Skip to main content

Microsoft Entra ID

Overview

This guide provides step-by-step instructions for configuring the Microsoft Entra ID (formerly Azure Active Directory) integration with AlphaSOC.

In this process, you'll learn how to register an application in Microsoft Entra ID, grant it necessary permissions, and establish federated credential authentication. This configuration will enable AlphaSOC to access and retrieve audit logs from your environment.

Creating App Registration

The following steps outline how to register an application and add Federated Credentials to Microsoft Entra ID.

  1. Register an application
    Sign in to the Microsoft Entra ID admin center, browse to App registrations and select New registration. Enter a Display Name and select access for the accounts in this organizational directory only (Single Tenant): New App Registration

  2. Add credentials to Microsoft Entra ID
    Select your application in the Microsoft Entra admin center (in App registrations tab) and go to Certificates & secrets > Federated credentials > Add credential. Use the following settings:

note

The Issuer field cannot end with a "/".

  • Federated credential scenario: Other Issuer.
  • Issuer: https://accounts.google.com.
  • Subject: 102911262315801235571.
  • Audience: your organization (workspace) ID (available in the AlphaSOC console).
  1. Grant permissions
note

Consenting to these permissions requires Privileged Role Administrator role.


Grant the newly created application AuditLog.Read.All and Directory.Read.All permissions.

  1. Provide AlphaSOC with Tenant ID and Application (client) ID
    If you manage multiple tenants, provide AlphaSOC with the Tenant IDs along with a list of Storage Accounts associated with each tenant.