Skip to main content

Integrate with Azure

Follow this step by step guide to allow SlashID to monitor and protect your Microsoft Azure cloud environment. First, you will create an Azure App Registration, grant it the required permissions and generate a client secret which allows SlashID to interact with Azure on your behalf. Second, you will use the details of your new App Registration to configure the integration in the SlashID Console.

Step 1: Create Azure App Registration

  1. Log in to Microsoft Azure Portal.

  2. Search for or select Microsoft Entra ID (previously: Azure Active Directory) from the list of resources on the side menu.

  3. From the menu on the left, select 'Manage' > 'App registrations'.

  4. From the horizontal menu at the top of the page, choose 'New registration'.

new registration

  1. Enter a name for this app registration, select the appropriate account type, then press 'Register' to confirm. Going forward, we'll call this your SlashID App Registration.

register application

Step 2: Grant permissions

  1. In your SlashID App Registration page, select 'Manage' > 'API permissions' from the side menu.

  2. Choose 'Add a permission' and then select 'Microsoft Graph' from the list of Microsoft APIs available.

Add a permission

  1. Choose 'Application permissions' for the permission type.

application permissions

  1. Search for and select the following permissions:
  • AuditLog.Read.All
  • Directory.Read.All
  • IdentityProvider.Read.All
  • IdentityRiskyUser.Read.All
  • User.Read.All Click the 'Add permissions' button to confirm.
  1. In your 'SlashID App Registration | API permissions' page, click on the 'Grant admin consent for [Your Organization Name]' and confirm the permission grant.

application permissions

Step 3: Generate client secret

  1. In your SlashID App Registration page, select 'Manage' > 'Certificates & secrets' from the side menu.

certificates and secrets

  1. Under 'Client secrets', choose 'New client secret'

certificates and secrets

  1. Enter a description and a duration for the new client secret and press the 'Add' button. We recommend 365 days as the expiry period.

add a client secret

  1. Copy the secret Value and keep it safe, you will need to enter it in the SlashID Console later.

copy secret value to clipboard

Step 4: Obtain client and tenant ID

  1. In your SlashID App Registration page, select 'Overview' from the side menu.

  2. Copy the 'Application (client) ID' and the 'Directory (tenant) ID'. You will need to enter them in the SlashID Console later.

copy client id and tenant id

Step 5: Generate a certificate

Generate a new certificate for your Azure app following the same process of steps 3 and 4. Copy and store the client certificate and certificate key. You will need to enter them in the SlashID Console later.

Step 6: SlashID Console configuration

  1. Go to the SlashID Console > 'Identity Protection' > 'Configuration' > 'Data sources'. Click on 'Add data source' on the right.

  2. Select 'Azure' from the list of providers in the drop-down menu.

  3. Fill in the connection details:

SlashID Console fieldDescription
Name of the connectionArbitrary name you give to this connection
Directory (tenant) IDThe tenant ID obtained in step 4
Application (client) IDThe application ID obtained in step 4
Azure subscription IDYour Azure subscription ID
Client secretThe client secret obtained in step 3
Client certificateThe client certificate obtained in step 5
Certificate keyThe client certificate key obtained in step 5
Authoritative statusDecide whether Azure identities are the primary (or secondary) source of truth when reconciling identities across providers

Click on the Connect button.

The initial data sync may take a couple of minutes, after which you can start exploring security events in the 'Identity Protection Dashboard' of the SlashID Console.