Skip to main content

Connecting Microsoft Entra ID

Status: Released Updated: 05 Nov 2025

MyPass Cloud integrates seamlessly with Microsoft Entra ID (formerly Azure Active Directory). This integration enables secure identity management, password synchronization, and self-service capabilities directly within your cloud-based directory.

Users benefit from self-service features like password resets and account unlocks initiated from the MyPass portal, which are securely applied to Entra ID. This maintains a unified password origin, enhancing security and simplifying management across connected systems.

MyPass can use either password, SMS Pin, Email Pin, or a combination, to enroll an Entra ID-only user (other MFA options may be available for federated users). Even if Entra ID is configured to enforce or demand Entra ID MFA, MyPass can still authenticate using password. However, additional configuration is required to avoid conflicts:

  • Conditional Access: If enabled, whitelist the MyPass server IP in the profile. Exclude the location in the policy .
  • Account Lockout: If not configured, MyPass advises enabling it .

Locked or blocked (At Risk) users can still reset passwords using MyPass. Locked users are unlocked automatically by Entra ID based on lockout settings. Blocked accounts may have risky sign-ins dismissed, depending on Entra ID settings.

Quick Implementation Pointers

Network and Infrastructure Prerequisites

To ensure successful integration, the following components must be in place:

  • Microsoft Entra ID Tenant: An active Entra ID directory with necessary licenses (e.g., P1 or higher for advanced features like self-service password reset).
  • MyPass Gateway Server (Optional for Hybrid): A Windows Server (2016 or later) for on-premises hybrid scenarios involving synced identities.
  • Network Connectivity: Secure outbound HTTPS (port 443) from MyPass Cloud to graph.microsoft.com.
  • SSL/TLS: All communications use encrypted channels; no additional certificates required beyond standard Microsoft endpoints.

Required System Parameters

The following parameters are required to configure the integration with your Entra ID tenant:

RequirementDescription
Tenant IDThe unique identifier for your Entra ID tenant, e.g., xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx.
Application IDThe client ID of the registered app in Entra ID used for API access.
Client SecretThe secret value for authenticating the app (use certificate-based auth for production).
API PermissionsGranted consents for Microsoft Graph API scopes like User.ReadWrite.All, Directory.ReadWrite.All.
Connection TypeOAuth 2.0 with client credentials or delegated permissions.

Additional Requirements

  • Register an application in the Entra ID portal with appropriate API permissions.
  • For hybrid environments, ensure Azure AD Connect is configured for identity sync.
  • The app registration must have admin consent for directory-wide operations like password resets.
  • Test connectivity using tools like Postman to verify Graph API access.

To proceed, provide:

  • Group Selection: List of Entra ID security groups for licensing.
  • License Allocation: Expected user count in groups.
  • Access Policy Requirements: Details on desired policies for groups.

Entra ID Application Registration

The Entra ID app registration is essential for MyPass Cloud's secure interaction with your tenant. This app must have permissions to read user attributes, reset passwords, and query group memberships. It facilitates operations like user ingestion, password management, and audience configuration.

Required Permissions

Permission TypeAccess LevelPurpose
User.ReadWrite.AllDelegated/ApplicationManage user profiles and passwords
Directory.ReadWrite.AllDelegated/ApplicationQuery and update directory objects
Group.Read.AllDelegated/ApplicationRead group memberships for targeting

Granting Permissions

To set up the app registration in the Microsoft Entra admin center:

  1. Navigate to Entra ID > App registrations > New registration.
  2. Enter a name (e.g., MyPassConnector), select supported account types, and register.
  3. Under API permissions, add Microsoft Graph permissions as listed above.
  4. Grant admin consent for the permissions.
  5. Create a client secret or certificate under Certificates & secrets.
Supported Attributes

MyPass can read and, in some cases, write to the following Entra ID user attributes:

AttributeOperationDescriptionRequired
postalCodeReadPostal CodeNo
stateReadStateNo
preferredLanguageReadPreferred Language – Not used currentlyNo
officeLocationReadOffice LocationNo
companyNameReadCompany NameNo
managerReadManagerYes
phoneReadPhoneYes
mobilePhoneReadMobile PhoneYes
mailReadE-mail addressYes
otherMailsReadOther Email addressesYes
usageLocationReadRequired for users that will be assigned licenses due to legal requirementNo
userTypeReadUser TypeNo
memberOfReadThe Groups a user is member ofYes
lastPasswordChangeDateTimeReadUsed to determine whether a user has been locked because of too many failed login attemptsYes
createdDateTimeReadDate of account creationNo
employeeHireDateReadHire dateNo
employeeIdReadEmployee IDNo
employeeOrgDataReadDivision and Cost centerNo
employeeTypeReadEmployee typeNo
identitiesReadRepresents the identities that can be used to sign in to this user accountNo
imAddressesReadInstant messaging (IM) address for a contactNo
passwordPoliciesReadOverall Password Policy dataNo
passwordProfileReadContains the password profile associated with a userNo

Besides the data noted above, MyPass can write the password when resetting the password for the user.

