Entra (formally Azure) Active Directory Connector for Password Boss
Learn how to use Azure Active Directory to manage users via Password Boss.
Table of Contents
Connect Azure (Entra) AD to Password Boss
The Password Boss Azure AD connector allows you to create and update a user account in Password Boss directly from Azure AD.
This connector does not synchronize the user's AD password to Password Boss.
Syncing groups from Azure Active Directory to Password Boss
Groups can also be synced to Password Boss. Details are in the Synchronizing Groups article.
Using sync Rules to customize Sync
sync rules are used to determine the actions taken in Password Boss when changes are made in Active Directory. Details of the sync rule are in the Sync Rules article.
Creating a group in Azure AD to sync to Password Boss
The Azure Active Directory connector monitors a group in the Active Directory. When users are added to the group, the user accounts are created in Password Boss. When users are removed from the groups, disabled, or deleted, the user accounts in Password Boss are disabled, although this is a setting you can change in the Sync Rules tab of the connector in the Password Boss Portal.
- Create a new security group in Azure AD named Password Boss Users.
Create a new application registration
- Go to https://portal.azure.com
- You should be on the Welcome to Azure! page
- Click Azure Active Directory
- Click App registrations
- Click New Registration
- Name your application Password Boss AD Connector, then In the Supported Accounts Type section, select Accounts in this organizational directory only. On the Redirect URI, select Web and use https://partner.passwordboss.com/azure/callback for the url.
Configure API permissions
- After saving the new AD connector, you should be on the Overview page for the new connector. Note: Microsoft frequently changes these pages and flows, so you may need to navigate manually to the Overview page, as shown in the screenshot below.
- Click API Permissions
- Click Add a permission
- Select Microsoft Graph
- Select Application permission
You will need to set the following two permissions
Group -> Group.Read.All
User -> User.Read.All
- Click Add permission at the bottom
- Click Grant admin consent for [Org Name], then YES
Create a client secret key
- Select the application you created
- Name your New Client Secret Password Boss AD Connector
- Under the Supported Accounts Type section, select Accounts in this organizational directory only (YourCompanyName only - Single tenant)
- Under the Redirect URI (optional) add the following URL https://partner.password Boss.com/azure/callback
3. Click the Register button to create the application.
- Name the key Password Boss Secret and set the expiration to 730 days (24 Months)
4. Click Add
5. Copy your secret **Value** now – it is not shown again. We recommend placing the secret **Value** in a digital Note for the Password Boss Partner Portal configuration. You will need the key to finish the configuration on the Password Boss Portal.
Copy application ID and tenant ID
- From the Overview tab of the App registration you just created copy the Application (client) ID and the Directory (tenant) ID. You will need these values to finish the setup on the Password Boss Portal.
Specify redirect URIs
- From the Overview screen on the App registration click Add a Redirect URI
- Add the following URI: https://portal.passwordboss.com/business/connectors/azure/callback and then click Save
Text
Install the Azure Active Directory Connector
- Open the Password Boss Portal.
- In the Partner Portal, the connector is located on the Connectors tab for each Company.
- In the User Portal, the connector is located on the Integrations tab.
- Click Install
- Save the Authentication token for future use and click Next.
- Enter the client ID, Client Secret, and Tenant, and click Verify Connection
- You will be redirected to Microsoft in your browser to authorize the connection. Click to provide consent and click Accept.
- After successful verification at Microsoft you will see Connection Verified.
- Click Next to continue
- On the Users & Groups tab click the green button to select the Password Boss Users group that you created in the first section of this guide. The group selected here is the group that will be synchronized to Password Boss.
Notes: As a best practice use a dedicated group only used for managing users in Password Boss. Only one group can be selected for synchronization to Password Boss.
- Optional - Select Azure groups to sync to Password Boss. Any groups selected will be synchronized to Password Boss as long as the groups contain users who are included in the sync group you specified above. Empty groups will not be synchronized.
- Click Next
- Review the sync rules. In most cases, the default setting will be the best choice.
- Click Save Changes
When you return to the connector list in the portal you will see the connector with a status of Waiting for connection.
Normally this status will transition to Connected within a couple of minutes.
Users whose accounts were synchronized from Azure AD will show Azure AD in the Managed By column of the Users tab of the portal.
Troubleshooting synchronization
Synchronization runs every minute with Microsoft. If you have made changes in Azure AD that are not being updated in Password Boss follow these troubleshooting steps.
- In the Password Boss Portal, what status is shown for the Azure AD connector?
Connected means the last connection to Microsoft was successful
Unauthorized means you need to reauthorize the Azure AD connector. Edit the connector from the Azure Auth tab and click Verify Connection - Check your Password Boss Users group in Azure AD to confirm the correct users are in the group.
- If synchronization seems stuck you can perform a manual synchronization. Select the checkbox next to the connector and from the Actions menu select Synchronize Now.