Configuring Entra ID
Microsoft Graph API
Microsoft uses their Graph API and is in process of discontinuing Azure Active Directory Graph API. Any new feature additions are in Graph APIs only. Our connector supports Microsoft Graph API completely. No additional configuration is needed to select a particular API version
Attribute Sync Direction
While adding attribute in json file, you can choose which direction your data flows for every attribute in IDHub.
Use function syncDirection
for every attribute to choose their data flow directions.
Possible values are as follows:
'bi-directional': 'Bidirectional Synchronization',
'idhub-to-app': 'Sync IDHub to Application only',
'app-to-idhub': 'Sync Application to IDHub only',
'no-sync': 'No Synchronization'
Based on attribute functions we recommend directions. See below:
- RBAC (Role based Access Control) :
app-to-idhub
orbi-directional
- Reporting and not sensitive :
bi-directional
- Modify functions in target system and RBAC :
idhub-to-app
- Only for display :
no-sync
- Sensitive Attribute not used for audit/ reporting : Do not add attribute
Field Mapping
Another function in the json is to match a specific IDHub field with the target system attribute.
Use function idhubFieldName
and add from IDHub field list to match the fields.
List of IDHub fields can be viewed in your IDHub instance in Admin Settings page in Admin Module. Target System fields can be matched with custom added IDHub field as well.
{
"name": "fullName",
"type": "string",
"idhubFieldName": "displayName",
"required": true,
"syncDirection": "bi-directional"
}
Here target system attribute fullName
is mapped with IDHub attribute displayName
.
Multi-value Field
For making an attribute multi-valued in IDHub, use function multivalue
and mark it as true
. Some common examples are email addresses, membership, licenses attributes which provides multiple values.
Unique Field
Every target system provides at-least one unique attribute to distinguish their accounts. To mark that attribute as unique account name (In case multiple unique keys are present and you do not wish for IDHub to fetch all unique keys and mark only one as account name) use function uniqueness
and value can be server
or global
Reconciliation will fail if more than one attribute is added as unique.
For Entra ID, below are some of the attributes among others that can be unique account name.
userPrincipalName
-Recommended
mailNickName
email
id
Reconciliation Key
Possible unique reconciliation key to match account in Entra with User in IDHub are as follows:
userPrincipalName
(Entra) withemail
(IDHub) -Recommended
email
(Entra) withemail
(IDHub)employeeId
(Entra) withemployeeId
(IDHub)
Use function
isRecon
and mark astrue
ANDmutability
and mark asimmutable
Both functions need to be added to the attribute to mark it as a reconciliation key.
userPrincipalName
attribute which is marked as Reconciliation key.{
"name": "userPrincipalName",
"type": "string",
"idhubFieldName": "login",
"required": true,
"isRecon": true,
"mutability": "immutable",
"uniqueness": "server",
"syncDirection": "bi-directional"
}
More than one attribute can be used as reconciliation key. It is used to match IDHub users with accounts and combination of reconciliation keys will be used to match the account.
On-Prem Active Directory Data Sync
Our connector allows fetching of On-Premise federated users and entielements in IDHub as well.
To avail this function, you would need to have Entra Connect installed in your Active Directory server. Click here to view guide.
Once Entra connect is setup on your Active Directory server, Entra will get users and entitlements from your dedicated Organizational Units (OUs).
To fetch Active Directory entitlements in IDHub via Entra, do the following in Entitlement.json file.
- To enable sync of Active Directory entitlements, set:
onPremisesSyncEnabled eq true
- To disallow sync of Active Directory entitlements set:
onPremisesSyncEnabled ne true
License Management
Our Entra connector supports assigning of various Azure services licenses to the users. Option to provision license as individual plan is possible.
- Assigning license plan: Office 365 license pack comprises of licenses for certain individual services. E.g: SharePoint Online.
- The connector associated Licenses in IDHub as Entitlement type: ‘License’. It can be provisioned and reconciled.
To provision the licenses to user, set the user’s usageLocation
property correctly.
Manager Operations
The Microsoft Entra ID connector supports the manager
attribute for the following:
Reconciliation: On account reconciliation, the
manager
attribute for a user populates for a non-null (blank) value on the Microsoft Entra ID Managed System. Add themanager
attribute in the account schema with the string type and sync direction as bi-sync or app-to-idhub for getting manager information in IDHubProvisioning: The
manager
attribute is supported for the Add, Remove, and Edit operations where the value of the manager can be set base on an existing user’suserPrincipalName
. If thesyncDirection
formanager
isidhub-to-app
ORbi-directional
, then on user attribute modification, our connector sends updated manager information to Entra which adds the new manager in Entra automatically. If manager information provided is not present in Entra, then change requested will not be reflected in Entra