Rezonate
  • 🏠Home
  • 🚩Platform Tour
    • 🇻🇳Platform Dashboard
    • 🆔Identity Analytics
      • 🪪Identity Centric
      • 🔡Identity By Platform
    • ⚠️Risks & Threats
      • Highlighted ITDR Capabilities
  • ℹ️How-to Guides
    • ➕Adding Integrations
    • 🤦Manage Users
    • 🧑‍💼Customize Exposures
    • 👁️‍🗨️Querying & Filtering Data
  • 📐Core Integrations
    • Azure Integration
      • Required Privilegees
      • Update Certificate for Existing Installation
    • Okta Integration
      • Okta Integration -Remediation Supported
    • Google Workspace
      • 1-Click Integration
      • Legacy Integration
    • Google Cloud Integration
    • Zoom Integration
    • DocuSign Integration
    • GitHub Integration
      • GitHub Enterprise Expansion
    • AWS Integration
      • AWS - Required Privileges
      • Log Streaming Integration
    • Salesforce Integration
      • Salesforce - Collected Data & Query Volume
    • JAMF Pro Integration
    • CircleCI Integration
    • Auth0 Integration
    • Cloudflare Integration
    • CrowdStrike Integration
      • Integrating Permissions
    • Slack Integration
    • Workday Integration
    • BambooHR Integration
    • Snowflake Integration
    • LastPass Integration
    • SentinelOne integration
    • SAP Cloud Platform Integration
    • GitLab Integration
    • Oracle NetSuite Integration
    • Atlassian Cloud Integration
    • Zendesk Integration
    • HiBob Integration
    • Microsoft Defender Integration
    • Docusign Integration
    • Mongo Atlas Integration
    • Ping Identity One Integration
    • Generic HRIS Integration
  • 📍Notifications & Alerts
    • Slack Integration
    • HTTP Webhook Integration
      • Webhook Alert Example - Saved Search
      • Webhook Alert Example- ITDR
    • Microsoft Teams Integration
    • Torq Integration
    • Email Integration
    • Splunk Integration
    • Datadog Integration
    • PagerDuty Integration
    • Jira Integration
  • 🆘Troubleshooting & Support
    • Collectors IP Ranges
    • Data Processing
      • AWS
      • Azure Active Directory
      • Azure Cloud
      • Google Workspace
    • SSO Integrations
      • SSO Login - Okta
      • SSO Login - AzureAd
  • 📓Legal & Terms
Powered by GitBook
On this page
  • Step 1 - Creating an Application
  • Step 2 - Granting Access to Azure AD + M365
  • Step 3 (for Azure Integration) - Granting Access to Azure Management Group
  1. Core Integrations

Azure Integration

PreviousCore IntegrationsNextRequired Privilegees

Last updated 4 months ago

This document describes how to integrate the Rezonate product with the Azure Active Directory and Azure Subscriptions. The integration also covers M365 and Intune.

Step 1 - Creating an Application

  1. Browse to the Azure Active Directory .

  2. Select “Enterprise Applications” in the side menu

  3. Click “New Application”.

  4. Select “Create your own”.

  5. In the new Application name, write “Rezonate” and then click Create.

  6. After the creation process is complete, you will be redirected to the application page.

  7. Click the Permissions tab on the side menu.

  8. Select “Application registration”.

Step 2 - Granting Access to Azure AD + M365

  1. Select “Add Permissions” and select Microsoft Graph, and then Application permissions.

  1. Add the following read-only permissions for the application to acquire all relevant data:

TeamMember.Read.All UserAuthenticationMethod.Read.All Policy.Read.PermissionGrant IdentityRiskyServicePrincipal.Read.All Channel.ReadBasic.All SecurityAlert.Read.All MailboxSettings.Read Directory.Read.All ReportSettings.Read.All RoleManagement.Read.All IdentityProvider.Read.All IdentityRiskyUser.Read.All IdentityRiskEvent.Read.All AuditLog.Read.All Policy.Read.All Member.Read.Hidden Reports.Read.All DirectoryRecommendations.Read.All

After selecting the permissions, Click Add Permissions.

  1. Click “Grant Admin Consent for Rezonate” and then “Yes”.

  2. Select “Certificates & secrets” in the side menu.

  3. Select “Upload certificate”.

  4. Add the rezonate_aad_azure.crt file from Rezonate. (Attached in this article)

  5. Click the Overview button.

  6. Please copy and bring back the following items:

    1. Application (client) ID

    2. Directory (tenant) ID

Step 3 (for Azure Integration) - Granting Access to Azure Management Group

  1. Head over to the Management Groups screen, and choose the Tenant Root Group.

  2. Select Access Control (IAM) from the left-side bar.

  3. Select “Role Assignments”, then “Add”, and then “Add role assignment”.

  4. Select “Job Function Roles”, and head over to the Role tab.

  5. In this tab, select “Reader” and then “Next”.

  6. You will be moved to the “Members” page, to add members to the assignment.

  7. Click “+ Select Members” and enter the application name created in step 1 - “Rezonate”. You will see the application in the right-side menu, click it and then click “Select”.

  8. You should now see the application in the Members box. Click “Review + Assign” to finish the process.

  9. You should now see the application is assigned the “Reader” role, listed in the “Role assignments” screen.

  10. Head over to the overview screen of the subscription to find the ID.

  11. Please copy and bring back the following items:

    1. Subscription ID numbers to cover.

    2. Tenant ID.

📐
user portal
1KB
rez-2025.crt