Evo Security syncs with active directory (AAD) via Microsoft Entra admin center.
The service will complete a scan periodically throughout the day, to confirm if there are changes to the users or any new users to be synced to your instance of Evo. The only user details that are synced are first name, last name, and email address. Passwords remain managed by your systems.
These instructions assume:
- Organization configured for Microsoft Azure Active Directory.
- You have admin access to the organizations Microsoft Azure Active Directory.
- All users have been created under Microsoft Azure Active Directory.
- All users have a unique email address, specific to their user.
- All users are a member of a group to be synced.
- NOTE: Additional or P1/P2 Azure Licenses NOT required for EVO Security Sync.
To setup Microsoft Azure Active Directory with Evo, you will use the Azure App Registration Sync. Follow the steps below to manually configure the Evo application in your organizations instance of Microsoft Azure Active Directory.
Part 1: Adding Azure Active Directory via app registration
This must be completed by an administrator of your Evo portal, who is also an administrator of your organizations Microsoft 365 or Microsoft Azure account.
Configure Azure Active Directory
New app registration
- Open your favorite browser, and navigate to Home - Microsoft Entra admin center
- Login as a Microsoft Azure administrator.
- From the Entra ID home screen, under Applications tab. Click App registrations.
- From App registrations, click New registration.
- Enter the name of Evo Secure Login.
- Click Register
- Open your favorite text editor. Copy and paste the following from Azure into the text editor – do not close the editor.
- Application (client) ID
- Directory (tenant) ID
New client secret
- From the left-side navigation. Click Certificates & secrets.
- With Client Secrets Click New client secret.
- Enter the description of Evo Client Secret
- From the Expires dropdown, select 24-months.
- Click Add.
- In your favorite text editor, copy and paste the Value into the editor – do not close the editor.
Before proceeding further. Confirm that the value was copied & pasted into the editor correctly. Reason, once we navigate away the value can’t be retrieved. - Review all information of the application by navigate to Identity -> Applications -> App Registrations -> All applications -> Click on the Evo app you just created.
Microsoft Graph permissions
- From the left-side navigation. Click API permissions.
- Click Add a permission
- Click Microsoft Graph.
- Click Delegated permissions.
- In the search bar, under Select permissions, enter Directory.
- Expand Directory, and check ReadWrite.All.
- Click Add Permission.
- Click Grand admin consent for <Your Organization>.
Azure Active Directory Permissions
- Navigate to Identity -> Roles & admins -> Roles & admins.
- Roles and administrators portal.
We’re going to add the Evo Secure Login to three (3) administrative roles.
Directory Readers
- In the Administrative roles search box, enter Directory.
- Click the role name for Directory Readers. This can be finicky. Be sure to click the role name, don’t simply check the box at the beginning of the row.
- Click Add assignments.
- In the Add assignments search bar, enter the app name of Evo Secure Login.
- From the search results, click Evo Secure Login.
- Click Add.
Directory Writers
- From the top navigation. Click Roles and administrators.
- Click the role name for Directory Writers. This can be finicky. Be sure to click the role name, don’t simply check the box at the beginning of the row.
- Click Add assignments.
- In the Add assignments search bar, enter the app name of Evo Secure Login.
- From the search results, click Evo Secure Login.
- Click Add.
Helpdesk Admin or Global Admin
This assignment is specific to the Password Rotation capabilities within Evo.
- From the top navigation. Click Roles and administrators.
- In the Administrative roles search box, enter either:
- Helpdesk administrator: Grants Evo the ability to reset the passwords for NON-administrator or helpdesk administrators.
- Global administrator: Grants Evo the ability to reset passwords for ALL users.
- Click the role name. This can be finicky. Be sure to click the role name, don’t simply check the box at the beginning of the row.
- Click Add assignments.
- In the Add assignments search bar, enter the app name of Evo Secure Login.
- From the search results, click Evo Secure Login.
- Click Add.
Part 2: Configure directory in Evo
Do you still have that text editor handy? Great as we’re about to need everything that was pasted into it.
Add Azure Active Directory
- From the left nav menu, select My Company. Alternatively, select Customers and choose a customer from the list.
- From the side navigation, click Directories.
- Select the Azure Active Directory tab.
- Click Add New Directory button.
- Enter in a directory name.
- Select the Azure App Registration Config and Sync Toggle.
- From the text editor you have open. Copy and paste the following
- Azure: Application (client) ID to Evo: Client ID
- Azure: Directory (tenant) ID to Evo: Tenant ID
- Azure: Value to Evo: Client Secret
- Optionally, to sync Evo passwords set on users back to Azure. Check Sync user passwords back to Azure AD. Once this option is checked, Evo will update AAD users' passwords by the Evo users' passwords. Your end-users will need to login to their email services (outlook, webmail, mobile app...) with the new passwords.
- Click Sync Azure Active Directory.
Note: If you would like to use Azure AD federation Only, please refer to this article for more information - Federating Microsoft 365 domain with Azure AD
Group sync configuration
Now that the configuration is completed, the initial sync will result in ALL users to be synced with Evo.
This may be acceptable, or there may be a specific group(s) you’d like connected, rather than everything.
- In the displayed list of directories, find the new Azure Active Directory just created. Click the pencil icon at the end of the row.
- Uncheck all groups that shouldn’t be syncing users over to Evo. Only the Checked groups will sync with Evo.
- Click Sync Azure Active Directory.
Now that you’ve completed the configuration for Azure Active Directory, your users will be able to authenticate with Evo. And you can go ahead and close that text editor we used earlier, we’re all done with it now.
If you’ve experienced any issues with the configuration, please contact us and we’re happy to help.