/
Source

Source

Microsoft Graph API Connection Configuration

To integrate with Microsoft Entra ID (previously Azure AD), an application must be registered with an Entra ID tenant. Once you register the application, you can fill in the Application ID, Directory (tenant) ID, and Application Secret values for the Entra ID Connection Configuration.

 

You will need help from the Azure Admin in your organization for the following configuration.

 

  1. Login to Azure Portal (portal.azure.com)

  2. Select Microsoft Entra ID.

 

  1. Click "Add", then choose "App registration" from the options.

  1. Enter the Name, then click "Register"

  1. After registration, go to Overview:

  • Copy Application (Client) ID.

  • Copy Directory (Tenant) ID.

To generate an Application Secret:

  • Navigate to Add a certificates or secret.

  • Click New Client Secret → Set expiration → Copy the generated secret.

  1. Enter the description e.g. "Azure AD Importer for JSM Assets", choose the desired expiration date, and click "Add".

  1. Copy the "Value" of the newly created client secret.

Important: Ensure you copy the Value, not the Secret ID. The Value is required for authentication and will be hidden once you leave the page.

 

  1. Select the "API Permissions" menu on the left side, then click "Add a permission".

 

9- Select “Microsoft Graph” and add Directory.Read.All for the “Application” type.

 

 

Pro Tip:

To grant the minimum permissions, you may use:

  • User.Read.All

  • GroupMember.Read.All

You may encounter permission errors if your environment has nested groups, where a parent group has sufficient access but a child group does not. In that case, you may use:

  • User.Read.All

  • Group.Read.All

If you need to collect the licenses, you need permission to read the directory.

  • Directory.Read.All

The table below explains the different levels of permissions and their capabilities.

Permissions and their capabilities

  • User.Read.All

  • GroupMember.Read.All

  • User.Read.All

  • Group.Read.All

  • Directory.Read.All

Permissions and their capabilities

  • User.Read.All

  • GroupMember.Read.All

  • User.Read.All

  • Group.Read.All

  • Directory.Read.All

Collects Users and Groups

Collects nested groups (parent-child relationship)

Collects the Licenses

 

  1. Ask your Azure Admin to provide consent for the required permission. The settings should be as follows:

  • Permission: Directory.Read.All

  • Type: Application

  • Admin Consent Requested: Yes

  • Status: Granted for <your organization>

See the example screenshot below:

  1. Fill in the required fields under Azure Connection Settings in the Source tab of Azure AD Importer for JSM Assets. Then, click "Save & Check Connection" to confirm the configuration is successful.

  1. (Optional) You can apply filters for Users and Groups to reduce the number of imported records and focus on relevant data. For more details, visit: Filter

  2. Next configure the Destination settings.

 

Related content

Destination
Destination
Read with this
Microsoft Entra ID Importer for JSM Assets
Microsoft Entra ID Importer for JSM Assets
Read with this
Filter
Filter
Read with this
Import
Import
Read with this
Admin Configuration
Admin Configuration
Read with this
Destination Filter (Experimental)
Destination Filter (Experimental)
Read with this