This article covers the following topics:

Minimum Required Permissions

Obtaining API Information

  1. Login to Microsoft Azure with your global admin credentials.

  2. Click Microsoft Entra ID to be redirected to your tenant’s overview page.

  1. Copy and save the Primary domain for the tenant you want to sync for use in a later step in Zilla while configuring Microsoft Entra ID.

Set Up the Integration in Zilla

  1. Add the desired application to Zilla. For instructions on this process, refer to this article.

  2. Click Sync now in the top right corner on the application instance page for Entra ID.

image-20240819-173827.png
  1. Use the toggle to enable API Integration in the dialog that appears.

image-20240819-174304.png

Additional fields will appear. See the list under the image below for information on each.

image-20250228-053931.pngimage-20250326-130257.png
  1. Click Sync Now/Next.

  2. In the next dialog, click Next.

image-20240819-174502.png
  1. You will be taken to the Microsoft site where you need to log in as a Global administrator role for the Azure portal and check the box to grant consent on behalf of the organization.

The consent screen will look like the image below when Auto Discover Azure Cloud subscriptions? (Yes/No) is set to Yes.

The consent screen will look like the image below when Auto Discover Azure Cloud subscriptions? (Yes/No) is set to No.

The consent screen will look like the image below when Enable account modifications? (Yes/No)(Yes/No) is set to Yes. Highlighted permissions are the new ones for consent if you have previously synced Entra ID with Enable account modifications? (Yes/No) set as No.

  1. Click Accept. On successful OAuth, you will be redirected to Zilla with Sync in progress... message for the newly added Entra ID application instance. Click Done.

image-20240819-174558.pngimage-20240819-174721.png

If the sync was successful, a notification indicating that the sync completed will appear.

  1. Review the sync summary, click Close. Review the information in Zilla that was synced.

image-20240819-174847.png

Set Up the Integration with Global Reader Permissions

In some cases, the process of configuring and using Entra ID API through Zilla to sync permissions and users with your organization's Entra ID may be done by an Azure user with Global Reader permissions. When an Azure Global Reader makes the initial sync request the request will need to be approved within the Azure portal by a Global Administrator as shown in the steps below.

  1. Global Reader initiates Entra ID sync with Zilla. A consent request will be created in the Azure portal.

  1. In Entra ID go to Enterprise applications, then Admin consent requests. The pending request appears waiting for approval.

  1. The Global Administrator approves the permissions request by clicking Accept.

Note: If you try to sync in a tenant other than the one for which you entered the domain, Microsoft will return an error message.

Note: If a user has already consented to the sync with Enable account modifications? Yes/No and Auto Discover Azure Cloud subscriptions (Yes/No) set to No, when re-authenticating the consent screen will not be shown for the same Azure user performing the sync. If the values are set to Yes, the same user will see the consent screen without re-authentication until the user gives consent for these permissions.

Azure Cloud Subscription Instances

Azure Cloud is a Child Application of Microsoft Entra ID. Its configuration looks something like this:

image-20250418-101859.png

The 3rd configuration - Sync Classic Administrators ( Yes/No ) - is for syncing the Classic Administrator roles. It has a default value of Yes. This concept is soon going to be deprecated by Microsoft, and hence might cause your syncs to fail. In case that starts happening, you could switch the config value to No. This will not bring in any of the CoAdministrator roles in your account.

Troubleshooting guide

401 Unauthorized

This error occurs when your session has expired or the authentication token is invalid.

How to Fix

  1. Go to the configuration settings.

    image-20250214-101611.png
  2. Enable the Re-authenticate API integration option.

  3. Click on Sync Now to refresh authentication.


403 Forbidden

This error indicates insufficient permissions to access the Microsoft API.

How to Fix

  1. Verify Admin Consent in Microsoft Entra ID

    • Go to Microsoft Azure Portal and log in.

    • Navigate to Enterprise Applications.

      image-20250214-102302.png
    • Search for your application and select it.

      image-20250221-061622.png

    • Under the Security section, go to Permissions.

      image-20250221-061710.png

    • Ensure the required permissions have Admin Consent.

      image-20250217-094219.png

  2. Re-authenticate & Sync Again

    • Re-authenticate your account and click Sync Now.

      image-20250214-101611.png
    • Proceed with the usual sync steps.

  1. Revoke and Reauthorize Permissions (if the issue persists)

    • Follow the steps above to access the Permissions list.

    • Revoke all security permissions for Zilla in Microsoft Entra ID.

    • Grant the required permissions again.

    • Reauthorize access through the sync process.

To complete the configuration of the last login setting, the global admin must re-authenticate after selecting Yes and check the Re-authenticate API integration box if this is not the first sync.

The last login data that is synced in Zilla will match what is displayed in the Overview tab of Azure.

image-20250326-130257.png

Additional Resources