Microsoft Entra ID
Connect Sola and Entra ID to get security insights
Overview
The Microsoft Entra ID integration connects data from your Entra ID tenant to your Sola workspace, making it easy to search and find answers to your specific use cases.
The integration gives you a complete view of your identity and access environment, allowing you to monitor and understand your Entra ID configurations and user activity across your organization.
With the Microsoft Entra ID integration, you can:
Monitor user accounts, groups, and roles across your Entra ID tenant
Review conditional access and authorization policies
Track device registrations and sign-in activity
See admin consent workflows and service principal role assignments
Monitor directory settings, domains, and audit records
Access identity providers and security defaults
Your data can only be retrieved, never modified.
Once connected, your data is securely stored, and access is restricted to retrieving configurations and metadata only. Authentication methods ensure secure delegation of permissions while maintaining data integrity.
Set up Entra ID data source integration with Sola
Go to Integrations > Data Sources > click New data source > select Microsoft Entra ID.
The Sola wizard will take you through the steps.
To connect Entra ID, you’ll need a Microsoft Entra ID account with the necessary permissions to create and configure an App Registration.
These methods use an Azure App Registration within your subscription to securely grant Sola read-only access to your Azure services and resources.
App Registration (Recommended)
Terraform
The setup script, provided in the Sola wizard, creates the relevant resources needed for accessing Entra ID data:
Connecting to Azure AD - Authenticates to Azure AD using the active Cloud Shell session
Creating service principal - Creates an Azure AD application and service principal for Sola
Adding Microsoft Graph API permissions - Grants the service principal the following Microsoft Graph reading permissions:
Application.Read.All,AuditLog.Read.All,Directory.Read.All,Domain.Read.All,Group.Read.All,IdentityProvider.Read.All,Policy.Read.All,User.Read.All
Troubleshooting Entra ID setup script common errors
MISSING_PERMISSIONS
Your Azure AD account lacks the required directory role to perform the operation.
Ensure your account has the Global Administrator or Privileged Role Administrator role and re-run the script.
UNAUTHENTICATED
The Azure AD session is not authenticated or has expired.
Re-open Cloud Shell, ensure you are connected to Azure AD, and re-run the script.
NULL_SECRET
The service principal client secret was created but returned an empty value.
Re-run the script. If the issue persists, contact Sola support.
UNEXPECTED_ERROR
An unexpected error occurred during the setup.
Try again. Contact Sola support if the issue persists.
Explore the app gallery for Entra ID apps
Get started with Entra ID-focused security apps, built by our expert team.
Last updated
Was this helpful?