End-User Experience in Different Entra ID Scenarios

Entra ID evolves continuously, and MyPass updates accordingly. SSPR via MyPass works as expected in common scenarios. For the best experience, use a federated solution where the on-premises login screen can link to MyPass SSPR.

EntraConnector Scenarios-1

Users activating MyPass from Windows Login get a seamless experience. Issues arise with the MSAL login window (common for Category C users, rare for Category B). Microsoft displays a link to its own SSPR, even if unlicensed, disabled, or inaccessible.

EntraConnector Scenarios-1

The link is shown for all users Even if:

  • The Organisation have not Licensed it
  • The Organisation has disabled it
  • The user has no access to it

Unfortunately, this link cannot be removed. We suggest to add some helpful text to guide users in this case.

Creating an Entra ID Application for MyPass

Follow these steps to create the application token MyPass needs to manage Entra ID users.

Pre-requisites: Administrative account with rights to create Enterprise applications in Entra ID.

Steps to create an Entra ID Enterprise Application
  1. Log in to the Entra ID Portal for the target tenant.

  2. On the right-hand side, click Enterprise applications and follow the instructions below. EntraConnector Scenarios-3

  3. Enter a descriptive name, like "FastPass PM" and make selections as shown. Then click Register. EntraConnector Scenarios-4

  4. You will now see the landing page of your Enterprise Application.

  5. Now, in the upper right corner, under "Client Credentials", click "Add a certificate or secret". EntraConnector Scenarios-5

  • Copy the value of "Directory (tenant) ID" and paste the copied value into a safe storage.
  • Copy the value of "Application (client) ID" and paste the copied value into a safe storage.
  1. With the "Client Secrets" tab selected, click "New client secret". EntraConnector Scenarios-6

  2. Enter a descriptive name for the secret and select a expiration period that matches business policies. Click the "Add" button. EntraConnector Scenarios-7

  3. Click the "Copy to clipboard" icon next to the value of the secret (not the secret id). Paste the copied value into a safe storage. EntraConnector Scenarios-8

  • Note: The value cannot be copied at a later time but you can always create a new secret.
  1. Now, in the app-menupanel click the "Authentication" item.
  2. Under "Advanced Settings", click the "Yes" switch button to allow public client flows. EntraConnector Scenarios-9
  3. Click the "Save" button located at the top of the screen. EntraConnector Scenarios-10
  4. Now, in the app-menupanel click the "API permissions" item. Then click "Add a permission" EntraConnector Scenarios-12
  5. Click the large "Microsoft Graph" option. EntraConnector Scenarios-13
  6. Click the "Delegated permissions" item. EntraConnector Scenarios-14
  7. Scroll down and expand the "Directory" item and select the "Directory.AccessAsUser.All" permission item. EntraConnector Scenarios-15
  8. Now, scroll down and expand the "User" item and select the "User.ReadBasic.All" permission item. EntraConnector Scenarios-16
  9. Click the "Add permissions" button. EntraConnector Scenarios-17
  10. Now, notice the orange warning symbol. This tells that an administrator needs to grant consent on behalf of the users.
  • Click on the "Grant admin consent for TenantName button.
  • Notice that this is only possible if you are a tenant administrator. EntraConnector Scenarios-18
  1. Click the "Yes" button to confirm. EntraConnector Scenarios-19
  2. Now in the main menupanel click "Azure Active Directory" EntraConnector Scenarios-20
  3. Enter either "Helpdesk administrators" or "Password administrators" in the search field. EntraConnector Scenarios-21
  4. Click the shown item. EntraConnector Scenarios-22
  5. Click the "Add assignment" button at the top of the screen. EntraConnector Scenarios-23
  6. Click the "No member selected" link button. EntraConnector Scenarios-24
  7. Enter the application name into the search field (as specified when registering the "App"). EntraConnector Scenarios-25
  8. Select the shown item. EntraConnector Scenarios-26
  9. Click the "Select" button. EntraConnector Scenarios-27
  10. Click the "Next >" button. EntraConnector Scenarios-28
  11. Enter a text explaining what the permission is needed for into the field.(This may not be a neccessary step as it depends on other settings in tenant) EntraConnector Scenarios-29
  12. Click the "Assign" button.
  • Notice that the assignment wont be shown immidiately. It may take a few minutes. EntraConnector Scenarios-30
  1. Click the "Description" menu item to review the permissions that is given with the role assignment EntraConnector Scenarios-31
  2. Click the "Assignments" menu item to verify that the role assignment is being completed. EntraConnector Scenarios-32
  3. Now, everything should be ready... EntraConnector Scenarios-33

For sales inquiries or technical scoping, contact your MyPass representative to validate Entra ID tenant compatibility and API permissions during proof-of-concept.