Create Microsoft Entra App - (https://learn.microsoft.com/en-us/entra/identity-platform/quickstart-register-app?tabs=certificate)
Sign in to the Microsoft Entra admin center as at least a Cloud Application Administrator.
If you have access to multiple tenants, use the Settings icon in the top menu to switch to the tenant in which you want to register the application from the Directories + subscriptions menu.
Browse to Identity > Applications > App registrations and select New registration.
Enter a display Name for your application. Select Accounts in this organizational directory only (single tenant) in Supported account types and click register.
Configure integration fields in VSG-365.ai
Open your VSG-365.ai portal and go to Settings > Integration > Microsoft Teams Integration > Configure
Copy Directory (tenant) ID from the Entra app overview section and paste it into VSG-365 portal configuration Microsoft Tenant ID (Organization ID).
Copy Application (client) ID from the Entra app overview section and paste it into VSG-365 portal configuration Client ID (Application ID).
Go to Manage > Certificate & secrets > + New client secret. Fill in the description and expiry as per your requirement and click on Add at the bottom.
Copy the the newly created client secret value and paste it into the VSG-365 portal configuration Client Secret field.
Select a unique identification key based on the requirement and save you configuration on VSG-365.ai portal.
Email - Use this when email addresses on Microsoft Teams match email addresses on the VSG-365.ai portal.
Email Prefix - Use this when only email prefixes (the part before the @ symbol) on Microsoft Teams match email prefixes on the VSG-365.ai portal.
Employee ID - Use this when email addresses on Microsoft Teams match employee IDs on the VSG-365.ai portal (and do not match email addresses on the VSG-365.ai portal).
Employee ID Prefix - Use this when email prefixes on Microsoft Teams match employee IDs on the VSG-365.ai portal (and do not match email prefixes on the Vsg-365.ai portal).

Add Permissions to Entra app - (https://learn.microsoft.com/en-us/entra/identity-platform/quickstart-configure-app-access-web-apishttps://learn.microsoft.com/en-us/entra/identity-platform/quickstart-configure-app-access-web-apis)
Go to Manage > API permissions > + Add a permission and add the following permissions
Calendars.Read
Calendars.ReadBasic.All
CallRecords.Read.All
OnlineMeetingArtifact.ReadAll
OnlineMeetings.Read.All
User.Read
User.Read.All
These permissions will require admin consent. As shown in the screenshot below please grant admin consent for the tenant.
Configure Application Access policy for online meeting access - (https://learn.microsoft.com/en-us/graph/cloud-communication-online-meeting-application-access-policy#configure-application-access-policy)
Entra app requires an application access policy to access online meeting data which can be configured using the following commands (after replacing variables)
New-CsApplicationAccessPolicy -Identity Test-policy -AppIds "<Application (client) ID>" -Description "<description here>"
Grant-CsApplicationAccessPolicy -PolicyName Test-policy -Global