Source Configuration for Microsoft Intune Importer
Microsoft Graph Connection Configuration
To integrate with Microsoft Intune, an application must be registered with an Azure AD tenant. Once you register the application, you can fill in the Application ID, Directory (tenant) ID, and Application Secret values for the Azure Connection Configuration.
You will need help from the Azure Admin in your organization for the following configuration.
Login to Azure Portal (portal.azure.com).
Select Microsoft Entra ID.
Click "Add", then choose "App registration" from the options.
Enter a Name, then click "Register"
e.g. Microsoft Intune Importer for JSM Assets
After registration, you will need to:
Copy Application (Client) ID.
Copy Directory (Tenant) ID.
Generate an Application Secret:
Navigate to Add a certificates or secret.
Click New Client Secret → Set expiration → Copy the generated secret.
These are all required when establishing Source Connection in Microsoft Intune Importer. For Reference:
Important: Ensure you copy the Value, not the Secret ID. The Value is required for authentication and will be hidden once you leave the page.
Select “API Permissions” from the menu on the left side and then “Add Permission”.
9. Select “Microsoft Graph” and add “DeviceManagementManagedDevices.Read.All“ for the “Application” type.
|
Ensure that your Azure Admin provides consent for the required permission. The screen should display the following:
Permission:
DeviceManagementManagedDevices.Read.All
Type: Application
Admin Consent Requested: Yes
Status: Granted for <your definition>
This step is crucial, as we frequently receive customer tickets related to permission errors. The most common mistake Azure Admins make is selecting "Delegated" (the default) instead of "Application" as the permission type.
Fill in the required fields under Azure Connection Configuration in the Source tab of Azure AD Importer for JSM Assets. Then, click "Save & Check Connection" to confirm the configuration is successful.
Now configure Destination.