Skip to main content

NIM

Microsoft Azure AD / Entra ID

Abstract

Overview of Azure Active Directory, a cloud-based identity management service by Microsoft, detailing its features and configuration steps.

Microsoft Entra ID is a cloud-based identity and access management service provided by Microsoft. It serves as a comprehensive solution for managing and securing user identities and ensuring seamless access to various applications and resources. Entra ID enables organizations to centralize user authentication, implement single sign-on (SSO), and enforce multi-factor authentication for enhanced security. It supports integration with a wide range of applications, both on-premises and in the cloud, facilitating secure access from anywhere and on any device. Additionally, Entra ID offers features such as identity protection, conditional access policies, and advanced reporting to help organizations monitor and manage identity-related activities effectively. Overall, Entra ID plays a crucial role in modernizing identity and access management practices for businesses in the digital era.

About

Vendor

Microsoft

Product

Entra ID (Azure AD)

Integration Type

REST

Links

github-mark.png

Table

Key

Read

Create

Update

Delete

Groups

id

GreenCheckMark.png
GreenCheckMark.png
GreenCheckMark.png
GreenCheckMark.png

Licenses

id

GreenCheckMark.png
RedCheckmark.png
RedCheckmark.png
RedCheckmark.png

Members

--

GreenCheckMark.png
GreenCheckMark.png
RedCheckmark.png
GreenCheckMark.png

Owners

--

GreenCheckMark.png
GreenCheckMark.png
RedCheckmark.png
GreenCheckMark.png

Teams

id

GreenCheckMark.png
GreenCheckMark.png
GreenCheckMark.png
GreenCheckMark.png

Risky Users

id

GreenCheckMark.png
RedCheckmark.png
GreenCheckMark.png
RedCheckmark.png

Users

id

GreenCheckMark.png
GreenCheckMark.png
GreenCheckMark.png
GreenCheckMark.png

Referencing Table

Foreign Key

Parent table

Primary Key

  1. Go to Systems > Overview.

    2023-10-12_11-00-21.jpg
  2. Click Add.

  3. Select Azure AD for System Type.

  4. Enter a System Name.

    2021-05-27_14-50-52.png
  5. Click Save.

  6. The new system is added to the Configured Systems pane.

    2021-05-27_14-52-41.png
  7. Click Configure for the system.

Go to your Azure AD portal at https://portal.azure.com/.

  1. Click Azure Active Directory under Azure Services.

  2. Go to App Registrations.

  3. Click New Registration.

  4. Enter a Name. For example, NIM.

  5. Click Register.

  6. You are taken to the new app registration.

  7. Create and upload your certificate in NIM and Azure.

    1. Outside of Azure, use your preferred method to generate a self-signed certificate. Create both X.509 encoded binary .cer and .pfx formats.

    2. In Azure, go to Certificates & Secrets. Click Upload Certificate. Use the .cer format. Click Add. The certificate is uploaded.

    3. In NIM, Add a certificate. Use the .pfx format.

  8. In Azure, go to the new app's Overview.

  9. Copy and paste the Application (Client) ID and Directory (Tenant) ID fields into the corresponding fields of the Connection tab in NIM.

    2021-05-27_14-59-12.png
  10. In NIM, select the newly uploaded certificate in the Certificates pane. The Certificate (Name) field is automatically populated.

    2021-05-27_15-23-09.png
  11. Click Save.

  12. In Azure, go to API Permissions.

  13. Click Add a Permission.

  14. Click Microsoft Graph.

  15. Click Application Permissions.

  16. Select the following permissions:

    • User.ReadWrite.All

    • Group.ReadWrite.All

    • Directory.ReadWrite.All

  17. Click Add Permissions.

  18. Click Grant Admin Consent for <app name>. Click Yes to confirm.

  19. Return to NIM.

  20. Click Test Connection. A success message is returned.

    2021-05-17_10-00-11.png

Administrators of Entra can extend available attributes on objects by creating directory extensions via one of two methods outside of NIM.

These directory extensions then can be read and updated via NIM by extending the REST schema.

Here is an example of an additional extension created for users

  1. Add file C:\ProgramData\Tools4ever\NIM\config\rest\systems\<systemname>.json (e.g. "C:\ProgramData\Tools4ever\NIM\config\rest\systems\Azure.json")

  2. Insert the following JSON into the file, modifying the field name as necessary.

    {
     "schema": {
      "crud_objects": {
       "users": {
        "resources": {
         "extension_46fd3ad18be2497aa1459db1226a4b5c_T4ETestField1": "string*"
        }
       }
      }
     }
    }

    Note

    extension_46fd3ad18be2497aa1459db1226a4b5c_T4ETestField1 is the name of the field in Entra ID. You will need to update it to match what is in your environment.

  3. Save the file.

Inside of NIM, the custom field should be displayed in the system configuration, as shown below.

entra-id-custom-field.png

The new field can now be used in a mapping like any other attribute.