Skip to main content
Skip table of contents

Add credentials for tenant and on-prem Active Directory access

In order to give RBAC delegates access to a tenant and to an on-premises Active Directory (if hybrid tenant), you will need to set up valid credentials for a role.

The steps that follow include:

  1. Create a service account and registered application

    • A delegated user/service account

    • A registered application*

  • The registered application in your Entra created automatically by sapio365 includes the highest permissions for maximum access. You can restrict this application by removing permissions that you may deem unnecessary for the roles that you will use with this credential set.

  1. Give consent

  2. (Optional) Set on-premises credentials

  3. (Optional) Set a shared cache on a Microsoft SQL server

You can also:

Create credentials

Multi-tenant management

If you want to manage more than one tenant through sapio365 RBAC roles, create a set of credentials to access each environment.

Exempt service account from MFA

You may encounter an MFA-related error when you finish creating a set of credentials because the service account that was created must not subject to an MFA policy. Once you’ve exempted the account, try again.

Start by going to the sapio365 tab of the main window, and go to ‘RBAC – Configuration’ to set up the credentials to use for the roles you will create.

  1. In the ‘Credentials’ tag, click on the ‘Create’ button.

  2. Enter a unique name and description for the credentials you’re setting up. If you’re using sapio365 RBAC to manage several tenants, you’ll need to do this for each tenant.

  3. Click on ‘Create New Service Account & Application’ to automatically create a new, RBAC-dedicated user account and a new registered application in Entra.

  4. Select from the current session tenant or another tenant. If you have Partner Access with admin rights, you’ll see a third option “Customer”.

    • If you select anything besides the current tenant, ex. “Other”, you’ll be asked to authenticate and give consent to the enterprise application “Ytria sapio365 - with Admin Consent” for that tenant.

Although a sapio365 RBAC credential can be that of an existing user account, we strongly suggest to create a dedicated service account for sapio365 RBAC.

Note that the new service account does not require assignment of any Microsoft 365 license for sapio365 RBAC.

RBAC credentials.webp

1 - Create a service account and registered application

After choosing the tenant, you will be presented with several options regarding the new service account and the registered application:

  1. Frequency: Set password auto-renewal frequency (we recommend every 30 days - set by default).

  2. Application name: This is the name of the new registered application in Entra. You can change it.

  3. Assign Role to application: Certain “sensitive” actions by applications in Entra require a ‘Privileged Administrator Authenticator’ role. For example, resetting a password on a global admin. If your sapio365 RBAC roles using this set of credentials include such actions, you must assign this role. You can always assign this role at a later time.

  4. Account username: This is the name of the new service account. You can change it.

Exempt from Multi-Factor Authentication

Make sure to add this service account to your MFA policy exception list.

If you have any application restrictions set, make sure to add this service account to the group or approved list of users who can use the enterprise application “Ytria sapio365 - with Admin Consent”.

  1. Password Length: Define the password length of the service account.

  2. Assign Role to service account: Assign the Global Admin role to the service account.

Assign Global Admin role highly recommended

Although this is optional, several sapio365 features will not work without this role.

create-app-service-account.webp

2 - Give consent

After the creation of the service account and the registered application, you will be asked to give consent to its permissions. You must be a global admin to do so.

consent-to-reg-app.webp

3 - (Optional) Set on-premises credentials

Add connection information for accessing the local on-premises Active Directory (AD) connected to the tenant the same way as you would connect to on-prem AD in a sapio365 session. These credentials will be used to for actions in sapio365 based on chosen on-premises sapio365 RBAC permissions.

Make sure to toggle ‘Use On-Premises?’ to 'Yes' or “True” before clicking OK.

on-prem-cred.webp

4 - (Optional) Set a shared cache on a SQL server

This option allows users with roles based on this particular set of credentials to share the same data cache of Users, Groups, Sites and Service Principals by setting up cached data storage in a Microsoft SQL database in your network. Learn about requirements here.

Skip cache sharing if you manage small environments

A shared cache is only ideal if the target tenant has a large number of users, groups, sites or service principals.

This allows users with a role to:

  • load data faster

  • access centralized data (easier to keep up-to-date)

All roles based on this set of credentials give the same access to the full list of users, groups, sites or service principals, and their properties.

If you want to centralize the cache used by sapio365 for your roles for a set of credentials, you can

  1. Set ‘Use SQL Server’ to “Yes” or “True”.

  2. (Optional) If you’ve already set parameters to connect to MS SQL in sapio365 (ex. collaboration), you can add them with this button.

  3. Add parameters.

  4. You can test the connection by clicking on the button.

shared-cache-mssql.webp

Edit credentials

Click “Edit” to view or change the parameters of the set of credentials you select, including but not limited to:

  • The tenant

  • The service account

  • The registered application (via its ID)

  • Viewing the expiration of the application’s and service account’s password

  • Renewal of the application’s or service account’s password

  • Addition of a role

  • Viewing the permissions of the registered application

  • Giving consent to an application

edit-cred.webp

Delete credentials

  1. Select one or more sets of credentials to delete them from sapio365 with the ‘Delete’ button.

You can can only delete a set of credentials if it's not in use for any sapio365 RBAC role.

  1. You will be asked for confirmation to avoid mistakes.

  2. Click “Yes” to delete the associated service account and registered application.

Deleting a set of credentials on another tenant from the RBAC list does not remove them from that tenant’s Entra.

delete-cred.webp

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.