Skip to main content

Preparation

Before Bravura Security Fabric can perform operations in Microsoft Azure Active Directory, you must:

Setting up a target system administrator

Bravura Security Fabric uses a designated account on Microsoft Azure Active Directory to perform Bravura Security Fabric operations.

Create an app registration in Azure

  1. Log into the Microsoft Azure Active Directory portal.

  2. On the Azure Active Directory main page, under Manage click App registrations.

  3. Click New registration at the top of the screen.

  4. Enter a value for the Name field.

  5. Choose a value for Supported account type such as the default value of "Accounts in this organization directory only".

  6. Click Register.

Set the secret of the application (client) ID

  1. From the Azure Active Directory main page, go to the App Registrations page then choose the app configured earlier in Create an app registration in Azure .

  2. Under Manage, click on Certificates and Secrets.

  3. Click New client secret.

  4. Enter a value for the Description field.

  5. Choose a duration for when the client secret expires.

  6. Click Add.

  7. Take note of the value for the client secret as this will be the target administrator’s password.

  8. On the page for the new application, click Overview.

  9. Take note of the value for the Application (client) ID as this will be the target administrator’s username.

Set up permissions

  1. From the Azure Active Directory main page, go to the App Registrations page then choose the app configured earlier.

  2. Under Manage click on API permissions.

  3. Click Add a permission.

  4. Click Microsoft Graph.

  5. Click Delegated permissions.

  6. Search then add the following permissions:

    • User.Read

    • User.Read.All

    • User.ReadBasic.All

    • User.ReadWrite

    • User.ReadWrite.all

    After adding the permissions a warning may appear under the Status column in the API Permissions page specifying Not granted for ..... These warnings should be addressed when executing Step 9.

  7. Click Application Permissions.

  8. Search then add the User.ReadWrite.all permission.

  9. In the API Permissions page, click the button to Grant admin consent for .... then click Yes to confirm.

Expose an API

  1. From the Azure Active Directory main page, go to the App Registrations page then choose the app configured earlier.

  2. Under Manage click Expose an API.

  3. Click Set next to Application ID URI.

  4. If necessary, edit the value for Application ID URI, then click Save.

  5. Click Add a scope.

  6. Enter a value for the Scope name field.

  7. Set Who can consent? to "Admins and users".

  8. Enter a value for the Admin consent display name and Admin consent description fields.

  9. Click Add scope.

Creating a template account

Bravura Security Fabric uses template accounts as models or "blueprints" for creating new accounts in Microsoft Azure Active Directory. The following example illustrates how you can create a template account in Microsoft Azure Active Directory:

  1. Log into the Microsoft Azure Active Directory portal.

  2. On the Azure Active Directory main page, click Users.

  3. Click New user at the top of the screen.

  4. Enter a value for the "User name", "Name", "First name", and "Last name" fields.

  5. If needed, change the value for "Roles" to another directory role.

  6. Click Create.

  7. Click Reset password to assign a temporary password for the user.

    You can disable the account if it is to be used only as a template account or enabled later. You can do this by clicking user under the Users tab, and selecting Block for Allow the user to sign in and access services?.