Microsoft Entra
Connector Overview

Microsoft Entra ID (formerly known as Microsoft Azure Active Directory or Azure AD) is a cloud-based identity and access management (IAM) solution.
Authentication Type
OAuth
Webhook Supported
No
Secrets
- PAN_SEC_MICROSOFT_ENTRA_TOKEN_TYPE 
- PAN_SEC_MICROSOFT_ENTRA_EXPIRES_AT 
- PAN_SEC_MICROSOFT_ENTRA_EXPIRES_IN 
- PAN_SEC_MICROSOFT_ENTRA_EXT_EXPIRES_IN 
- PAN_SEC_MICROSOFT_ENTRA_ACCESS_TOKEN 
- PAN_SEC_MICROSOFT_ENTRA_TENANT_ID 
API Client Supported
No
Requirements for Provisioning
In order to provision your connector, the following MS Entra information must be gathered:
- Client ID 
- Client Secret 
- Entra ID Scope 
To obtain your Client ID and Secret, perform the following steps:
- Log Into your Azure Portal 
- In the left panel, select Microsoft Entra (formally Azure Active Directory). 
- Select App registrations. 
- From the App registrations panel, select the app you built for Pandium > Note down the Application (client) ID; this is your Azure Client ID - If you did not build an app, to add a new application, click New registration 
 
- In the Manage section for the application, click Certificates & secrets. 
- If you do not have a client secret, create one: - Under Client secrets, click New client secret. - Enter a name and an expiration date and click Add. 
- In the Description box, type a description for the client secret. 
- For the Expires option, select an expiration date. 
- Click the Add button. 
- The new client secret is added > Copy or make a note of the client secret value. 
 
 
For more information, please refer to the following help documentation.
Please note: the application you registered and are connecting to Pandium also needs to be set up as a user in your Azure DevOps Account. For more information, please see here.

API Resources
For more information on how to utilize the MS Entra API, feel free to reference the following documentation.
Last updated
Was this helpful?