Configuring Azure AD and Office 365 Sync
The Azure and O365 sync allows you to store passwords and push password changes to Azure AD and Office 365 synced accounts. The tool will run as a service on the machine which it is installed, and periodically sync with the Passportal cloud.
You will only need to install the Azure AD Office 365 agent if you do not have these account linked to an existing local AD environment already. If the Office 365 accounts are linked already to a local AD account, then the standard AD agent is all that is required and will not interfere with that plugin. The Azure AD and Office 365 integration only needs to be deployed if you are working with cloud Azure AD Office 365.
Predominantly, this setup is used where the Blink product is also in use, allowing end-users to reset their own passwords in AzureAD/Office365.
This is only a one-way push/sync - from Passportalto Azure AD and/or Office 365. Any changes made directly in Azure AD or Office 365 would be overwritten with the current value in Passportal.
- 64-bit OS
- Supports TLS 1.2. More information on which versions of windows server support which TLS protocols can be found in this article
- If not current or installed, the agent will also deploy C++ and .NET 4.5 or newer during the install.
Setup - The admin account that the Passportal Agent uses to connect must have the Credential Type permission Azure/Office365 Admin within Passportal.
AD sync is set by default to update the password on Azure AD and Office 365, if it is changed in Passportal. However, this can be changed at the password level (individual passwords may have their own settings). The two modes are:
- Report Mismatches: This mode is a passive monitoring mode. It will attempt to match username/password pairs in Passportal with their equivalent usernames and passwords on the server. If there are any discrepancies (such as the password being changed by the user or in Azure AD and/or Office 365) then the tool will flag that password entry. The flag will appear on the password, the client and on the dashboard prompting users to update the information accordingly within Passportal.
- Enabled. This mode directly changes passwords on the Microsoft service. This is only a one-way push/sync - from Passportalto Azure AD and/or Office 365. Any changes made directly in Azure AD or Office 365 would be overwritten with the current value in Passportal.
Moving from Report Mismatches to Enabled would apply the password in Passportal to Azure AD and Office 365, so ensure that these changes are made prior to this switch.
- Enable Windows Sync for the client.
It is not possible to pull user Passwords from Azure AD and Office 365 to pre-seed data into Passportal. You will need to add accounts manually in Passportal, then enable Windows Sync.
- Install the Windows Agent on a device in the infrastrucure.
- Once the Windows Agent has been downloaded, transfer the installer to the Domain Controller and launch the installer using Setup.exe.
- Click Next.
- Read the License Agreement, click the I Agree radio button, and then click Next.
- Accept the default target Install Folder or enter a preferred location. Leave the Everyone radio button selected. Click Next.
- Select the Agent with AzureAD Integration radio button and then click Next.
- Enter the IP Address of the device being installed on as the Primary Domain Controller IP (and the Listener Port number if not using the default port 7771). Click Next.
- Confirm the Install by clicking Next.
- The Windows Agent will now install. Once completed, you will be prompted to reboot the Domain Controller to enable 2-Way Password Sync. This does not need to be done immediately, and clicking OK will not cause a reboot to happen. Please ensure the Domain Controller is rebooted at a suitable time. Click Close in the main dialog, to close the installer.
- You are now prompted to install any missing components required for the integration to function. Launch is the option to install missing components. Follow on-screen prompts to complete these installs. Click Continue next to Run the Passportal Agent Config Utility to continue when ready.
- The Windows Agent application will launch, to continue with its configuration. Authenticate with your Passportal login details. Once you have entered your details, you will see a message advising you have Successfully Authenticated. Click Refresh next client to populate the dropdown menu with the clients in Passportal and then select the appropriate client. Click Continue.
The account used for authentication needs to have the Permission Setup AD Sync in order to authenticate.
- Enter the credentials of an Admin Account for AzuseAD/Office365, and click Continue.
- You are now prompted to enter the Windows Service Account which will be used to run the Passportal and PassportalUpdater services. This account needs to exist already in AzureAd/Office365. Attempting to create one at this stage will generate errors. Enter the appropriate credentials and then click Save and Start Agent.
- Once the Windows Agent has been installed, we recommend you verify that the Passportal agent is working by going to services and ensuring the Passportal services are running.
- Repeat the install for each device where the Agent is required.
- Once all devices have the Agent installed, you can start adding Azure AD and Office 365 accounts into Passportal. Once the credentials are present in Passportal, you will need to enable Windows Sync for each one individually within the client:
- Click Edit Password in the Actions column of the Credentials List.
- Select Enabled in the Windows Sync drop-down menu (This option is only present when the client has Windows Sync enabled).
- Click Save.
Alternatively, you can also elect to have passwords only alert you to an AD mismatch, by selecting Report Mismatches. Resolving these alerts is a manual update to the credential.
The AzureAD Integration communicates with the AzureAD instance automatically using the AzureAD credentials entered later in step 13. The local IP is needed in order for Passportal to communicate with the Agent.