Azure AD
Version: 1.8
Updated: Jan 16, 2024
Azure Active Directory (Azure AD) is Microsoft's cloud-based identity and access management service, which helps your employees sign in and access resources.
Actions​
- Create User (Enrichment) - Create a new user.
- Delete User (Containment) - Delete a specific user.
- List Users (Enrichment) - List all users.
- Get User (Enrichment) - Get details for a specific user.
- Create Group (Enrichment) - Create a group.
- Delete Group (Containment) -Delete a specific group.
- Add Member To Group (Enrichment) - Add a user to a specific group.
- Get Manager (Enrichment) - Get user manager.
- List Groups (Enrichment) - List all the groups available in an organization.
- Revoke Sign In Sessions (Containment) - Invalidates all the refresh tokens issued to applications for a user (as well as session cookies in a user's browser).
- List Devices (Enrichment) - Retrieve a list of device objects registered in the organization.
- Disable User (Containment) - Block user account.
- Get Member Groups (Enrichment) - Retrieve a Group memberships for the user.
Azure Active Directory configuration​
The following steps show how to create an Azure AD Application in order to work with Cloud SOAR.
- Log in to Azure portal with the user that has administrator privileges.
- Navigate to Azure Active Directory > App registrations > New registration.
- In the registration form, choose a name for your application and then click Register.
- Write down the Application ID and Directory ID, you will need them later for the integration configuration.
- Configure Azure AD Application permissions: on the left choose API permissions.
- Then click the Add a permission button.
- Select your application in App registrations in the Azure portal.
- Delegated permissions are selected by default.
- Delegated permissions are appropriate for client apps that access an API as the signed-in user, and whose access should be restricted to the permissions you select in the next step.
- Application permissions are for service or daemon-type applications that need to access API as themselves, without user interaction for sign-in or consent.
- Select the following permissions to add:
- Delegated (work or school account). User.Read, User.ReadWrite, User.ReadBasic.All, User.Read.All, User.ReadWrite.All, Directory.Read.All, Directory.ReadWrite.All, Directory.AccessAsUser.All.
- Delegated (personal Microsoft account). User.Read, User.ReadWrite.
- Application. User.Read.All, User.ReadWrite.All, Directory.Read.All, Directory.ReadWrite.All.
- Once API permission are added then Admin must consent to a grant these permissions (Learn more about permissions and consent).
- Once Admin Consent is granted, API permissions configuration have been completed. Then we have to add a Client secret that will be used for the authentication, along with Client ID and Directory ID. To add Client secret, go to Certificates and secrets, and click New client secret.
- Select description and expiry period for the created secret and create it.
- Once it's created, make sure you save its value, since its only displayed once.
- Once you do these steps you will need to find the Tenant ID in order to use it on your resources file.
- Configuration of Azure AD application is completed, you will need application’s Client ID, secret, Tenant ID.
Change Log​
- October 7, 2021 - First upload
- March 11, 2022 - Logo
- November 10, 2022 (v1.2) - New Action: Get Manager
- April 28, 2023 (v1.3)
- Updated integration: (Updated the integration Fields with Environmental Variables and improved error handling)
- Remove action (Filter Users) as we already have a similar List Users Action
- Changed a few actions type from Containment to Enrichment
- Added New Action List Groups
- June 26, 2023 (v1.4) - Changed multiline hints to single line
- August 25, 2023 (v1.5)
- Added New Action Revoke Sign In Sessions
- August 31, 2023 (v1.6) - Added new actions: List Devices, Disable User
- September 19, 2023 (v1.7) - Versioning
- January 16, 2024 (v1.8)
- Added New Action: Get Member Groups