Azure Integration
This document describes how to integrate the Rezonate product with the Azure Active Directory and Azure Subscriptions. The integration also covers M365 and Intune.
Step 1 - Creating an Application
Browse to the Azure Active Directory user portal.
In the new Application name, write âRezonateâ and then click Create.
After the creation process is complete, you will be redirected to the application page.
Click the Permissions tab on the side menu.
Select âApplication registrationâ.
Step 2 - Granting Access to Azure AD + M365
Select âAdd Permissionsâ and select Microsoft Graph, and then Application permissions.
Add the following read-only permissions for the application to acquire all relevant data:
TeamMember.Read.All UserAuthenticationMethod.Read.All Policy.Read.PermissionGrant IdentityRiskyServicePrincipal.Read.All Channel.ReadBasic.All SecurityAlert.Read.All Group.Read.All AdministrativeUnit.Read.All MailboxSettings.Read Directory.Read.All ReportSettings.Read.All RoleManagement.Read.All User.Read.All Domain.Read.All GroupMember.Read.All IdentityProvider.Read.All TeamSettings.Read.All IdentityRiskyUser.Read.All Organization.Read.All IdentityRiskEvent.Read.All AuditLog.Read.All Policy.Read.All Member.Read.Hidden Application.Read.All Reports.Read.All DirectoryRecommendations.Read.All
After selecting the permissions, Click Add Permissions.
For Microsoft 365 integration, select âAdd Permissionsâ again, and select Office 365 Management APIs, and then Application permissions.
Add the following permissions read-only permissions:
ActivityFeed.Read ActivityFeed.ReadDlp |
After selecting the permissions, Click Add Permissions.
Click âGrant Admin Consent for Rezonateâ and then âYesâ.
Select âCertificates & secretsâ in the side menu.
Select âUpload certificateâ.
Add the rezonate_aad_azure.crt file from Rezonate. (Attached in this article)
Click the Overview button.
Please copy and bring back the following items:
Application (client) ID
Directory (tenant) ID
Step 3 (for Azure Integration) - Granting Access to Azure Management Group
Head over to the Management Groups screen, and choose the Tenant Root Group.
Select Access Control (IAM) from the left-side bar.
Select âRole Assignmentsâ, then âAddâ, and then âAdd role assignmentâ.
Select âJob Function Rolesâ, and head over to the Role tab.
In this tab, select âReaderâ and then âNextâ.
You will be moved to the âMembersâ page, to add members to the assignment.
Click â+ Select Membersâ and enter the application name created in step 1 - âRezonateâ. You will see the application in the right-side menu, click it and then click âSelectâ.
You should now see the application in the Members box. Click âReview + Assignâ to finish the process.
You should now see the application is assigned the âReaderâ role, listed in the âRole assignmentsâ screen.
Head over to the overview screen of the subscription to find the ID.
Please copy and bring back the following items:
Subscription ID numbers to cover.
Tenant ID.
Last updated