Azure AD Integration

The BMS integration with Azure Active Directory enables contacts and users to be automatically created and synced based on the users that are defined in one or more Active Directory tenantsPrimary integration is with Azure AD, but it can be used with on premises Active Directory via Azure AD Connect. Additionally, Active Directory records will propagate to IT Glue if that integration is enabled.

mceclip0.png

Azure AD to BMS Mapping Overview

  • Mapping of users from Active Directory to BMS is based on Security Group. If a user belongs to more than one Security Group, the Order value determines which record has precedence. The lowest Order value has precedence. If two groups have the same Order value, the oldest group has precedence. 
  • BMS will match Active Directory records to existing records based on email address. Where the email address in the AD record is found in BMS, those records will be merged. Where the email address is not found, a new record will be created in BMS. The record identifier for contacts created locally in BMS is not changed. Therefore, no linkages to tickets or other record types are affected. 
  • After initial sync, any updates to records in Active Directory will automatically be pushed to BMS. It takes up to 3 minutes for changes in Active Directory to be synced to BMS. 
  • Any changes to synced record in BMS will be persist until the record is changed in Active Directory, at which point the local changes will be overwritten. 
  • Records deleted records in Active Directory will be deactivated in BMS, but not deleted.

Azure AD Setup 

Kaseya BMS accesses the user records in your Azure AD tenant via the Microsoft Graph API. In order to do this, BMS must be authenticated and authorized by the Microsoft Identity Platform using the OAuth 2.0 standard. 

Step 1: BMS Registration 

In this part of the setup, you will register BMS with your Azure AD tenant. For background, see the this section of the Microsoft Identity Platform documentation.

  1. Navigate to your Azure AD tenant. 
  2. Note your tenant domain name, e.g., contoso.onmicrosoft.com; you will this need later.
  3. Under Manage, click App Registration. 
  4. Click +New Registration.
  5. Name the application, e.g., Kaseya BMS.
  6. Under Supported Account Types, make BMS multi-tenant. You can select either option beginning with Accounts in any organizational directory...
  7. Enter the following Redirect URI:  https://<server-base-url>/OAuth/IntegrationCallback.aspx.
  8. On the Application Overview page, note the Application ID.

mceclip10.png

Step 2: BMS Permissions

In this part of the setup, you will grant BMS permissions to access the Microsoft Graph API as the signed in BMS user. For background, see this section of the Microsoft Identity Platform documentation. 

  1. Navigate to App Registrations, and select your app, e.g., Kaseya BMS.
  2. Under Manage, select API Permissions. 
  3. Under Configured Permissions, select Add a Permission.
  4. From the right side panel, select Microsoft Graph API. 
  5. Select Delegated Permissions. For background on permission types, see this section of the Microsoft Identity Platform documentation. 
  6. Select the following permissions, and then click Add Permissions.
    • Directory.Read.All 
    • Group.Read.All 
    • User.Read 
    • User.Read.All 
  7. Click Grant Admin Consent, and accept. For background on this button, see this section of the Azure AD documentation.

mceclip9.png

Step 3: BMS Credentials 

BMS needs its own credentials in order to be able to authenticate itself to the Microsoft Identity Platform. In this part of the setup, you will generate a client ID and secret key for BMS. For background, see this section of the Microsoft Identity Platform documentation. 

  1. Begin from the last screen of the previous section. 
  2. Under Manage, click Certificates & Secrets.
  3. Click +New Client Secret.
  4. Complete the form that pops-up. 
  5. Copy the secret key to a notepad for use in the next section.

mceclip8.png

Step 4: BMS Setup 

Employee Defaults 

In this part of the setup, you will set the mapping rules for employee records. Every employee record in BMS has certain mandatory fields. If this field is not set in the Active Directory record you must decide what value the field should default to. 

  1. Navigate to Admin > My Company > Auth & Provision.
  2. At the bottom of the page, select the Azure AD Sync radio button.
  3. Complete the Employee Defaults section.
  4. Click Save. 

mceclip7.png

 Azure AD Connection 

In this part of the setup, you will plug in details of your Azure AD configuration into BMS. From Azure, you will need the following: 

  • Tenant Domain Name 
  • Application ID for BMS 
  • Client Secret for BMS 
  1. Click Add under the Azure AD Connections tab.
  2. Enter the Tenant Domain Name, Application ID, and Application Key from your Azure AD configuration.
  3. Click Azure Connect and follow the prompts.

mceclip11.png

Mapping Rules 

In this part of the setup, you will specify the groups you want to sync between BMS and Azure AD. From Azure, you will need: 

  • Tenant Domain Name 
  • Group Object ID 
  1. In Azure, navigate to your Active Directory tenant, and under Manage, click Groups.
  2. Copy the Group Object ID for the groups you want to sync to BMS.
  3. In BMS, click Add under the Mapping Rules tab.
  4. Complete the pop-up form, and click Save.
  5. Go to the Azure AD Connections tab and click Sync.
  6. You can now navigate to CRM > Contacts or HR Employees to view synced records.

mceclip12.png 

Was this article helpful?
0 out of 0 found this helpful
Have more questions? Contact us