mirror of
https://github.com/bitwarden/help
synced 2025-12-06 00:03:30 +00:00
4.5 KiB
4.5 KiB
layout, title, categories, featured, popular, hidden, tags
| layout | title | categories | featured | popular | hidden | tags | |
|---|---|---|---|---|---|---|---|
| article | Configuring directory sync with Azure Active Directory |
|
true | false | false |
This article will cover how to connect the Bitwarden Directory Connector application to your Azure Active Directory.
Requirements
- Read through the following article: [Syncing users and groups with a directory]({% link _articles/directory-connector/directory-sync.md %})
- Install Bitwarden Directory Connector
- Using Directory Connector, log into your Bitwarden account and select your enterprise organization
Table of Contents
- Create a New Application Registration
- Grant Application Permissions
- Create Application Secret Key
- Get Your Application ID
- Get Your Tenant Hostname
- Configure Directory Connector
- Testing
Create a New Application Registration
- Go to https://portal.azure.com
- Select the Azure Active Directory resource
- Navigate to App registrations and select New application registration {% image directory-connector/azure/new-application.png %}
- Name your application "Bitwarden"
- Set the Application type to "Web app / API"
- Set the Sign-on URL to any website value, such as "https://company.com". This URL is not used in this setup process so it can be anything.
- Click the Create button to create the application. {% image directory-connector/azure/create-application.png %}
Grant Application Permissions
- Select the Bitwarden application you created in the previous section.
- Navigate to Settings and select Required Permissions.
- Delete the existing Windows Azure Active Directory API permission set that is automatically created by default. It is not needed.
- Select the Add button to create a new API permission set.
- For step 1, Select an API for Microsoft Graph.
- For step 2, Select Permissions for the following:
- Application Permissions:
- "Read all users' full profiles"
- "Read all groups"
- Delegated Permissions:
- "Read all groups"
- "Read all users' full profiles"
- "Read all users basic profiles"
- Application Permissions:
- Click the Select button and then Done to add the Microsoft Graph API permissions. {% image directory-connector/azure/graph-permissions.png %}
- Click the Grant Permissions button to grant the permissions to the application. {% image directory-connector/azure/grant-permissions.png %}
Create Application Secret Key
- Go back to the Bitwarden application that you created.
- Navigate to Settings and select Keys.
- Add a new Password key by entering a Name and Duration. We recommend selecting "Never Expires" for the duration.
- Click Save to create a new secret key.
- Copy the key's value to safe place. We will need to reference it later. {% image directory-connector/azure/key.png %}
Get Your Application ID
- Go back to the Bitwarden application that you created.
- Copy the Application ID to a safe place. We will need to reference it later. {% image directory-connector/azure/application-id.png %}
Get Your Tenant Hostname
- Select the Directory and Subscription filter in the top right corner of the Azure Portal.
- Note the hostname value that appears under your directory (ex. company.onmicrosoft.com). This is your Tenant hostname. Copy the Tenant hostname to a safe place. We will need to reference it later. {% image directory-connector/azure/tenant.png %}
Configure Directory Connector
- Launch the Directory Connector desktop application.
- Go to the Settings tab.
- Select Azure Active Directory as the directory type.
- Enter the Tenant hostname that you copied from the steps above (ex. company.onmicrosoft.com).
- Enter the Application ID that you copied from the steps above.
- Enter the Application Secret Key that you copied from the steps above.
Congrats! You are done configuring Azure Active Directory with the Bitwarden Directory Connector.
Testing
{% note %} It can take up to 15 minutes for the granted permissions for your application to properly propagate. You may receive "Insufficient privileges to complete the operation" errors in the meantime. {% endnote %}
Test your configuration by running a sync test. You should see your Azure Active Directory groups and/or users printed to the screen.