Setup Microsoft Entra ID (formerly Azure Active Directory)
In order for IBI-aws to communicate with a Microsoft Azure Active Directory, the following steps are required.
Before setting up Microsoft Azure Active Directory access, we recommend enabling certificate-based encryption of the message file.
This ensures that only authorized clients are granted access.
IBI-aws Admin (Part 1)
Generate certificate for client authentication
Launch IBI-aws Admin
Navigate to
Settings > Directory Services
Click on
Add > Microsoft Azure Active Directory...
Choose an appropriate name
Tenant ID
andApplication ID
can first be assigned a placeholder, e.g. "tbd"Under
Certificates
click onGenerate
Then on
Activate
Click on
Export (Public Key Only)...
and save the public key of the certificate to a desired location.Click on
Save
Click on
Save
Azure Portal
Register application
Open Azure Portal
Navigate to
Azure Active Directory
> App registrations
Click on
New registration
Choose an appropriate name. E.g.
IBI-aws
Select an appropriate account type (if in doubt, select
Accounts in this organizational directory only
)Click on
Register
Setup certificate authentication
Open Azure Portal
Navigate to
Azure Active Directory
> App registrations
Select the previously registered application
Click on
Certificates & secrets
Select the
Certificates
tabUpload the previously saved certificate (Public Key) using
Upload certificate
Setup API permissions
In order for IBI-aws to query the required information, the following API permissions must be assigned:
Device.Read.All
User.Read.All
GroupMember.Read.All
These permissions are assigned as follows.
Open Azure Portal
Navigate to
Azure Active Directory
> App registrations
Select the previously registered application
Click on
API permissions
Click on
Add a permission
Select the
Microsoft APIs
tabSelect
Microsoft Graph
Click on
Application permissions
Select the above mentioned permissions using the search function.
Confirm the operation by clicking on
Add permissions
The
Admin consent
must be requested via the menu (...) of the respective permission
Dertermine Tenant ID and Application ID
Open Azure Portal
Navigate to
Azure Active Directory
> App registrations
Select the previously registered application
Note
Directory (tenant) ID
andApplication (client) ID
IBI-aws Admin (Part 2)
Finalize setup
Once the application has been registered in the Azure Portal and all permissions have been granted, the remaining information can be transferred in the IBI-aws Admin and a connection test can be performed.
Launch IBI-aws Admin
Navigate to
Settings > Directory Services
Edit the previously added
Microsoft Azure Active Directory
entryEnter the previously noted information as follows:
Directory (tenant) ID
:Tenant ID
Application (client) ID
:Application ID
Click on
Test connection
to make sure that a connection and the authentication could be performed successfullyClick on
Save
Click on
Save