Knowledge Base
Browse Docs
  • Introduction
    1. DefensX
    2. DNS & Web Filtering
    3. Zero Trust Files
    4. Zero Trust Credentials
    5. ADWare Protection
    6. Remote Browser Isolation
    7. Secure Browser Extension
    8. Secure Mobile Browser
  • Management
    1. Role-Based Access Control
  • Deployment
    1. Deployment via RMM
    2. Operating System Agent
    3. Deployment via GPO
    4. Deployment via Intune
    5. VDI and Terminal Servers
    6. Windows Manual Deployment
    7. Mac MDM Deployment
    8. Mac Manual Deployment
    9. Network Deployment
    10. Secure Mobile Browser
    11. Bypass Option
    12. AI Protections
    13. SaaS Restrictions
    14. Bookmark Manager
  • Secure Access (ZTNA)
    1. Configuration
  • Integrations
    1. Azure AD
    2. Identity Providers
    3. SIEM
  • Policy Management
    1. Configuring Policies
    2. Configuring Consents
  • Questions & Answers
    1. Licensing
    2. Incognito Mode
    3. Onboarding
    4. Active Directory
    5. Group Synchronization
    6. Agent
    7. Conflicting Softwares
    8. Reporting
    9. Virtual Desktops
    10. Using the Backend
    11. DNS & Web Filtering
  • Training Videos
    1. Onboarding Videos
    2. Attack Scenarios
    3. MSP Admin Training Series
  • MSP Automation
    1. Overview
    2. External Notifications
    3. Integrations
    4. Partner API
ONLINE DOCUMENTATION

Azure AD Integration

In this document
  • How Azure AD Integration Works
  • Granting Permissions for DefensX Connector
  • Selecting Correct User For Giving Permissions
  • Testing Granted Application
  • Sync Azure AD Groups
  • Changing the Primary Domain

How Azure AD Integration Works

You can integrate computers joined to an Azure AD with DefensX. You need to make sure that DefensX Connector Application in Azure is granted for the customer’s Azure domain.

DefensX Azure Connector application requires following permissions:

  1. Sign in and read user profile

  2. Read group memberships of a user

  3. Read directory data

All of the required permissions listed above are read-only permissions, DefensX application won’t require a permission that has write access. First two permissions is required for login on to our cloud backend interface interactively. So, those 2 permissions runs on behalf of the user who are trying to login in our backend.

Third permission (Read directory data) used to get a user’s group memberships information without user interactivity. It is important to have this permission in order to create users automatically in DefensX cloud backend with the correct group membership information.

Granting Permissions for DefensX Connector

You will find a "Grant Permissions" button in the "Settings → Azure AD & Active Directory" page like below.

1
Important
You must have necessary admin rights to grant permissions to Applications in Azure AD.

Selecting Correct User For Giving Permissions

After clicking the "Grant Permissons" button you’ll be asked for which Azure account you want to use. It is important to select correct Azure account which has the right to grabt application consents at this stage.

2

After authenticated with correct account, you’ll see a permissions page like following:

defensx connector

Clicking the "Accept" button DefensX Connector Application will be granted for your domain.

Testing Granted Application

In this step, you should see a screen similar to this under "Settings → Azure AD & Active Directory" page. Your Azure AD tenant id must be displayed and button must be green.

4

You can check the integration with clicking the "Test Permissions" button.

Caution
Please note that, after granting permissions for the DefensX Connector Application, you may need wait 10 to 60 seconds for changes to take effect on Azure AD at the first time.

Sync Azure AD Groups

Although it is not required to sync your Groups in Azure AD (it will be fetched automatically when users login to their devices with DefensX Agent installed), you may want to fetch your Azure AD groups for:

  • To verify that Azure AD connector working correctly and successfully fetching the user groups

  • Populate DefensX backend with correct groups without waiting an end user login to create Policies in DefensX and linking policies with user groups.

To do this, just go to the "User Groups" page and click on the "Sync Azure Groups" button:

5

Changing the Primary Domain

If you have changed your primary domain in Azure and start encountering permission errors from the DefensX Connector, follow the steps below to re-establish permissions between the Connector and Azure AD:

  • Log in to the DefensX Backend and navigate to Settings → Azure AD & Active Directory.

  • Click the Remove Grant button to remove the existing permissions in DefensX.

  • Log in to your Azure portal and go to Entra ID → Enterprise Applications.

  • Search for DefensX in the list of applications, then click on its name.

  • Under Manage → Properties, click Delete to remove the previous DefensX Connector application from your tenant.

  • Wait about 30 seconds, then follow the steps in Granting Permissions for DefensX Connector to reapply the permissions.

www.defensx.com
Secure Industries, Inc 101 Avenue of The Americas, Floor 9 New York, NY 10013