About Microsoft Entra ID synchronization

2025-09-02Last updated

Microsoft Entra ID is a multi-tenant cloud-based directory and identity management service that combines core directory services, application access management, and identity protection. The Azure web app is used to connect Genetec ClearID™ to Microsoft Entra ID so that user information can be accessed and synchronized.

Connection information for Microsoft Entra ID

To connect Microsoft Entra ID to the ClearID web portal, you need the following information:
The Microsoft Entra ID connection settings dialog in the ClearID portal showing configuration information including Tenant ID, Application ID, and Client secret.
  • Tenant ID
  • Application ID (Client ID)
  • Client secret
Tip:
The Tenant ID, Application ID, and Client secret can be obtained from your Microsoft Entra ID application registration in the Azure web portal.
The enterprise application overview page in the Azure web portal with the Tenant ID and Application ID highlighted.
The enterprise application Certificates & client secrets page in the Azure web portal with the Client secret value highlighted.

Microsoft Entra ID API permissions

Before you can synchronize data with ClearID, an external system attributes administrator (IT or security personnel) must set up and configure the following API read permission privileges in Microsoft Entra ID. Only Application-type permissions are compatible with the native Microsoft Entra ID synchronization in ClearID.

Microsoft Graph (minimum requirements):
  • Application.Read.All - Used to get extension attributes.
    • Allows the app to read applications and service principals without a signed-in user.

    For more information, see List extensionProperties (directory extensions)

  • User.Read.All - Used to get user information.
    • Allows the app to read identity user risk information for all users in your organization without a signed-in user.
  • Group.Read.All - Used to get group information.
    • Allows the app to read group properties and memberships, and read conversations for all groups, without a signed-in user.
The enterprise application API permissions page in the Azure web portal with the required permissions highlighted.

For more information, see Microsoft Graph permissions reference.