Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

This integration involves registering one application to pull Customers' Azure AD details (Multi-Tenant application).

...

Topic - Table of Contents

Table of Contents

...

Multi-Tenant application

Creating Azure Application for Microsoft Partner Center

  • Step 1a: Login to https://portal.azure.com/ using MFA Enabled Global Administrator Role to get Client ID, Secret ID and set permissions.

  • Step 1b: In the Microsoft Azure Portal, search for Azure Active Directory and select it.

...

App Registration

  • Step 1c: Navigate to App Registration —> Click on + Add —> Click on App Registration.

...

  • Once the application is registered successfully, it will give a Pop-up Message as “Successfully created application <Application Name>”.

  • Step 2c: Copy the Application (Client) ID and Directory(Tenant) ID from here to be provided into the CyberCNS portal under Azure AD CSP Integration>Credentials> Azure Application for Azure Active Directory.

...

Certificate and Secrets

  • To create a New Client Secret for this created application, Navigate to Certificate and Secrets> Client Secrets> New Client Secret.

  • Provide a Description of this new client's secret

  • Provide until when this Client Secret can be used and then click on Add.

...

  • Once added an auto-generated Value will be seen. Copy the Value and use it as a Client Secret into CyberCNS Portal.

API Permissions

Below are the steps to add all required API permissions for the Azure AD application in a single shot, instead of adding them one by one.

...

This completes adding Azure Application for Azure Active Directory.

...

Azure Active Directory Non-CSP Integration setup

Global Settings → Integrations

  • Navigate to Global Settings(⚙) > Integrations and choose Azure AD Non-CSP from the integrations listed.

...

Add Credentials

  • It will lead to add credentials for your Azure AD Non CSP. Provide details as requested.

...

  • Click on + to add Azure AD CSP credentials.

  • Choose a Name for the credentials for your reference.

  • By default Azure CSP Authentication Endpoint will be Global Service, it can be changed by dropdown if the Microsoft login mail id is associated with .us or .com (US government/ Global Service)

  • Provide Tenant ID - This is the Tenant ID from the created application. (This is same for both the applications created- Multi Tenant).

  • Provide Client ID and Client Secret for created Azure application for Azure Active Directory(Multi Tenant).

  • Click on Save to save these credentials successfully. This will lead to Microsoft login page to ask for consent.

  • Once the login is successful, the Azure AD Credentials will be stored successfully.

  • A user having a Global Administrator role/permissions is required to be used for login.

  • Using the above method you can add multiple credentials.

Company Mapping

  • In Company Mapping, choose the Azure AD Credential of your choice from the dropdown

  • Click on +Add to map the company.

...

  • Import Companies from Azure AD:- To import multiple companies from Azure AD at a time. This will create a new company under CyberCNS for every company imported from Azure AD.

  • Map Existing Company to an Azure AD company:- To map an existing company into CyberCNS to the Azure AD company.

Import Companies from Azure AD

  • To import multiple companies from Azure AD, choose Import Companies from Azure AD, and click on Next.

...

  • There is an option to Delete the integration mapping using the Action column. Any company mapping can be deleted if needed.

...

Map Existing Company to an Azure AD Company

  • As shown in the below image, to map existing company, select the Existing company and Azure AD company by using a dropdown or with the search bar as per the requirement.

...