Use this article to integrate Lifecycle Manager with Microsoft Endpoint Manager. An application is required to grant access to the device and software information of your tenant and your customer tenants, to integrate Microsoft Endpoint Manager with Lifecycle Manager.
This document is for you if you're using Microsoft's Azure/Entra ID to manage your MS cloud data and your customers' MS 365 configurations. If you currently only manage your company's MS cloud data, please see the Microsoft Endpoint Manager - Single tenant integration instructions for single-instance configuration.
Prerequisites
Before proceeding with the Microsoft Endpoint Manager integration, please ensure the following requirements are met:
- Manage Integrations Permission: Verify that the Manage integrations permission is enabled for the ScalePad Hub account. This permission is required to add integrations in Lifecycle Manager.
- The user is an administrator of your Cloud Solution Provider (CSP) tenant.
- You have established GDAP relationships with your customers, with the Global Administrator, Application Administrator, or Cloud Application GDAP role.
- If the Global Administrator, Application Administrator, or Cloud Application Administrator GDAP role isn't used, the customer will need to consent to the application's access to their tenant manually.
- To confirm whether you have the appropriate role, navigate to the Azure Navigation menu and click Roles and Administrators.
- Search for Application Administrator, Global Administrator, or Cloud Application Administrator groups.
- Click the group name and verify that the user setting up the App Registration is a member of one of these groups.
Known limitation with indirect or unmanaged resellers - The Microsoft Endpoint Manager integration does not support indirect or unmanaged resellers because you need direct access to manage client devices. Indirect providers and Cloud Solution Provider (CSP) direct partners should have no issues, but this is something to be aware of if you purchase through a reseller.
Creating multiple instances
Lifecycle Manager supports setting up multiple instances of the Microsoft Endpoint Manager multi-tenant integration directly through your account.
Integration steps in Microsoft Azure
Creating the Lifecycle Manager application
We recommend creating a dedicated application that Lifecycle Manager uses to access device and software information.
- Sign in to Microsoft Azure as a Global Administrator, Application Administrator, or Cloud Application Administrator.
- From the Azure Active Directory in the Azure Portal, navigate to Azure Active Directory App registrations.
- Click the +New Registration button.
- Enter a user-facing display name for the new application registration (for example, Lifecycle Manager MEM multi-tenant).
- Under Supported account types, check Accounts in any organizational directory only (Any Microsoft Entra ID tenant - Multitenant) is selected. Leave the rest of the default settings as is.
- Click Register to create the application.
- Note the Application (client) ID and Directory (tenant) ID under the newly created application.
Tracking Microsoft Defender for Endpoint through Microsoft Endpoint Manager
To track assets with Windows Defender for Endpoint, you must add API permissions through Microsoft Endpoint Manager so that we can provide reporting on endpoint protection by consuming Windows Defender information through Microsoft Endpoint Manager.
Here are the steps to track Microsoft Defender for Endpoint through Microsoft Endpoint Manager.
- Within the created application, navigate to the API permissions section.
- Click the Add a permission button.
- In the Request API permissions screen, select APIs my organization uses.
- Manually type in WindowsDefenderATP, select WindowsDefenderATP, and then Delegated Permissions
- Search and select: Machine
- Search and select: Machine.Read.All
- Click Grant admin consent.
When setting your sync settings for Microsoft Endpoint Manager—Multi-Tenant, ensure that the Include Microsoft Defender for Endpoint option is selected.
When adding the Microsoft Endpoint Manager integration to Lifecycle Manager, you must add the Azure application (client) ID, and the Azure client secret value to the Microsoft Endpoint Manager multi-tenant add integration page.
Configuring Lifecycle Manager delegated permissions
Users/admins must grant permissions to applications before they can call APIs. For full functionality, the following delegated permissions are required:
-
Microsoft Graph
- Device.Read.All
- DeviceManagementApps.Read.All
- DeviceManagementManagedDevices.Read.All
- Directory.Read.All
- Organization.Read.All
-
Microsoft Partner Center
- User_impersonation (this is accessed under “API Permissions” -> “APIs my organization uses” and searching “Partner center”. User_impersonation is granted as a delegated permission.
- Within the created application, navigate to the API permissions section.
- Click the Add a permission button.
- In the Request API permissions screen, select Microsoft Graph and then select Delegated permissions.
- In the Select permissions section, click the arrows next to the required modules to expand each section or start typing the permission to filter the results.
- In the Device module, select Device.Read.All.
- In the DeviceManagementApps module, select DeviceManagementApps.Read.All.
- In the DeviceManagementManagedDevices module, select DeviceManagementManagedDevices.Read.All.
- In the Directory module, select Directory.Read.All.
- In the Organization module, select Organization.Read.All.
- Once all permissions are selected, click Add permissions.
- After selecting Add permissions, you must add administrator consent for each permission name by selecting Grant admin consent.
- After selecting Add permissions, you must add administrator consent for each permission name by selecting Grant admin consent.
- In the Device module, select Device.Read.All.
- Click the Add a permission button.
- In the Request API permissions screen, select Microsoft Graph and then select APIs my organization uses.
- Select Microsoft Partner.
- Select Delegated Permissions.
- Select user_impersonation.
- Click Add permissions.
Configuring Lifecycle Manager application process
- Navigate to the Azure Active Directory Groups section.
- Search for AdminAgents, and then select it. The name must only be AdminAgents.
- Navigate to the Members section for the group.
- Select Add members, search for the Lifecycle Manager application that was created (e.g., Lifecycle Manager MEM MT integration), and click Select.
Granting Lifecycle Manager access
Client secrets, also known as application passwords, are secret strings the application uses to prove its identity when it requests a token.
- Within the created application, navigate to the Certificates & secrets section.
- In the Client secrets section, click the New client secret button.
- Add a description for the client secret. After entering a description, we recommend leaving the default expiry settings to 6 months.
- Click the Add button.
- Take note of the Client secret Value, as this value is required when adding the integration to Lifecycle Manager.
- Important: Keep the Client secret Value in a secure location. Once you navigate away, it is not recoverable.
Why 6 months for expiry? - We recommend 6 months because it strikes a balance between security and convenience. Microsoft’s guidelines simply require that the secret not be indefinite. Before a client secret expires, a new one can be created and saved in the existing integration with no downtime.
Authentication steps
Azure portal authentication
- Within the created application, navigate to the Authentication section on the left side of the Azure app management page.
- Under Platform configurations, unless Web is already present, click Add a platform and choose Web.
- If adding a new platform, enter https://app.scalepad.com/account/integration/oauth as the redirect URI, then click Configure.
- If the Web platform was already there, click Add URI and enter https://app.scalepad.com/account/integration/oauth, then click Save.
- Under Supported account types, check Accounts in any organizational directory only (Any Microsoft Entra ID tenant - Multitenant) is selected.
Adding credentials to Lifecycle Manager
- Within Lifecycle Manager, navigate to the Microsoft Endpoint Manager multi-tenant add integration page and fill in the following information gathered previously:
- Azure application (client) ID
- Azure client secret value
- When setting your sync settings for Microsoft Endpoint Manager—Multi-Tenant, ensure that the Include Microsoft Defender for Endpoint option is selected. See Tracking Microsoft Defender for Endpoint through Microsoft Endpoint Manager for information.
- Click Connect now.
- After the page has been saved, click Authorize, which will open a popup to a Microsoft authorization page to run through.
When you click Connect now, Lifecycle Manager performs a full sync. When finished, you should be able to view your assets in your account.