Importing Users from Azure AD

Integrate Azure Active Directory (AD) with Password Manager Pro (PMP) and import users and user groups from Azure AD. Through this integration, users can login to PMP using their Azure AD credentials, in both Windows and Linux platforms. After integration into PMP, the user details and user group structure is maintained exactly as it is in the Azure AD platform.

Following are detailed steps to register PMP in the Azure portal and import users into PMP:

  1. Registering PMP in Azure AD Portal
  2. Steps to Import Users from Azure AD

    2.1 Importing Users from Azure AD

    2.2 Specifying Appropriate User Roles

    2.3 Enabling Azure AD Authentication

1. Registering PMP in Azure AD Portal

To integrate PMP with Azure AD and import users, PMP should first be added as a native client application in your Azure AD portal. Follow the steps given below to register PMP as an application:

  1. Log in to your Microsoft Azure portal.

  2. Click App registrations from the left pane under Manage.
  3. Click + New registration from the top bar.

  4. In the Register an application page, enter the following attributes:
    1. Enter Name as Password Manager Pro or any name of your choice.
    2. Choose Supported account types - Accounts in this organizational directory only - Single tenant).
    3. Enter the Redirect URI of PMP application.
  5. Click Register. PMP will be added as an application in the Azure AD portal.

  6. You will be taken to the page with the details of the newly registered PMP application.

  7. Click Authentication under Manage in the left pane. In the Authentication page, under Advanced settings, enable Allow public client flows by clicking Yes.

  8. Click API permissions under Manage in the left pane. In the API Permissions page, click +Add a permission.

  9. In the Request API Permissions page, choose Azure AD Directory Graph under Supported Legacy APIs.

  10. Click Delegated Permissions and search for "read" in the Select Permissions search bar to populate relevant permissions. Select the options Directory.Read.All, User.Read and click Add Permissions.

  11. Now, click the Grant admin consent button under Grant Consent.

  12. In the pop up that opens, click Yes to grant consent for the requested permissions.

Once you have registered PMP with appropriate permissions, go to PMP's web interface and start importing users using the steps detailed below.

2. Steps to Import Users from Azure AD

  1. Log in to PMP and navigate to Admin >> Authentication >> Azure AD.

Note: You can also import users by navigating to Admin >> Users >> Add Users >> Import from Azure AD. However, Azure AD Authentication can be enabled only from Admin >> Authentication >> Azure AD.

  1. The Azure AD Server Configuration page will be displayed, from where you need to perform the below sequence of steps:
    1. Importing users from Azure AD
    2. Specifying appropriate user roles
    3. Enabling Azure AD authentication

2.1 Importing Users from Azure AD

  1. In the Azure AD Server Configuration page, click Import Now. In the Import From Azure AD dialog box, enter the following attributes:
  2. Select Domain Name: Click the New Domain and add the Azure AD domain from which users and groups are to be imported.
  3. CLIENT ID: Enter the CLIENT ID generated in the Azure AD server while registering PMP as a Native client application in your Azure portal.
  4. Select the preferred Authentication mode. You can choose between User Access Token and App-Only Access Token.
    1. If your preferred Authentication mode is User Access Token, select Specify Username and Password Manually or Use an account stored in Password Manager Pro under Supply Credentials.
      1. If you choose to Specify Username and Password Manually, enter a valid username and password with sufficient permissions to perform user import. Usually, the username will be a part of the domain name in the format: <username@domain.onmicrosoft.com>. For instance in testuser@pmpdemo.onmicrosoft.com, <testuser> is the username. After entering the CLIENT ID and domain details, click Save to keep them auto-populated for future import operations.

      2. If you choose to Use an account stored in Password Manager Pro, select the desired Resource Name and Account Name from the drop-down.

    2. If you choose App-Only Access Token, mention the Tenant ID and Client Secret.

  5. Users to Import/User Groups to Import: To import only particular users and groups from Azure AD directory, enter the required user name(s) in comma separated form, in the field Users to Import, and required group names in User Groups to Import. [Optional Step]
  6. Synchronization Interval: Add a synchronization schedule to keep the user database constantly in sync with your Azure AD. In this field, enter the time interval at which PMP has to query Azure AD and keep the user database in sync. [Optional Step]
  7. After entering the required details, click Fetch Groups. In case you have specified users/groups to import then click Import. PMP will list all the user groups available in your Azure AD domain. Select required groups using the check boxes beside them and import users.
  8. Once the import is complete, Import Summary will be displayed with the number of users imported successfully and the ones failed. Once you click Close, you will be automatically taken to Step 2: changing appropriate user roles.

Note: To view the synchronization schedules created for Azure AD user import, click View Synchronization Schedules in the Azure AD Server Configuration window.

2.2 Specifying Appropriate User Roles

After import, all the users imported from Azure AD will be assigned the Password User role as shown in the Change Roles for users dialog box.

  1. Click Change Role button against the users for whom you wish to change the role and choose an appropriate role from the drop-down.
  2. To change roles for users in bulk, select the users using the check boxes and click Change Role at the top and choose an appropriate role from the drop-down. The changes will be saved as and when the roles are assigned.

Notes:

  • You can change the assigned roles anytime in the future by clicking Assign Roles Now in the Azure AD Server Configuration page.
  • Assign Administrator role to at least one user from the list of users imported from Azure AD as administrator privileges are required to carry out user management and other system operations in PMP.

2.3 Enabling Azure AD Authentication

The third step is to enable Azure AD authentication—enabling this will allow your users to login to PMP using their Azure AD domain password. Note that this feature will work only for users who have already been imported to the local database from Azure AD. Before enabling Azure AD authentication, ensure that AD authentication is disabled.

  1. Navigate to Admin >> Authentication >> Azure AD and click Enable Now under Enable Azure AD Authentication as shown in this image.
  2. Once Azure AD authentication is enabled, you can disable local authentication under Admin >> Settings >> General Settings >> User Management. Click here to learn more about that.

Troubleshooting:

In PMP, Azure AD authentication will not work under two circumstances, which are explained below with possible solutions:

  1. Users in the Azure AD portal have Conditional Access enabled, which prevents sending of auth token to PMP, leading to authentication failure.
    Solution: Bypass this by disabling Conditional Access at both app-level and user level in the Azure AD portal before enabling Azure AD authentication in PMP.
  2. The Azure AD portal has Multi-Factor Authentication (MFA) enabled.
    Solution: Bypass this by disabling MFA in the Azure AD portal.

In the place of Conditional Access and MFA, you can enable SAML Single sign-on in the Azure AD portal. Click here to learn how to set up SAML authentication.

©2014, ZOHO Corp. All Rights Reserved.

Top