1
0
mirror of https://github.com/bitwarden/help synced 2025-12-16 00:03:41 +00:00
Files
help/_articles/directory-connector/azure-active-directory.md

98 lines
4.1 KiB
Markdown

---
layout: article
title: Configuring directory sync with Azure Active Directory
categories: [organizations]
featured: true
popular: false
hidden: false
tags: []
---
This article will cover how to connect the Bitwarden Directory Connector application to your Azure Active Directory.
## Requirements
- Read through the following article: [Syncing users and groups with a directory]({% link _articles/directory-connector/directory-sync.md %})
- Install Bitwarden Directory Connector
- Using Directory Connector, log into your Bitwarden account and select your enterprise organization
## Table of Contents
- [Create a New Application Registration](#create-a-new-application-registration)
- [Grant Application Permissions](#grant-application-permissions)
- [Create Application Secret Key](#create-application-secret-key)
- [Get Your Application ID](#get-your-application-id)
- [Get Your Tenant Hostname](#get-your-tenant-hostname)
- [Configure Directory Connector](#configure-directory-connector)
- [Testing](#testing)
## Create a New Application Registration
1. Go to <https://portal.azure.com>
2. Select the **Azure Active Directory** resource
3. Navigate to **App registrations** and select **New registration**
{% image directory-connector/azure/new-application.png %}
4. **Name** your application "Bitwarden"
5. Click the **Create** button to create the application.
{% image directory-connector/azure/create-application.png %}
## Grant Application Permissions
1. Select the **Bitwarden** application you created in the previous section.
2. Select **API Permissions**.
3. Select the **Add** button to create a new API permission set.
4. For step 1, **Select an API** for **Microsoft Graph**.
5. For step 2, **Select Permissions** for the following:
- Application Permissions:
- "Read all users' full profiles"
- "Read all groups"
- Delegated Permissions:
- "Read all groups"
- "Read all users' full profiles"
- "Read all users basic profiles"
6. Click the **Select** button and then **Done** to add the Microsoft Graph API permissions.
{% image directory-connector/azure/graph-permissions.png %}
7. Click the **Grant Permissions** button to grant the permissions to the application.
{% image directory-connector/azure/grant-permissions.png %}
## Create Application Secret Key
1. Go back to the **Bitwarden** application that you created.
2. Select **Certificates & Keys**.
3. Add a new **Password** key by entering a **Name** and **Duration**. We recommend selecting "Never Expires" for the duration.
4. Click **Save** to create a new secret key.
5. Copy the key's value to safe place. We will need to reference it later.
{% image directory-connector/azure/key.png %}
## Get Your Application ID
1. Go back to the **Bitwarden** application that you created.
2. Copy the **Application (client) ID** to a safe place. We will need to reference it later.
{% image directory-connector/azure/application-id.png %}
## Get Your Tenant Hostname
1. Select the **Directory and Subscription** filter in the top right corner of the Azure Portal.
2. Note the **Current directory** (ex. acmeinc.onmicrosoft.com). This is your **Tenant** hostname. Copy the **Tenant** hostname to a safe place. We will need to reference it later.
{% image directory-connector/azure/tenant.png %}
## Configure Directory Connector
1. Launch the Directory Connector desktop application.
2. Go to the **Settings** tab.
3. Select **Azure Active Directory** as the directory type.
6. Enter the **Tenant** hostname that you copied from the steps above (ex. company.onmicrosoft.com).
7. Enter the **Application ID** that you copied from the steps above.
8. Enter the Application **Secret** Key that you copied from the steps above.
Congrats! You are done configuring Azure Active Directory with the Bitwarden Directory Connector.
## Testing
{% note %}
It can take up to 15 minutes for the granted permissions for your application to properly propagate. You may receive "Insufficient privileges to complete the operation" errors in the meantime.
{% endnote %}
Test your configuration by running a sync test. You should see your Azure Active Directory groups and/or users printed to the screen.