Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 20 Next »

Overview

This document provides instructions on how to connect to an API to import data from this application into your instance of Zilla.

In this guide, you will:

  1. Launch your application from inside Zilla

  2. Set up an API configuration

  3. Send your data securely to Zilla

Step-by-Step Instructions

Note: To do this operation you need to be an admin or application owner within Zilla and have admin access with your organization's Azure Active Directory-AAD application, specifically Global administrator role.

  1. Login to Azure Active Directory with your admin credentials.

  2. Click Azure Active Directory, and from there you will be redirected to your tenant’s overview page.

  3. Save the Primary domain for the tenant you want to sync for use in a future step.

  4. Login to Zilla with your admin credentials.

  5. You will see your Zilla Applications tab, click Add Application button at the top right.

  6. You will see Add Application screen with Search Library tab. Type AAD as search text, and click Add to Applications button on the right side of the Azure Active Directory entry.

  7. Fill in the form with appropriate details and click Add to Applications button.

  8. The AAD instance will be added to your Applications, click the Azure Active Directory application name.

  9. You will see a detailed application instance page. Click Sync now in the top right corner.

  10. A dialogue appears, enable API Integration.

  11. Upon enabling the API Integration more customization options appear.

  12. AAD tenant's domain name - Fill in the domain name saved from Step 3.

  13. Sync All Accounts? ( Yes/No ) - Yes will sync all of your organization’s users, No will sync only users who have any roles assigned to them. Users without any roles will not be synced. By default, the value is Yes.

  14. Sync All Groups? ( Yes/No ) - Yes will sync all groups from Azure Active Directory if provided, otherwise, only security-enabled groups are synced. By default, the value is No.

  15. Comma-separated attributes that identify a user - Provide an AAD-specific attribute (job title, department, etc) for which you want to sync AAD users. For example, if you specify a department, only accounts that have a defined department will be imported.

  16. Auto Discover Azure Cloud subscriptions? (Yes/No) - Yes allows you to auto-discover all the Azure Cloud subscriptions, by default the value is No.

  17. Auto Sync discovered subscriptions? (Yes/No ) - Yes allows the auto-discovered subscriptions to be automatically synced when the parent is synced, by default the value is No. This value should be set to No if Auto Discover Azure Cloud subscriptions? (Yes/No) is set to No.

  18. Click Sync Now.

  19. Click Next.

  20. You will be taken to the Microsoft site where you need to log in with the user with the Admin (Global administrator) role for AAD and grant consent on behalf of the organization.

  21. The consent screen will look like the image below when Auto Discover Azure Cloud subscriptions? (Yes/No) is set to Yes.

  22. The consent screen will look like the image below when Auto Discover Azure Cloud subscriptions? (Yes/No) is set to No.

  23. Click Accept. On successful OAuth, you will be redirected to Zilla with Sync in progress... message for newly added AAD application instance.

  24. On successful sync, you will see the following notification:

Note: In some cases, the process of configuring and using the Azure Active Directory API through Zilla to sync permissions and users with your organization's AAD may be done by an Azure user with Global Reader permissions. When an Azure Global Reader makes the initial sync request the request will need to be approved within the Azure portal by a Global Administrator as shown in the steps below:

Step 1. Global Reader initiates Azure Active Directory sync with Zilla.  A consent request will be created in the Azure Active Directory portal.

Step 2. In Azure Active Directory go to Enterprise applications, then Admin consent requests. The pending request appears waiting for approval.

Step 3. The Global Administrator approves the permissions request by clicking Accept.

Note: If you try to sync in a tenant other than for which you have entered the domain, Microsoft will return an error message.

When you have finished with all the steps above, review the information in Zilla that was synced.

Having trouble? Try our Troubleshooting articles or contact support@zillasecurity.com.

  • No labels