Azure Active Directory

To add your Azure AD tenant to Identity360:

  1. Log in to Identity360 as an Admin or Super Admin.
  2. Navigate to Universal Directory tab > Directory Integration > Manage Directory.
  3. Click Add Directory.
  4. Click Configure in the Azure Active Directory card under the Import From Directories section.
  5. Continue the steps under automatic or manual Microsoft 365 tenant configuration.

Automatic Microsoft 365 tenant configuration

  1. Click Authorize Identity360 and follow the instructions to automatically add the tenant to Identity360. This is the default method to add a Microsoft 365 tenant to Identity360.
  2. Click Proceed. You will be redirected to the Azure AD login page.
  3. Enter the Email address and Password of an account that has Global Administrator permissions and login.
  4. Once you are logged in, you will be prompted to grant Identity360 access to users and domain details from your Azure AD environment. Click Accept.
  5. You will be redirected back to the Identity360 portal.
  6. The Azure AD tenant is now integrated with Identity360.

Manual Microsoft 365 tenant configuration

The tenant must be configured manually if the automatic configuration was not successful due to permission issues. To do that, select Click here to configure with an already existing Azure AD application. Please note that you can also opt to configure manually and skip the automatic configuration altogether with the option provided.

Manual tenant configuration involves the following two steps:

  1. Create an Azure AD application.
  2. Configure the Azure AD application in Identity360.

Steps to create an Azure AD application

  1. Sign in to the Azure AD portal using the credentials of a Global Administrator account.
  2. Select Microsoft Entra ID from the left pane.
  3. Select App registrations.
  4. Click New registration.
  5. Provide a Name for the Identity360 application to be created.
  6. Select a supported account type based on your organizational needs.
  7. Leave Redirect URI (optional) blank; you will configure it in the next few steps.
  8. Click Register to complete the initial app registration.
  9. You will now see the Overview page of the registered application.
  10. Click Add a Redirect URI.
  11. Click Add a platform under Platform configurations.
  12. In the Configure platforms pop-up, click Web under Web applications.
  13. In the Redirect URI field, enter the following value,
    • https://identitymanager.manageengine.com/api/public/v1/oauth/redirect
  14. You can leave the Logout URL and Implicit grant fields empty. Click Configure.
  15. On the Authentication page, under Redirect URIs, click Add URI.
  16. Enter the applicable redirect URI:
    • https://id360.manageengine.com/configure-azure-ad
    • https://id360.manageengine.com/access-management-cb
  17. Click Save.
  18. Click Manifest from the left pane.
  19. Copy the entire contents from this file and paste them into the section highlighted in the image below.
  20. Application scopes mentioned in the file:

    Microsoft Graph scopes

    • Application.ReadWrite.All
    • Directory.ReadWrite.All
    • Group.ReadWrite.All
    • RoleManagement.ReadWrite.Directory
    • User.ReadWrite.All

    Office 365 Exchange Online

    • Exchange.ManageAsApp

    create an Azure AD application

    Note: Copy-paste content only from the open square bracket to the closed square bracket. Ensure that all punctuation marks are retained correctly. Once you have pasted the file, it should look like the image below.

    create an Azure AD application

  21. Click Save.
  22. Click API permissions from the left pane.
  23. In the Configured permissions section, click ✓ Grant admin consent for <your_company_name>.
  24. Click Yes in the pop-up that appears.
  25. Click Certificates & secrets from the left pane.
  26. Under the Client secrets section, click New client secret.
  27. create an Azure AD application

  28. This section generates an app password for Identity360. In the Description field of the pop-up, provide a name to identify the app to which the password belongs.
  29. Choose when the password should expire.
  30. Click Add.
  31. Copy the string under Value and save it. This is the Application Secret Key, which you will need later.
  32. Now go to the Overview section in the left pane.
  33. Copy the Application (client) ID and Object ID values and save them. You will need these values to configure your tenant in the Identity360 portal.
  34. create an Azure AD application

  35. Search for Microsoft Entra ID roles and administrators using the search bar.
  36. Click Privileged Authentication Administrator. Under the Membership pane, click Add assignments and select the Application as member. Under the Settings pane, click Active under Assignment type.
  37. Click Exchange Administrator. Under the Membership pane, click Add assignments and select the Application as member. Under the Settings pane, click Active under Assignment type.
  38. Note: Both Application (client) ID and Application Name can be used to search the application.

How to configure?

  1. Click Configure manually to add the tenant to Identity360 manually if the automatic configuration was not successful due to permission issues.
  2. Enter your Tenant Name. For example, test.onmicrosoft.com.
  3. Enter the Application ID and Application Object ID of the Azure AD application configured for Identity360 in their respective fields. Paste the values copied from Step 31.
  4. Enter the Application Secret Key of the Azure AD application configured for Identity360 in the respective field. Paste the value copied from Step 29.
  5. Click Add Tenant.
  6. The Azure AD tenant is now integrated with Identity360.

To manage the users in your Azure AD tenant from Identity360, use the All Users option.

You've now configured AzureAD application with Identity360.

Steps to modify an Azure Active Directory tenant

  1. Navigate to Universal DirectoryDirectory IntegrationManage Directory → Azure Active Directory.
  2. Under the Action column, click the edit icon of the respective tenant you want to modify.
  3. You can edit the values in the Application ID and Application Object ID fields.
  4. Note: You can find these values on the application's Overview page in the Azure AD portal.

    create an Azure AD application

  5. You can also modify the Application Secret Key.
  6. Note: You can find this value on the application's Certificates & secrets page in the Azure AD portal.

    create an Azure AD application

  7. After you have made the changes, click Update.

Copyright © 2024, ZOHO Corp. All Rights Reserved.