Entra ID Setup



This guide will help you successfully integrate Microsoft Entra ID with Asset Panda.

NOTE: You will be copying and pasting values between Microsoft Entra ID and Asset Panda during this integration. It is recommended that you paste all values into a text (.txt) file so you do not lose them in the event of a system timeout.

Log in to Accounts

Asset Panda

1. Open a new tab, and then navigate to Asset Panda at https://login.assetpanda.com.

2. Log in to your account, click the Settings icon, and then select Microsoft Entra ID.

3. The Microsoft Entra ID API Credentials page displays. Keep this page and tab open, as you will refer to it again throughout the following steps.

Microsoft Entra ID

1. Open a second tab, and then navigate to Microsoft Entra ID at https://portal.azure.com.

2. Log into your account, and then click Microsoft Entra ID.

View Tenant

1. Navigate back to or log into your Microsoft Entra ID Account. (If you’re already logged in, click Home , located within in the top, left corner of your screen.)

2. Select Microsoft Entra ID .

Your default Tenant Information displays. 

3.  Click Switch Tenant if you would like to use a different tenant, and then select a tenant from the list.

Graphical user interface, application
Description automatically generated

4. Click Switch .

5. Verify the tenant name (located in the top, right corner below your email id).

6. Click the copy icon to copy the Tenant ID .

Graphical user interface, application, email
Description automatically generated

7.  Navigate back to Asset Panda, and then paste the Tenant ID into the Tenant ID field (#1).

App Registration

1. Navigate back to your Microsoft Entra ID account, and then click App registration .

2. Click New registration .

3. Complete the following fields:

  • Name
  • Supported account types – Select Accounts in this organizational directory only (AssetPanda only – Single tenant)

4. Click Register .

5. Copy the Application (client ID) .

6. Navigate back to your Asset Panda account, and then paste the Application (client ID) into the Client ID field (#2).

Add API Permissions

Complete the following steps to add your API permissions. (See the Delegated and Applications Permissions Table at the bottom of this section for more information about the permissions listed here.)

1. Navigate back to your Microsoft Entra ID account.

Click API Permissions .

2. The User Read permission should already be contained within the list.

3. From the Configured permissions section, select Add a permission .

4. From the Request API permissions page, select Microsoft Graph to add more permissions.

Graphical user interface, text, application, email
Description automatically generated

5. Select Delegated permissions .

6. Expand OpenId permissions , and then select the following values:

  • email
  • profile
  • offline_access

Graphical user interface, application, Teams
Description automatically generated

7. Click Add Permissions .

The Configured permissions section displays again.

8. Click Add a permission to add more permissions.

Graphical user interface, text, application, email
Description automatically generated

9. Select Microsoft Graph again, and then select Application permissions .

10. Navigate to Group , expand the menu, and then select:

  • Group.Read.All

11. Navigate to Directory , expand the menu, and then select:

  • Read.All

12. Navigate to User , expand the menu, and then select:

  • Read.All

13. Navigate to DelegatedPermissionGrant , expand the menu, and then select:

  • ReadWrite.All

14. Navigate to Application , expand the menu, and then select:

  • Application.Read.All

15. Click Update permissions . A list of your selected permissions should display, as shown below.

16. Click Grant admin consent for Default Directory to confirm that all permissions have admin consent.

Graphical user interface, text, application, Word
Description automatically generated

17. Click Yes to grant consent.

18. Confirm that the Status column displays the granted, admin permissions.

Graphical user interface, text, application
Description automatically generated

Delegated and Applications Permissions Table

Permission

Application/Delegated

Optional/Required

Function

Application.Read.All

Application Optional

Reads all applications. Grants permission to read all applications and service principles.

Directory.Read.All

Application

Required

Reads directory data. Grants permissions to read all users within the directory.

Email

Delegated

Required

Maintains access to the data you have been given. Grants permission to gather email addresses for Asset Panda to create user accounts.

Group.Read.All

Application

Required

Reads all groups. Grants permission to Asset Panda, allowing us to read groups to make sure mapping users are guided to the correct Asset Panda groups as setup. This allows for users to be mapped and filtered correctly.

Offline_access

Delegated Required

Maintains access to the data you have provided. Grants permission to read and update user data, even when user is not currently using the application.

Profile

Delegated

Required

View a user’s basic profile.

Grants permission to read a basic set of profile properties for other users in your organization on behalf of the signed-in user. This includes display name, first and last name, email address, open extensions, and photo. Also allows the application to read the full profile of the signed-in user.

User.Read.All

Application Required

Read the profiles of all users. Grants permission to read the full set of profile properties, reports, and managers of other users within your organization.

User.ReadBasic.All

Application

Optional

Read the basic profiles of all users.

Grants permission to read a basic set of profile properties of other users within your organization on behalf of the signed-in user. This includes display name, first and last name, email address, open extensions, and photo. Also allows the application to read the full profile of the signed-in user.

Create Application Secret

This section will guide you through the steps of creating an application secret that will be used within Asset Panda.

1. Click Certificates &secrets .

2. Click New client secret .

3. Enter the following details within the Client secrets window:

  • Description
  • Expires - Select the maximum expiration option. 

4. Click Add .

5. Copy the Value  shown on your screen. You will not be able to do this again after this step.

6. Navigate back to your Asset Panda window, and then paste the Value within the Client Secret field (#3).

Enterprise Application

To enable Asset Panda to sync with Microsoft Entra ID users, you must first enable the application within Microsoft Entra ID.

1. Navigate back to your Microsoft Entra ID account.

2. Begin to type Enterprise within the Search box, and then select Enterprise Applications .

3. Locate your application, and then copy the Object ID .

4.  Navigate back to your Asset Panda account, and then paste the Object ID within the Application Object ID field (#4).

Final Steps

The following fields should now contain information from the previous steps:

  • Client ID
  • Client Secret
  • Application Object ID
  • Tenant ID

To complete the setup process:

1. Click Save on the top right corner.


2. You can select Test Connection after saving to see if your credentials are correct.

Microsoft Entra ID is now ready to use with your account. You can now copy users, create field maps, and set schedules.

Mapped Fields

Complete the steps in this section to map (and sync) to specific groups.

NOTE: To prevent the duplication of records, the following fields must be defined as unique and not include a blank value:

  • Users - link with the Email field

See Unique Rule for more information about unique fields. 

1. Click the configuration icon , and then select Microsoft Entra ID (or scroll down the Microsoft Entra ID page if you are already there and have completed all the steps in the previous sections).

Graphical user interface, website
Description automatically generated

2.  Navigate to the Mapped Fields section, and then click Add New Field Map .

Table
Description automatically generated

3. Select the groups you wish to map into Asset Panda.

Graphical user interface, application
Description automatically generated

4. Click Save .

You are redirected back to the Microsoft Entra ID page.

5. Scroll back to the Mapped Fields section, and then click Sync Now . (See Sync Individual Record below if you wish to sync an individual record rather than a group.)

Graphical user interface, application
Description automatically generated

6. Your items begin to synchronize and you will receive an email once it is complete.

NOTE: All sync information can be viewed through the Sync Logs at the bottom of the Microsoft Entra ID page.

Sync Individual Record

If you wish to sync an individual record:

1. Click Actions when viewing a record.

2. Select Sync , and then select Sync all users with Microsoft Entra ID .

Graphical user interface, text, application, chat or text message
Description automatically generated

NOTE: All sync information can be viewed through the Sync Logs at the bottom of the Microsoft Entra ID page.