Creating a Microsoft Entra (Azure AD) Connection

You can use a Microsoft Entra (Azure AD) Connection with the following Connectors:

Prerequisites

In order to create a Microsoft Entra (Azure AD) Connection, you must first create an app registration with a service principle in Azure Active Directory (see https://docs.microsoft.com/en-gb/azure/active-directory/develop/howto-create-service-principal-portal#register-an-application-with-azure-ad-and-create-a-service-principal). Make note of the following settings in the app registration:

  • Tenant ID
  • App/Client ID
  • Client Secret

Creating the Connection

To create a Microsoft Entra (Azure AD) connection:

  1. Navigate to Configure > Extensions > Connections.
  2. Click New.

  3. Under Select a Connection Type, click Microsoft Entra (Azure AD) Connection.
  4. ClickNext or Basic Properties and create a Queue and Job Server for the Connection. All required settings will be configured automatically.

  5. Click Next or Security, then click to specify which roles can access the Connection.

  6. Click Next or Microsoft Entra (Azure AD) Connection Properties and enter the Tenant ID and Client ID for Azure.

  7. There are two options for specifying credentials.

    • To use client secret authentication, choose Client Secret from the Credential Type dropdown list, then enter the Client Secret.

    • To use certificate authentication, first see Setting Up Certificate Authentication for Azure. Afterward, choose Certificate from the Credential Type dropdown list, then paste or upload your .pfx file and enter its Certificate Password (if any) and Common Name (if any).

  8. Click Save & Close.

  9. Navigate to Configure > Control > Job Servers and locate the Microsoft Entra (Azure AD) Job Server. If it is not in status Running, right-click it and choose Start, then make sure it reaches status Running.