissions, generate service principal, MSAL example, console app auth, Entra ID setup, Azure AD authentication. DO NOT USE FOR: Azure RBAC or role assignments (use azure-rbac), Key Vault secrets (use azure-keyvault-expiration-audit), general Azure resource security guidance.

77

Quality

71%

Does it follow best practices?

Impact

Pending

No eval scenarios have been run

SecuritybySnyk

Passed

No known issues

Optimize this skill with Tessl

npx tessl skill review --optimize ./plugin/skills/entra-app-registration/SKILL.md
SKILL.md
Quality
Evals
Security

Quality

Discovery

100%

Based on the skill's description, can an agent find and select it at the right time? Clear, specific descriptions lead to better discovery.

This is an excellent skill description that hits all the marks. It provides specific capabilities, comprehensive trigger terms covering both legacy and current Azure naming, explicit use/don't-use guidance, and clear boundaries with other skills. The DO NOT USE FOR clause with skill redirects is a particularly strong pattern for reducing conflict risk.

DimensionReasoningScore

Specificity

Lists multiple specific concrete actions: app registration, OAuth 2.0 authentication, MSAL integration, API permissions configuration, service principal generation, and console app auth. These are clearly defined capabilities.

3 / 3

Completeness

Clearly answers both 'what' (guides app registration, OAuth, MSAL integration) and 'when' (explicit USE FOR clause with trigger terms). Additionally includes a DO NOT USE FOR clause that further clarifies boundaries and redirects to other skills.

3 / 3

Trigger Term Quality

Excellent coverage of natural terms users would say: 'create app registration', 'register Azure AD app', 'configure OAuth', 'set up authentication', 'MSAL example', 'Entra ID setup', 'Azure AD authentication'. Covers both old (Azure AD) and new (Entra ID) naming conventions.

3 / 3

Distinctiveness Conflict Risk

Highly distinctive with a clear niche in Entra ID/Azure AD authentication. The explicit DO NOT USE FOR clause with redirects to specific alternative skills (azure-rbac, azure-keyvault-expiration-audit) actively prevents conflicts with related Azure skills.

3 / 3

Total

12

/

12

Passed

Implementation

42%

Reviews the quality of instructions and guidance provided to agents. Good implementation is clear, handles edge cases, and produces reliable results.

The skill is well-organized with excellent progressive disclosure and clear navigation to reference materials. However, it is overly verbose in explaining concepts Claude already knows (identity platform basics, what app registrations are, generic security practices) and lacks executable code examples in the main body, deferring nearly all actionable content to reference files. Adding a validation step to the workflow and trimming conceptual explanations would significantly improve quality.

Suggestions

Remove or drastically condense the 'Key Concepts' and 'Application Types' tables—Claude already knows what a Client ID, Tenant ID, and redirect URI are.

Add at least one executable code snippet in the main body (e.g., a minimal MSAL authentication example or a complete `az ad app create` command with parameters) instead of deferring all code to references.

Add a validation/verification step to the workflow (e.g., 'Step 6: Verify by running `az ad app show --id <app-id>` and testing a token acquisition') to catch configuration errors.

Trim the Security Best Practices table to only non-obvious, Entra-specific recommendations rather than generic security advice like 'Use HTTPS' and 'Enable MFA'.

DimensionReasoningScore

Conciseness

The overview explains what Entra ID is and defines basic concepts (App Registration, Client ID, Tenant ID, etc.) that Claude already knows. The 'Key Concepts' and 'Application Types' tables are padding that adds little actionable value. The security best practices table contains generic advice Claude would already know.

1 / 3

Actionability

The skill provides some concrete guidance (portal steps, CLI command table, common Graph permissions) but almost all executable content is deferred to reference files. The main body contains no executable code examples—just descriptions and pointers. The CLI commands table is useful but lacks actual usage examples with parameters.

2 / 3

Workflow Clarity

The 5-step workflow is clearly sequenced and logically ordered, but there are no validation checkpoints or feedback loops. For operations involving secret creation and permission configuration (which can fail silently or have security implications), there's no 'verify your setup works' step or error recovery guidance.

2 / 3

Progressive Disclosure

The skill excels at progressive disclosure with a clear overview structure and well-signaled one-level-deep references to CLI commands, OAuth flows, console app examples, API permissions, SDK references, and troubleshooting. Navigation is easy and references are clearly labeled with their purpose.

3 / 3

Total

8

/

12

Passed

Validation

100%

Checks the skill against the spec for correct structure and formatting. All validation checks must pass before discovery and implementation can be scored.

Validation11 / 11 Passed

Validation for skill structure

No warnings or errors.

Repository
microsoft/github-copilot-for-azure
Reviewed

Table of Contents

Is this your skill?

If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.