Skip to main content

Connect to Microsoft Entra ID

Connect and integrate your Microsoft Entra ID user store into your AdminX tenant. Once integrated, all your Azure AD users can be managed from AdminX.

Prerequisites for Azure

AdminX and BlockID integrate with Microsoft Entra ID natively using Microsoft Graph. To set up this integration, we need to create a few things in Azure.

tip

Please ensure that your Azure environment has permission to perform the following steps

Registering an Application

  1. Navigate to https://portal.azure.com/ and log in using your Azure credentials. Once you are logged in, scroll down to Azure services.

  2. Click Microsoft Entra ID.

  3. From the application Overview page, under the Manage drop-down menu, click the App registrations link.

  4. From the App registrations page, click New registration

  5. In the Register an application page that is displayed, enter a user-facing display name for your application. For this example, we are using the name Test Demo Wiki.

  6. Under the Supported account types section, select Accounts in this organizational directory only (application name only - Single-tenant).

  7. Leave the Redirect URI (optional) section blank.

  8. Review your selections and then click Register.

  9. Once the app is registered, you will be redirected to the page listing various details. Make a note of or copy the Application (client) ID as we will need this to configure AdminX for Azure AD.

Creating the Application Secret

From the same application overview page, click the Certificates & secrets link located on the left-hand menu, under Manage.

From Certificates & secrets click New client secret. Enter a name in the Description box, and select how soon the secret should expire.

Click Add.

You will now see your secret listed under Client secrets. Make a note of, or copy the Value parameter. We will need this secret to configure AdminX for Azure AD.

Creating the Application Permissions

To use Microsoft Entra ID with AdminX, follow these steps:

  1. Under the Manage drop-down menu of the applications overview page, click Authentication.
  1. Scroll down to Advanced settings, and toggle the Allow public client flows option to Yes.

  2. Click Save.

danger

The Allow public client flows option must be set to Yes to use Microsoft Entra ID in AdminX.

  1. Under the Manage drop-down menu, click API permissions.
  1. On the API permissions page, click Add a permission. A window titled Request API permissions will pop up. Select Microsoft graph, the largest of the available icons.
  1. Click Application permissions.
  1. Under Select permissions, there is a search box. Search for the following permissions in the search box by entering the first word - such as Directory - and by then expanding the Directory result to see the full list of permissions:

    If you wish to enable reading and writing to the user directory - being able to add or delete users - enable the following permissions:

    • Directory.Read.all
    • Directory.ReadWrite.all
    • User.Read
    • User.ReadWrite.all

    If you only wish to read from the user directory and to not be able to add new users, instead enable the following permissions:

    • Directory.Read.all
    • User.Read
    • User.Read.all
  2. After selecting all the required permissions, click Add permissions.

  1. The permission will need to be approved by an administrator before it can be used. To grant consent, click Grand admin consent for [your application].
  1. After approving consent, the status will be changed to Granted.

Configuring Microsoft Entra ID in AdminX

The following items are needed to configure Microsoft Entra ID in AdminX.

  • Application (client) ID: The application (client) ID can be found on the App registrations page.

    Azure Home -> Microsoft Entra ID -> App registrations

  • Tenant ID: Found on the Azure Active Directory Overview page.

    Azure Home -> Microsoft Entra ID.

The tenant ID can also be found on [your application name] Overview, at

Azure Home -> Microsoft Entra ID -> App registrations -> [your application name]

  • (Tenant) Name: Your Azure tenant Name, Found on the Azure Active Directory Overview page.

    Azure Home -> Microsoft Entra ID.

  • Client Secret: Secret for your app registration. Located on the application Certificates and secrets page.

    Azure Home -> Microsoft Entra ID -> App registrations -> [your application name] -> Certificates and secrets

You can only view the certificate at the time it is created. If you lost your secret, you can create a new one by clicking New client secret

  • Login URL: Your login URL defaults to https://login.microsoftonline.com

  • Graph API URL: Your Graph API URL defaults to https://graph.microsoft.com

Setting up Microsoft Entra ID in AdminX

After configuring all the necessary prerequisites, you can connect to Microsoft Entra ID using AdminX.

  1. Log in to your tenant as a community administrator.

  2. From the left-pane, navigate to Directory menu.

  3. In the Directory Integrations page that is displayed, click Add new directory.

  4. Select Azure AD.

  1. Review the information displayed, and click Setup Azure AD
  1. Enter all the information you copied from Azure (See the picture for reference).
  1. Configure attributes mapping for the BlockID data store used internally by AdminX. This mapping links the Azure directory attributes - such as name, number, etc. - to the attributes used by BlockID.

The following attributes need to be mapped:

Azure Directory AttributeBlockID Attribute Name
givenNamefirstname
surnamelastname
userPrincipalNameemail
mobilePhonephone
userPrincipalNameusername
  1. Click Add new mapping

  2. Enter the Azure attribute in the top box labeled Directory attribute. Use the drop-down menu to select the corresponding BlockID attribute from the table above, and click Create.

  1. Repeat this process until all the attributes from the table above are mapped, and click Next.

Once the attributes are mapped, you are done! You can click the View Users button to preview your Azure AD users.

  1. Click Complete to finish adding your Azure AD directory into Adminx.

You can now view the added Azure AD directory to the Directory Integrations page in AdminX.