Connecting MPA Tools to Azure Tenant

An Azure application must be registered for MPA Tools with your Azure AD tenant to delegate identity and access management functions to Azure AD. When you register an application with Azure AD, you create an identity configuration that allows it to integrate with Azure AD.

Connecting MPA Tools to Azure Tenant

An Azure application must be registered for MPA Tools with your Azure AD tenant to delegate identity and access management functions to Azure AD. When you register an application with Azure AD, you create an identity configuration that allows it to integrate with Azure AD.

When MPA Tools is first installed, it is set up to use a default pre-configured Azure application for the integration with your Azure tenant. If you prefer, you can register your own custom Azure application for use with MPA Tools - see the section below titled “Registering MPA Tools with a custom enterprise application". Registering an app in the Azure portal will require the redirect URI, and you can choose to configure it for single-tenant or multi-tenant use.

When you launch MPA Tools for the first time, it will attempt to connect to your Azure tenant using the logged-in account. If this account does not have sufficient access to the Azure tenant, then the following message will appear.

Note: If MPA Tools is installed on a device that is not Azure AD joined or if the operating system is Windows Server, then this message will not appear.

Connecting MPA Tools to Azure Tenant screenshot 1

If you click OK to this prompt, the below Sign in/Approval message appears. Select the option “Have an admin account? Sign in with that account".

Connecting MPA Tools to Azure Tenant screenshot 2

Then select the option “Use another account".

Connecting MPA Tools to Azure Tenant screenshot 3

Enter a username for an administrative account that can authorize the required access listed below (this would typically be a Global Administrator for the Azure tenant):

Connecting MPA Tools to Azure Tenant screenshot 4

Enter the password for the administrative account and then click Sign in.

Connecting MPA Tools to Azure Tenant screenshot 5

Approve the sign in request using the Authenticator app.

Connecting MPA Tools to Azure Tenant screenshot 6

Review the requested permissions and then select the checkbox “Consent on behalf of you organization" and then click Accept.

Connecting MPA Tools to Azure Tenant screenshot 7
Connecting MPA Tools to Azure Tenant screenshot 8

MPA Tools will then launch using the credentials of the logged in user.

Connecting MPA Tools to Azure Tenant screenshot 9

The enterprise application for MPA Tools can be viewed in the Azure portal by navigating to https://portal.azure.com selecting Azure Active Directory and then select Enterprise applications from the navigation menu on the left.

Connecting MPA Tools to Azure Tenant screenshot 10

Select All Applications and then select MPA Tools.

Connecting MPA Tools to Azure Tenant screenshot 11

Here we can see the application ID and object ID.

Connecting MPA Tools to Azure Tenant screenshot 12

Click on Permissions to view the full list of requested permissions.

Connecting MPA Tools to Azure Tenant screenshot 13

Disconnecting MPA Tools from your Azure tenant

If, at the end of the trial, you would like to remove the MPA Tools enterprise application in your Azure tenant, then select Properties and then click the Delete button and the click Yes to the confirmation prompt.

Connecting MPA Tools to Azure Tenant screenshot 14
Connecting MPA Tools to Azure Tenant screenshot 15

Disabling Azure tenant auto-connection in MPA Tools

If MPA Tools will not be used for Azure tenant management, then we recommend disabling the Azure tenant auto-connect feature at start up. This can be done by clicking the settings gear icon on the top right-hand side of the MPA Tools window, then unchecking the setting “Automatically connect to Azure AD when application starts". Then click the Save button. After this change, MPA Tools will no longer attempt to connect to your Azure tenant when you open the application and the first two messages at the top of the article will no longer appear.

Connecting MPA Tools to Azure Tenant screenshot 16
Connecting MPA Tools to Azure Tenant screenshot 17

Registering MPA Tools with a custom Azure application

If you prefer to create a custom Azure application to register MPA Tools in your Azure tenant, then please follow the below steps:

Navigate to the Azure portal https://portal.azure.com, then select Azure Active Directory and then select App registrations from the navigation menu on the left. Click New registration.

Connecting MPA Tools to Azure Tenant screenshot 18

Enter a custom name for the application, for example, My App for MPA Tools. Select the account type.

Connecting MPA Tools to Azure Tenant screenshot 19

Important: Under Redirect URI, select Public client/native (mobile& desktop) from the drop down box and enter https://login.microsoftonline.com/common/oauth2/nativeclient in the text box.

Connecting MPA Tools to Azure Tenant screenshot 20

Click Register.

Connecting MPA Tools to Azure Tenant screenshot 21

The application will then be created, and it will be assigned an unique Application ID which will be required for MPA Tools (as illustrated later in the instructions below).

Connecting MPA Tools to Azure Tenant screenshot 22

Select Branding & properties from the navigation menu on the left. If you would like to add the brand logo for the application, you can use the icon file below. You can also enter https://www.velesoftware.com/mpa-tools/ for the Home page URL.

Connecting MPA Tools to Azure Tenant screenshot 23
Connecting MPA Tools to Azure Tenant screenshot 24

Select Authentication from the navigation menu on the left. Confirm that the URL https://login.microsoftonline.com/common/oauth2/nativeclient is selected under Mobile and desktop applications / Redirect URIs.

Connecting MPA Tools to Azure Tenant screenshot 25

Next, we will need to add the following Microsoft Graph permissions. Select API permissions from the navigation menu on the left. Click Add a permission.

Connecting MPA Tools to Azure Tenant screenshot 26

Click Microsoft Graph.

