Microsoft Entra ID

Connect Sola and Entra ID to get security insights

Overview

The Microsoft Entra ID integration connects data from your Entra ID tenant to your Sola workspace, making it easy to search and find answers to your specific use cases.

The integration gives you a complete view of your identity and access environment, allowing you to monitor and understand your Entra ID configurations and user activity across your organization.

With the Microsoft Entra ID integration, you can:

  • Monitor user accounts, groups, and roles across your Entra ID tenant

  • Review conditional access and authorization policies

  • Track device registrations and sign-in activity

  • See admin consent workflows and service principal role assignments

  • Monitor directory settings, domains, and audit records

  • Access identity providers and security defaults

circle-exclamation

Set up Entra ID data source integration with Sola

Go to Integrations > Data Sourcesarrow-up-right > click New data source > select Microsoft Entra ID.

The Sola wizard will take you through the steps.

To connect Entra ID, you’ll need a Microsoft Entra ID account with the necessary permissions to create and configure an App Registration.

These methods use an Azure App Registration within your subscription to securely grant Sola read-only access to your Azure services and resources.

  • App Registration (Recommended)

  • Terraform

circle-info

The setup script, provided in the Sola wizard, creates the relevant resources needed for accessing Entra ID data:

  1. Connecting to Azure AD - Authenticates to Azure AD using the active Cloud Shell session

  2. Creating service principal - Creates an Azure AD application and service principal for Sola

  3. Adding Microsoft Graph API permissions - Grants the service principal the following Microsoft Graph reading permissions: Application.Read.All, AuditLog.Read.All, Directory.Read.All, Domain.Read.All, Group.Read.All, IdentityProvider.Read.All, Policy.Read.All, User.Read.All

Troubleshooting Entra ID setup script common errors

Error Code
Description
Resolution

MISSING_PERMISSIONS

Your Azure AD account lacks the required directory role to perform the operation.

Ensure your account has the Global Administrator or Privileged Role Administrator role and re-run the script.

UNAUTHENTICATED

The Azure AD session is not authenticated or has expired.

Re-open Cloud Shell, ensure you are connected to Azure AD, and re-run the script.

NULL_SECRET

The service principal client secret was created but returned an empty value.

Re-run the script. If the issue persists, contact Sola support.

UNEXPECTED_ERROR

An unexpected error occurred during the setup.

Try again. Contact Sola support if the issue persists.

Get started with Entra ID-focused security appsarrow-up-right, built by our expert team.

Last updated

Was this helpful?