Modules
Sign in
Get Help

Microsoft Integration

Introduction

This integration enables the flow of data from Microsoft directly in to IT Glue. Tenants, Users and Mailbox information will sync automatically, staying accurate and up to date.

Benefits of this integration include:

  • Managing the options of your Microsoft asset including manual syncing and comparing data between IT Glue and Microsoft
  • Jump from IT Glue to a User List in the Tenant Portal when you click Manage on a synced Contact
  • Viewing logs related to your Microsoft integration in the Sync Logs

At any time, you can come back to the Active Integrations screen (Account > Integrations) to make changes to the integration.

The field mappings are set up automatically when you follow the instructions below. For more information, refer to our Microsoft Field Mapping KB article.

Note - As of January 5th 2024 we're now supporting GDAP, please follow the below steps to ensure your integration is working correctly.

Prerequisites

  • Manager or Administrator access to IT Glue
  • One available data source
  • Microsoft Cloud Partner certified to offer delegated administration
  • Delegated admin permissions to each of your clients' Microsoft tenants through your own.
  • Granular Delegated admin permissions (GDAP) relationship with Microsoft Entra roles to each of your clients' Microsoft tenants through your own Microsoft admin portal

You will need to turn off a feature in Microsoft that conceals users, groups, and site names. If you do not turn off this feature then the integration will not be able to see mailbox usage. To prevent this issue, action the following steps in the Microsoft 365 Admin Center.

  1. In the Microsoft 365 Admin Center, navigate to Settings > Org Settings > Services.
  2. Select Reports.
  3. Clear Display concealed user, group, and site names in all reports, and click Save.

Note - Please note that the Microsoft integration supports direct logins to client admin portals, but integrating in this way requires an additional data source and following the steps in this article for each client you wish to integrate.


Warning.
 Before you start this integration, thoroughly review your existing contacts in IT Glue and ensure they follow the matching logic below. If existing contacts do not match exactly to this logic, the integration will create unwanted duplicates.

IT Glue Asset IT Glue Field Microsoft Field
 Contacts Email 
  1. Attempt match on any alias of the Microsoft user.
  2. Attempt match on the username value (e.g. the @onmicrosoft.com domain).
  3. Attempt match on combination of First Name + Last Name.

Instructions

Configuring GDAP

The following are the three important steps to be done in the Microsoft Portal to set up GDAP.

  1. Create a Service account user for GDAP.
  2. Create a new Security Group and assign the service account user to the group.
    Note: In the Partner Portal, it is required to assign this security group to each GDAP relationship for all the tenants.
  3. Configure the applications with proper permissions.
    Note: As of January 5th, 2024 both Delegated and Application permissions are required to be added.

Create a service account user for GDAP

Note - The procedure in this section is required only for Granular Delegated Admin Permissions tenants and not relevant for Delegated Admin Permissions.

Microsoft’s GDAP provides an approach of having the least privilege for access controls. To integrate this approach with IT Glue, do the following steps:

  1. Log in to your Microsoft Account.
    Sign_in_to_your_account.png
     
  2. In the left-hand sidebar, click Users > Create New User.
    Create_New_User.png
  3. Select the group as AdminAgents.
    AdminAgents.png
  4. Assign the role as Global Administrator.
    Global_Administrator.png
    The service account user is now created for the GDAP IT Glue integration. 
    Note: MFA must be enabled for this service account.

Create a new Security Group

Create a new Security Group and add the service account user to the group for the GDAP IT Glue integration.

  1. Navigate to Groups and click New Group to create a new group.
    New_Group.png
  2. Click No members selected under the Members section and add the service user to the group.
    Add_Members.png
  3. Click Create to create the security group. The created group is displayed in the list of groups.
    Created_Group_Listed.png

Note: From the Microsoft admin portal, assign this Security group to the GDAP relationship which includes the service account created in the previous section. 

Important: In the Partner Center, you need to ensure that this security group created is assigned to each GDAP relationship and has at least one of the following permissions:

  • Global Admin
  • Privilege Role Admin
  • Cloud Application Admin

If you assign any permission other than Global Admin (Privilege Role Admin or Cloud Application Admin), then following permissions are required to be assigned.

  • Global Reader
  • Intune administrator
  • Insights Business Leader 

Configure Application

  1. In the left-hand sidebar, click Applications > App registrations.
    App_Registration.png
  2. Click + New registration.

    Company_-_Azure_Active_Directory_admin_center22.png

  3. Complete the following actions in the Register an application screen.
    1. Name - Enter an application name that will be displayed to users of the app.
    2. Supported account types - Select the Accounts in any organizational directory and personal Microsoft accounts option to map to Azure AD only multi-tenant.