Connecting MPA Tools to Azure Tenant screenshot 27

Select Delegated permissions.

Enter each permission from the Claim Value column in the table of Microsoft Graph permissions above and then click the checkbox for each one. You can search for each permission one by one, selecting the checkbox for each one and then click the Add permission button once they are all selected. Below are screen prints of each required Microsoft Graph permission.

Note: If any of the required permissions are not selected, then this will affect the functionality of the relevant component of MPA Tools.

Connecting MPA Tools to Azure Tenant screenshot 28
Connecting MPA Tools to Azure Tenant screenshot 29
Connecting MPA Tools to Azure Tenant screenshot 30
Connecting MPA Tools to Azure Tenant screenshot 31
Connecting MPA Tools to Azure Tenant screenshot 32
Connecting MPA Tools to Azure Tenant screenshot 33
Connecting MPA Tools to Azure Tenant screenshot 34
Connecting MPA Tools to Azure Tenant screenshot 35
Connecting MPA Tools to Azure Tenant screenshot 36
Connecting MPA Tools to Azure Tenant screenshot 37
Connecting MPA Tools to Azure Tenant screenshot 38
Connecting MPA Tools to Azure Tenant screenshot 39

Next, we will need to add the following Windows Defender ATP permissions. Select API permissions from the navigation menu on the left. Click Add a permission. When selecting the API, click on APIs my organization uses and then select WindowsDefenderATP.

Connecting MPA Tools to Azure Tenant screenshot 40

Select Delegated permissions.

Enter each permission from the Claim Value column in the table of WindowsDefenderATP permissions above and then click the checkbox for each one. You can search for each permission one by one, selecting the checkbox for each one and then click the Add permission button once they are all selected. Below are screen prints of each required WindowsDefenderATP permission.

Note: If any of the required permissions are not selected, then this will affect the functionality of the relevant component of MPA Tools.

Connecting MPA Tools to Azure Tenant screenshot 41
Connecting MPA Tools to Azure Tenant screenshot 42
Connecting MPA Tools to Azure Tenant screenshot 43
Connecting MPA Tools to Azure Tenant screenshot 44
Connecting MPA Tools to Azure Tenant screenshot 45
Connecting MPA Tools to Azure Tenant screenshot 46

Once all the required permissions have been added, you should see 12 permissions for Microsoft Graph and 6 permissions for WindowsDefenderATP (as shown below).

Connecting MPA Tools to Azure Tenant screenshot 47

The required configurations for the app registration are complete, and now you should see you custom Azure application listed.

Note: You can add your own configurations to the application, for example, an app owner can be assigned, or app roles can be added to delegate the API permissions to specific users or groups.

Connecting MPA Tools to Azure Tenant screenshot 48

In Azure Active Directory, select Enterprise Applications from the navigation menu on the left to confirm that the custom application has been created. Select the application.

Connecting MPA Tools to Azure Tenant screenshot 49

Copy the application ID.

Connecting MPA Tools to Azure Tenant screenshot 50

Launch MPA Tools on the computer where the software is installed. When you launch MPA Tools for the first time, it will attempt to connect to your Azure tenant using the logged in account.

The below Sign in/Approval message will appear which is requesting approval/consent for the default Azure application for MPA Tools (note that the application indicates that it is from Veles Software Ltd).

Since we will be using a custom Azure application, we will ignore this message by clicking the X on the top right-hand corner.

Connecting MPA Tools to Azure Tenant screenshot 51

The following warning will appear, click OK.

Connecting MPA Tools to Azure Tenant screenshot 52

Click the settings gear icon on the top right-hand side of the MPA Tools window. Enter the application ID for the custom Azure application in the App ID field and then click the Save button.

Important: Close and reopen the MPA Tools window to give consent to the custom Azure application and for MPA Tools to connect to your Azure tenant.

Connecting MPA Tools to Azure Tenant screenshot 53

Once you have relaunched MPA Tools, it will attempt to connect to your Azure tenant using the custom Azure application (note that the application does not indicate that it is from Veles Software Ltd).

Select the option “Have an admin account? Sign in with that account".

Connecting MPA Tools to Azure Tenant screenshot 54

Then select the option “Use another account".

Connecting MPA Tools to Azure Tenant screenshot 55

Enter a username for an administrative account that can authorize the required access provided by the permissions that were added earlier to the custom Azure application (this would typically be a Global Administrator for the Azure tenant).

Connecting MPA Tools to Azure Tenant screenshot 56

Enter the password for the administrative account and then click Sign in.

Connecting MPA Tools to Azure Tenant screenshot 57

Approve the sign in request using the Authenticator app.

Connecting MPA Tools to Azure Tenant screenshot 58

Review the requested permissions.

Note: The name for the custom Azure application should appear here (as shown below).

Connecting MPA Tools to Azure Tenant screenshot 59

Then select the checkbox “Consent on behalf of you organization" and then click Accept.

Connecting MPA Tools to Azure Tenant screenshot 60

MPA Tools should now be connected to your Azure tenant, and it should start populating the device summary (as shown below).

Connecting MPA Tools to Azure Tenant screenshot 61

If for any reason you need to reset to the default application ID, the default app ID for the MPA Tools Azure application is: 925361f0-bbce-4c4d-9769-4cdeef1ccff9

The application ID is stored in the AzureAppID setting in this file: %LocalAppData%Veles_Software_ltdMPA_Tools.exe_Url_gmkbw2ylda2ykhqbwffantblgviqh0xp<AppVersion>user.config

Connecting MPA Tools to Azure Tenant screenshot 62

Written by