Azure Active Directory Integration
Integration guide for Resmo Azure Active Directory (Microsoft Entra ID) Integration.
Last updated
Integration guide for Resmo Azure Active Directory (Microsoft Entra ID) Integration.
Last updated
Resmo easily integrates with AzureAD to secure and query your entire resource asset.
Collect and monitor all AzureAD resources in near real-time from one place
Query your assets with the simplified SQL language
Run automated rule checks with managed or custom rules
Get notified of rule changes in real-time
Discover historical data for your resource changes, queries, and rule violations
Resmo connects with AzureAD through an OAuth flow. Then, it initiates polling and aggregating your existing resources. After the initial polling, Resmo performs polling at regular intervals to collect resource changes in real-time.
Tip: Use Audit Logs for comprehensive monitoring of all Azure Active Directory activities and system events.
View AzureAD organization-verified domains.
List guest users.
See Service Principal OAuth2 permissions.
Find user groups that are not assignable to any role.
List user accounts that are not enabled.
Sign up or sign in to Resmo.
Navigate to Integrations and select Azure Active Directory.
Click the Add Integration button.
Click Create.
You'll be redirected to Azure. Accept permissions.
The required read-only access level permission scopes for the integration are as the following:
Maintain access to data you have given it access to
Allows the app to see and update the data you gave it access to, even when you are not currently using the app. This does not give the app any additional permissions.
Read all users' full profiles
Allows the app to read the full set of profile properties, reports, and managers of other users in your organization, on your behalf.
Read audit log data
Allows the app to read and query your audit log activities, on your behalf.
Read access reviews that you can access
Allows the app to read information on access reviews, reviewers, decisions and settings that you have access to.
Read all app catalogs
Allows the app to read apps in the app catalogs.
Read the names and descriptions of channels
Read channel names and channel descriptions, on your behalf.
Read the members of teams and channels
Read the members of channels, on your behalf.
Read the names, descriptions, and settings of channels
Read all channel names, channel descriptions, and channel settings, on your behalf.
Read Cloud PCs
Allows the app to read the properties of Cloud PCs, on your behalf.
Read consent requests
Allows the app to read consent requests and approvals, on your behalf.
Read your contacts
Allows the app to read contacts in your contact folders.
Read directory data
Allows the app to read data in your organization's directory.
Read domains
Allows the app to read all domain properties on your behalf.
Read identity providers
Allows the app to read your organization’s identity (authentication) providers’ properties on your behalf.
Read Microsoft Intune apps
Allows the app to read the properties, group assignments and status of apps, app configurations and app protection policies managed by Microsoft Intune.
Read Microsoft Intune Device Configuration and Policies
Allows the app to read properties of Microsoft Intune-managed device configuration and device compliance policies and their assignment to groups.
Read devices Microsoft Intune devices
Allows the app to read the properties of devices managed by Microsoft Intune.
Read Microsoft Intune RBAC settings
Allows the app to read the properties relating to the Microsoft Intune Role-Based Access Control (RBAC) settings.
Read Microsoft Intune configuration
Allows the app to read Microsoft Intune service properties including device enrollment and third party service connection configuration.
Read all managed tenant information
Allows the app to read all managed tenant information on your behalf.
Read organization information
Allows the app to read the organization and related resources, on your behalf. Related resources include things like subscribed skus and tenant branding information.
Read all users’ relevant people lists
Allows the app to read a list of people in the order that is most relevant to you. Allows the app to read a list of people in the order that is most relevant to another user in your organization. These can include local contacts, contacts from social networking, people listed in your organization’s directory, and people from recent communications.
Read your organization's policies
Allows the app to read your organization's policies on your behalf.
Read role management data for all RBAC providers
Allows the app to read the role-based access control (RBAC) settings for all RBAC providers, on your behalf. This includes reading role definitions and role assignments.
Read your organization’s security events
Allows the app to read your organization’s security events on your behalf.
Read your organization's security actions
Allows the app to read security actions, on your behalf.
Read service health
Allows the app to read your tenant's service health information on your behalf.Health information may include service issues or service health overviews.
Read service messages
Allows the app to read your tenant's service announcement messages on your behalf. Messages may include information about new or changed features.
Read items in all site collections
Allow the application to read documents and list items in all site collections on your behalf.
Read data subject requests
Allows the app to read subject rights requests on your behalf.
Read teams' settings
Read all teams' settings, on your behalf.
Read the members of teams
Read the members of teams, on your behalf.
To enable the User Provisioning feature on Resmo, additional required permissions are:
Read and write all users' full profiles
Allows the app to read and write the full set of profile properties, reports, and managers of other users in your organization, on your behalf.
Read and write group memberships
Allows the app to list groups, read basic properties, read and update the membership of your groups. Group properties and owners cannot be updated and groups cannot be deleted.
Your integration is ready! Now you can start querying your Azure Active Directory resources!
Log in to your Resmo account.
Go to your Integrations page and select Azure AD.
Go to the Connected Integrations tab from the opening modal and select the one you want to remove or disable.
4. To temporarily pause the integration, click the Disable button from the top right. Or, you can permanently remove it by clicking the Delete button.
5. Optionally, you can remove your oAuth token after uninstalling the integration permanently. Follow the instructions here.