Azure Active Directory (Azure AD) is Microsoft's cloud-based identity and access management service, which allows employees to sign in and access internal and external resources.
Integrating with a Directory Service like Microsoft Azure Active Directory will provide visibility and device presence awareness for an environment.
This integration pulls device objects from Azure AD that are either joined or registered to the domain. This can be controlled by identifying the TrustType Sevco will filter in or out within the configuration. By default, this integration will collect all three trustTypes but will not collect empty trustTypes. An empty trustType implies the device record comes from InTune, which is reported by the Microsoft InTune source.
|Include bring your own personal device||If selected will retrieve devices registered in Azure AD with a trustType of Workplace||n/a|
|Include cloud only joined devices||If selected will retrieve devices joined to Azure AD with a trustType of AzureAd||n/a|
|Include on-premises domain joined devices joined to Azure AD||If selected will retrieve devices in Hybrid Azure AD with a trustType of ServerAd||n/a|
See platform documentation for details on Microsoft Azure - Creating credentials
Your Client ID/Secret) or OAuth2 workflow should authorize at least the following permissions:
- Type: Application permissions
- Permission: Device.Read.All
See Azure - Creating Credentials for details on assigning the proper permissions.
If you're having problems integrating a source, or if you've found something wrong in this document, please email us at [email protected].
Tags: cloud, directory service
Updated about 1 month ago