Introduction
This document is a guide for integrating the Azure Active Directory users into InfoShield.
Azure Integration Requirements
Please provide the below requirements. Note: You will need application administrator, application developer, or cloud application administrator roles. To do the below requirements:
- Application ID
- The Application Key is a confidential value.
- Azure AD Tenant ID
- OneDrive for Business URL
Flowchart Azure Integration
We integrate with Office 365 to sync users using graph APIs and to authenticate these users using OpenID Connect.
Figure 1: sync users
Figure 2: Authenticate users
Get started
To integrate with Office 365, we have to create an app in Azure AD and give require permissions and a secret key (since our use case is only syncing users, I will list the required permissions to sync only). First, click on Azure Active Directory or search for Azure Active Directory. Login to the Azure portal at https://portal.azure.com/.
Find Tenant ID
After visiting the Azure Active Directory. In the overview, you can find the Tenant ID.
Create Azure AD App
- To create an app, login to the Azure portal: https://portal.azure.com/.
- In the search bar, type Active Directory. Then, on the left navbar, click on App registrations. Then click on New registration to create a new app registration.
(Note: You will need application administrator, application developer, or cloud application administrator roles.) - Enter a name and the redirect URI for the web platform. (IMPORTANT! This should be the URL to infoshield with “/auth/iomadoidc/” postfixed. e.g. https://test.infoshield.sa/auth/iomadoidc/.
(Note: Please use your subdomain here. Replace the test with your domain. https://x.infoshield.sa/auth/iomadoic/)
Get Application (Client) ID
On the left navbar, click Overview. Then copy the Application (client) ID.
After registering the app, go to API permissions -> Microsoft Graph -> Application permissions.
Click on Add a permission, click on Microsoft Graph then click on Application Permissions, and Search and select the following permissions:
- User.Read.All
- Directory.Read.All
After adding the permissions, admin consent is required. Click on Grant Admin consent.
Moreover, as we are using this app for authentication, you need to go to Authentication -> Select the tokens you would like to be issued by the authorization endpoint then click on both access tokens and ID tokens then click save.
Finally, you will need to create a secret from Certificates & secrets -> new client secret
Create a Secret
Do the following to create a secret:
- Go to Certificates and Secrets.
- Choose New Client Secret from the tabs.
- On the description, write any name and expired date.
After creating the secret. Copy the secret value. Which you need to put in the InfoShield application key.
Summary
Now you should have the following information:
- Tenant ID
- Application ID
- Application Key (secret)
- You should provide the OneDrive URL.
Configuring InfoShield
To configure InfoShield successfully, please do the following:
- Go to Dashboard users => Microsoft Office 365 Integration => Setup.
- Make sure to do the following:
- Provide the correct Application ID.
- Provide the correct Application Key.
- Check the box for Application access.
- Then provide the following:
- Azure AD tenant ID.
- OneDrive Business URL.
- When done, click Save changes.