    3. Redirect URI - Select Web in the drop-down menu and enter a URL for the app (https://subdomain.itglue.com/microsofts). The integration will not work if a different URI is provided.

      Register_an_application_-_Azure_Active_Directory_admin_center.png

  4. Click the Register button at the bottom of the screen to access the newly created application.
    Note: Redirect URL is required for users setting up GDAP.

    NA: https://subdomain.itglue.com/microsofts

    EU: https://subdomain.eu.itglue.com/microsofts

    AU: https://subdomain.auitglue.com/microsofts

  5. Get Application ID and Tenant ID 
  1. In the left-hand column, click Azure Active Directory > App registrations and then All applications. Click on your newly configured application in the list.


    Company_-_Azure_Active_Directory_admin_center33.png

  2. Click the Copy to clipboard icon beside the Application ID and Directory ID (Tenant ID) and paste them into IT Glue. Refer to the Integrating Microsoft with IT Glue section in this KB article.


    Screen_Shot_2020-12-09_at_12_12_35_PM.png

Generate secret key

  1. In the left-hand column, click Certificate & secrets and then + New client secret. An Add a client secret screen will appear.


    IT_Glue_Integration_2020_-_Azure_Active_Directory_admin_center44.png

  2. Add a description for your client secret, select 24 months under Expires and then Add.


    Screen_Shot_2022-02-01_at_12_42_53_PM.png

  3. In the Value column, click the Copy to clipboard icon beside the secret key and paste it in to IT Glue. Refer to the Integrating Microsoft with IT Glue section in this KB article.


    IT_Glue_Integration_2020_-_Azure_Active_Directory_admin_center55.png

    Note: After you save the configuration changes, the right-hand column will contain the client secret value. Be sure to copy the value for use in your client application code as it will not be accessible once you leave the page.

Add Permissions

You will need to add API access to complete the application. The APIs you need are Windows Azure Active Directory, which is automatically added when you create the application, and Microsoft Graph.

Important. On June 30th 2022, we will be deprecating support for the Azure Active Directory Graph API. Please update your API permissions using the "App Registrations" page in Azure to reflect the information provided here.
  1. Click API permissions in the left-hand menu.


    IT_Glue_Integration_2020_-_Azure_Active_Directory_admin_center66_1.png

    Important. You will see that Microsoft Graph has already assigned a default User.Read. permission. Click this permission and then Remove permission. Click Yes, remove to delete this permission.


    IT_Glue_Integration_2020_-_Azure_Active_Directory_admin_center77.png

  2. Once the default permission is removed, click the + Add a permission button.


    IT_Glue_Integration_2020_-_Azure_Active_Directory_admin_center66_2.png

  3. In the Request API permissions screen, click the Microsoft Graph button.


    Request_API_permissions_-_Azure_Active_Directory_admin_center111.png

    • Click Application permissions and complete the following actions for each of the subsections:
      1. Directory - Check the box beside Directory.ReadWrite.All.
      2. Reports - Check the box beside Reports.Read.All
      3. User - Check the box beside User.Read.All

      Request_API_permissions_-_Azure_Active_Directory_admin_center222.png
      Note: As of January 5th, 2024 both Delegated and Application permissions are required to be added.

      Audit_Log.png
      DeviceManagement.png
      Directory.png

      Reports.png

      User.png
      Note: If you have configured this integration prior to May 25, 2022, review your API permissions to ensure they are up to date with this article.
      The following are the list of API permissions required for the integration:

      • AuditLog.Read.All
      • DeviceManagementManagedDevices.Read.All
      • Directory.Read.All
      • Directory.ReadWrite.All
      • Reports.Read.All
      • User.Read.All
        Important: ReadWrite access to directory data is required to add the created Azure application to the AdminAgents security group. Without this permission, this can only be done directly with Microsofts API or PowerShell. As of Sep 2018, the Microsoft 365 UI only supports adding new users to groups and not the applications.
        Important: Ensure that you add the corresponding delegated admin permission type as well for all application permission type as shown below.
        Permissions.png
        Note: In addition to these permissions, Microsoft Partner Center permission should also be added.
  4. Save the changes by clicking Add permissions at the bottom of the screen.
  5. In the API permissions main screen, click the Grant admin consent for Company button.

    Screen_Shot_2022-01-31_at_4.50.05_PM.png

  6. In the confirmation pop-up, click Yes.


    IT_Glue_Integration_2020_-_Azure_Active_Directory_admin_center777.png

Once consent is granted, you will see a confirmation banner at the top of the screen and that all permissions in the Status column reflect the same.

Important. To recap, please ensure that you select the Directory.ReadWrite.All permission for Microsoft Graph (step 4).

