2015

Prev Next

Prerequisites in Azure:
- A Directory ID, Application ID and Client Secret.
- API permissions: "Domain.Read.All", "Group.Read.All", "User.Read.All"

Gathering the Directory ID, Application ID and Client Secret:

  1. Create a new application in the “Application Registration” menu.
  2. Once created, you can now view the Application ID and Directory ID from the application’s “Overview” page.
  3. To obtain the secret value, you will need to create one via the “Certificates & secrets” menu > Client secrets > New client secret:

    Note: The value of the secret only appears once. If you refresh the page the value will be masked and you may need to create a new one.

Setting the required API permissions in Azure:

  1. In the same application that you created in the above steps, go to the “API permissions” menu.
  2. Select “Add a permission” > Microsoft Graph > Delegated permissions and add the following permissions: "Domain.Read.All", "Group.Read.All", "User.Read.All"
  3. Once added, you will now need to select “Grant admin consent” for the permissions to come into effect:

Configuring AzureAD in ADSync:

  1. Open the SecureDoc Services Configuration panel and select ADSync
  2. Go to the “Sync Config” tab and right click the root > Create Azure AD:
  3. A window will appear where you will enter your Directory ID, Application ID and the Client Secret:
  4. Once saved, restart SDConnex and ADSync.
  5. In ADSync > Sync Config, selct "Full Sync".
  6. A green folder should now appear in the SES console containing the Entra ID (Azure AD) users.