Configuring Directory Integration Between MS Entra (formerly Azure AD) and Nullafi Shield
Prerequisites
Before beginning the configuration process, ensure you have:
- A fully operational Nullafi Shield instance
- A MS Entra plan on Azure
- SAML Authentication for MS Entra configured
Introduction
Nullafi Shield supports Directory integration to pull user groups from the Directory.
Part I: MS Entra Configuration
Configuring the Application
- Log into the Azure portal
- Navigate to Microsoft Entra
- Select App registrations from the left sidebar
- Click at all applications tab, you will see the SAML application you configured before for authentication, on the list
- Click on the application
- From the Essentials tab (top), you will see several attributes for the application.
- Copy the following ones to a text editor, you will need those information later:
- Application (client) ID
- Directory (tenant) ID
- In Client credentials attribute, lick at “Add a certificate or secret”
- Click at New client secret
- At Description type something like: “Client credentials for Nullafi Shield Directory Integration”
- Choose a time to expire the secret or leave the default (6 months)
- Click at Add
- Once it is created, copy the Value, save it for later.
Part II: Nullafi Shield Configuration
- Access your Nullafi Shield Dashboard (e.g., https://shield.maverickco.com)
- Log in and navigate to Configuration in the left sidebar
- Click at Directory
- At the Directory page, click at Azure
- Fill the inputs with the information you saved from MS Entra application configuration:
- Directory (tenant) ID
- Application (client) ID
- Client Secret Value
- Toggle to Enable the integration
- Click at Save Changes
Verification
- In the Nullafi Shield Dashboard, click at Policies, then Groups
- Click at Sync Groups
- You should see a list of groups from your Directory