Azure Active Directory Configuration Guide

Prerequisites

This integration is specifically for Azure's Cloud-Based Active Directory (AD). To use an Active Directory Group in BullPhish ID™, the following information is required: given name, surname, job title, and mail to translate to BullPhish ID. 

Grant API Access to Azure AD

  1. Log into Azure Portal.
  2. Navigate to the left hamburger menu, and click Azure Active Directory.

0.png

3. Click App registrations from the sub-menu tab.

1.png

4. Click + New Registration from the top menu bar.

2.png

5. Provide the application name on Register an application page, and select Accounts in any organizational directory (Any Azure AD directory - Multitenant) from the Supported account types radio button.

3.png

6. Click the "Register" button. An Application ID, Tenant ID, and Object ID are displayed on the screen. It is needed to authenticate in BullPhish ID.

4.png

7. Click API permissions.

5.png

8. Click Add permission.

6.png

9. Click Microsoft Graph from the right-side menu.

7.png

10. Click Application permissions.

8.png

11. Scroll down to Group > click the dropdown and select Group.Read.All.

9.png

12. Scroll down to User > click the dropdown and select User.Read.All.

13. Click Add permissions.

10.png

14. Click Grant admin consent for Default Directory from the API Permissions page. This action requires admin-level access.

11.png

15. Click on Certificates & secrets from the left-side menu.

16. Click New client secret. This secret is needed to authenticate with BullPhish ID.

Important:  The Client Secret is only visible and should be safely recorded or used, as it will not be retrievable later.

12.png

17. Choose when the secret should expire from the dropdown.

13.png

18. Click on the "Add" button.

14.png

Authenticate with BullPhish ID

1. Log into https://bullphishid.com/.

2. Navigate to the left-side menu and select Targets & Groups > Directories.

Directories_Table.png

3. Select the Add Directory Sync button.

4. Select the organization and the Azure directory type. Enter the Tenant ID and Client ID from step 6 and the Client Secret from step 18.

Add_Directoires_Sync_Modal.png

5. If synced correctly, the user will be taken to the organizations edit directory page, where they can select a group to be imported from the Azure Active Directory. Select the AD Group to be synced with BullPhish ID. Click Sync.

Group_Successfully_synced.png

6. If a process is successful, the group will be present under the Synced Groups table.

Note:

  • If you manually upload a directory, you can create a note, edit the group/the targets attached to the group, or delete the group under the Actions. If the directory is synced via an AD, it is viewed only.
  • There is no specific time for syncing AD groups to BPID. This action is performed daily and isn't scheduled for one particular time. Also, we are syncing groups right after clicking on the sync button from the page of AD configurations for an organization. In addition to that, we are synchronizing groups right before the campaign starts for a group.
  • Editing any targets and groups that came to the system from AD is prohibited because they will be overwritten on the next sync.
  • BullPhish ID  does support Azure Active Directory dynamic and nested Groups. 
  • If you have questions or need further assistance, please contact your Partner Success Manager or email support@idagent.com.

© Copyright

All rights reserved. No part of this document may be reprinted or reproduced or utilized in any form or by any electronic, mechanical, or other means, now known or invented, including photocopying and recording or in any information storage or retrieval system without written permission from the publisher.

 

Was this article helpful?
0 out of 0 found this helpful
Have more questions? Contact us
Provide feedback for the Documentation team!