Important. If you're updating your permissions for your existing Microsoft integration please follow the below steps on the IT Glue side:

1. Go to the existing adapter in IT Glue under integrations > Edit Credentials 
2. In the edit page, click on the Update button. 
3. You will be redirected to the Microsoft Login page, where you’ll login with the service account credentials created earlier. 
4. After logging into Microsoft, approve the permissions and then you’ll be redirected to IT Glue with a success message. 
5. The sync will return to an active state.

 

Integrating Microsoft with IT Glue

  1. In IT Glue, navigate to Account > Integration and click the + New button. Then, click on the Microsoft button.

    Choose_a_platform.png

  2. Enter the information you copied from the Get Application ID & Tenant ID and Generate secret key sections of this KB article and click Connect.

    Sync_With_Microsoft.png

  3. You will be redirected to the Microsoft login page, where you need to enter the service account credentials (which you created in the section Create a service account user for GDAP).
    Note: Once you login, you will be prompted to authorize the permissions and accept the permissions.
  4. After approving the permissions, they will be redirected to IT Glue Sync your Microsoft data screen. Select the data you want to sync. By default, recommended options are listed first. Your options may look different than in the screenshot above.
    Note: As a best practice, we recommend that you only select the user subscriptions that you actively manage. If you would like to see licenses, ensure the Licenses checkbox under Other is selected.

    Sync_Data_WIth_Microsoft.png

  5. Select the Enhance Contacts with Azure Active Directory checkbox under Azure Active Directory Sync to further enhance your IT Glue contacts with Azure information. This feature pulls in fields for Status, Last Logon, and Last Password Change.
    Note: 
      • This is a Network Glue only field. Your account must have the Network Glue add-on in order to use.
      • In order to obtain all available Azure AD fields, the Microsoft Graph (Read all audit log data) permission must be enabled in the Azure Active Directory application.
      • The Last Logon field will only appear when the user has logged on in the past 30 days.
  6. Click the Save and continue button. The sync will be automatically queued in the Active Integrations main screen.
  7. By default, newly queued syncs are scheduled to take place one hour later. Use the manual sync option to prioritize the sync to start sooner. Click Actions and then Start Manual Sync.


    Start_Manual_Sync.png

  8. From the Active Integrations screen, you can see the overall sync status. When the sync is complete, the Status column changes from Syncing... to OK.
    Note: If you have a Microsoft Partner Network account with access to multiple tenants, disconnecting an Microsoft integration will not remove Admin privileges from your configured application. Remove these Admin privileges yourself or delete the configured application if no longer needed.

View synced contacts

IT Glue discovers tenants and users and tries to match them to your data in your account based on the following logic:

Rule Matches On
Organization Tenant name
Contact email address Username + "@" domain

If no organization can be matched automatically, suggestions will be made based on name similarity. If no suggestions can be made, you will have the option to create a new organization.

Tip! If you have two-way sync enabled in Kaseya BMS or Vorex PSA, all contacts created with your Microsoft integration can be automatically pushed to your PSA. For two-way sync instructions, review our Enable two-way sync KB article or one of the applicable KB articles below:

  1. From Account > Integrations, click on Actions and then Matching.


    Integrations___IT_Glue-2.png

  2. Start with the Unmatched filter to review unmatched organizations.

    Unmatched.png

  3. If you're happy with any suggested search, click Accept Suggestion to accept it, or, you can search for and choose a different organization using the Match To column. You can also choose to ignore organizations, which means they won't count as unmatched items in subsequent syncs.
    Warning. If you don't see an organization, click Actions > Create Organization to create (import) it. Make sure there is nothing to match first, so that you don't create a duplicate organization.


    Screen_Shot_2019-05-17_at_10_45_59_AM.png

  4. Review all your unmatched organizations until they are all unmatched.
  5. If you change your mind about any of the matches, click Actions, choose Change Match, and then manually search for and choose a different organization.


    Change_Match.png

    Note: Contact matching behaves slightly differently to standard matching logic. If no match can be made based on the criteria listed in the Prerequisites of this KB article, a new duplicate contact will be created without further user input.
  6. Once all organizations have been matched, you will need to start a new manual sync. Navigate to Account > Integration > Actions > Start Manual Sync. This second manual sync will sync all contacts and organizations in to IT Glue now that you've matched your organizations.
  7. When the sync is complete, click on any matched tenant to take you to the relevant organization. Then, click Contacts from the sidebar.


    Matched_Contacts.png

  8. Click on any contact that has corresponding data Microsoft and you will be able to see the additional data overlay as shown below.


    Updated_With_Microsoft.png

  9. Continue onto the Office 365 License Integration KB article.

Have more questions?

Contact us

Was this article helpful?
2 out of 5 found this helpful

Provide feedback for the Documentation team!

Browse this section