Integrating Microsoft Azure Active Directory Identity Protection with SecurityCoach
In this article, you will learn how to integrate Microsoft Azure Active Directory (AD) Identity Protection with SecurityCoach. Once you set up this integration, data provided by Microsoft Azure AD Identity Protection will be available under the SecurityCoach tab of your KMSAT console. This data can be viewed in SecurityCoach reports and used to create detection rules for real-time coaching campaigns.
Click the links below to learn how to integrate Microsoft Azure AD Identity Protection with SecurityCoach. For general information about SecurityCoach, see our SecurityCoach Product Manual. If you would like to learn how to integrate other Microsoft products with SecurityCoach, see the vendor integration guides in our Knowledge Base.
Jump to:
Set Up the Integration in Your Microsoft Azure Portal
Set Up the Integration in Your KMSAT Console
Set Up the Integration in Your Microsoft Azure Portal
Before you can set up this integration in your KMSAT console, you will need to register the SecurityCoach application, add API permissions, and create a client secret in your Microsoft Azure portal.
Important: The registered application, API permission, and client secret must be unique to this integration. You cannot reuse a registered application, API permission, or client secret used to integrate another Microsoft product with SecurityCoach.
To jump to the article subsection for each of these steps, click the links below:
Register the SecurityCoach Application
First, you will need to register the SecurityCoach application in your Microsoft Azure portal. To register the application, follow the steps below:
- Log in to your Microsoft Azure portal and navigate to the Azure Active Directory.
- From the sidebar on the left side of the page, select App registrations.
- Click + New registration and enter a name for your application, such as “knowbe4integrations”.
- Click Register.
Add API Permissions
After you have registered the SecurityCoach application, you can add API permissions from the App registrations page of your Microsoft Azure portal. To add API permissions, follow the steps below:
Important: You must be logged in as a user with an Azure AD Premium P2 license when adding API permissions for this integration. Otherwise, your integration may fail.
- Select the registered application you created in the Register the SecurityCoach Application section of this guide. In the example below, the registered application is titled “knowbe4integrations”.
- From the sidebar on the left side of the page, select API permissions.
- Click + Add a permission.
- Select Microsoft Graph from the Microsoft APIs subtab.
- Click Application permissions.
- Click the IdentityRiskEvent drop-down menu and select the check box next to IdentityRiskEvent.Read.All. Then, click the IdentityRiskyUser drop-down menu and select the check box next to IdentityRiskyUser.Read.All.
- Click Add permissions.
- Click Grant admin consent for [your active directory name]. Once permission is granted, the triangle symbol on the right side of the page will change to a green check mark.
Create a Client Secret
After you have registered the SecurityCoach application and added your API permissions, you can create a client secret from the App registrations page of your Microsoft Azure portal. To create a client secret, follow the steps below:
- From the sidebar on the left side of the page, select the SecurityCoach application that you registered earlier. When you click on the registered application, the application’s overview will display.
- From the sidebar on the left side of the page, select Certificates & secrets.
- Click + New client secret.
- Enter a description for the client secret and select an expiry window.
- Click Add. Once you click Add, the client secret Value and Expires date will display on the page.
- Copy and save the client secret Value and Expires date somewhere that you can easily access. You will need these credentials to complete the integration setup outlined in the Set Up the Integration in Your KMSAT Console section below.
Set Up the Integration in Your KMSAT Console
Once you’ve set up the integration in your Microsoft Azure portal, you can set up the integration in your KMSAT console.
Note: To complete these steps, you will need to have both your Microsoft Azure portal and your KMSAT console open in your browser.
To set up the integration in your KMSAT console, follow the steps below:
- Log in to your KMSAT console and navigate to SecurityCoach > Setup > Security Vendor Integrations.
- Locate Microsoft Azure AD Identity Protection and click Configure.
- In a separate browser window, log in to your Microsoft Azure portal and navigate to your Azure Active Directory.
-
From the Overview page, scroll down to the Tenant information section. Then, copy the Primary domain.
-
In your KMSAT console, paste your Primary domain in the Domain field.
-
To get your client ID, navigate to the App registrations page of your Microsoft Azure portal and click on the SecurityCoach application that you registered earlier. When you click on the registered application, the application’s overview page will display.
-
On the application’s overview page, copy the Application (client) ID in the Essentials section at the top of the page.
-
Navigate back to your KMSAT console. In the Client ID field, paste your Application (client) ID.
-
In the Client Secret field, enter the Value for the client secret that you created earlier.
-
In the Token Expiration Date field, select the Expires date for the client secret that you created earlier.
-
To finish setting up the integration, click Authorize.
Once you’ve successfully authorized this integration, you can manage detection rules for Microsoft Azure Active Directory Identity Protection on the Detection Rules subtab of SecurityCoach. For a full list of available system detection rules for this vendor, see our Which Detection Rules Can I Use with My Vendors? article.
Comments
0 comments
Article is closed for comments.