Context

Follow these steps to configure OAuth credentials that the Zip Console will use to manage your Intune computers.
Icon
Zip now supports connecting Intune using OAuth! If you previously connected Intune by creating an app registration, it’s easy to migrate to the new setup by going to the provider in Zip, clicking ‘edit’, and proceeding with the new Quick Connect option. If you’d prefer to follow the original steps, they are still included below for reference.
Note: if you’re connecting to a GCC High Tenant, please proceed with the legacy instructions below.

[New] Connect Intune from the Zip Console

Prerequisites

  • An account with the Global Administrator role assignment in Azure AD
  • [If using device enrollment with Zip] Lastly, you will want to make sure Windows Automatic enrollment is configured for Intune. You can do this by visiting endpoint.microsoft.com to reach the Intune Admin Center. You can then go to Devices > Windows > Windows Enrollment > Automatic Enrollment
    • We recommend the settings below - WIP user scope is None and MDM user scope is either Some — if only a certain group is licensed for Intune — or All if you would like everyone to be eligible.
    • Image without caption

Connecting Intune from Zip

  1. Navigate to the Zip Console > Providers. Click Add > Intune > Quick connect.
    1. Image without caption
  1. Click “Sign in with Microsoft”. You’ll be redirected to log in with Microsoft and consent to all of the application permissions that Zip needs to manage Intune. Note that only admins will be able to consent.
    1. Image without caption
  1. After consenting, you’ll be redirected back to the Zip Console
  1. Fill in the provider name, then click ‘Save’ to finish.
  1. To check that you’ve got all the right permissions, you can click into the new Provider you’ve created in the Providers Table (clicking on the name) to make sure all the health checks pass. If all goes well, you should see a green check mark under health like this:
Image without caption
Please contact info@zipsecinc.cc if you experience issues.

[Legacy] Create an Application Registration for the Zip Console

Prerequisites

  • An account with at least the Application Administrator roles assignment in Azure AD
  • Someone from the customer with the Global Administrator role assignment in Azure AD
  • [If using device enrollment with Zip] Lastly, you will want to make sure Windows Automatic enrollment is configured for Intune. You can do this by visiting endpoint.microsoft.com to reach the Intune Admin Center. You can then go to Devices > Windows > Windows Enrollment > Automatic Enrollment
    • We recommend the settings below - WIP user scope is None and MDM user scope is either Some — if only a certain group is licensed for Intune — or All if you would like everyone to be eligible.
    • Image without caption

Create the Application Registration

  1. Navigate to the App registrations in Azure
  1. Select “New registration” from the page menu and fill out the form as follows:
    1. Name: “Zip Security: Intune
    2. Supported account types: “Accounts in this organizational directory only (Zip Security only - Single tenant)
    3. Redirect URI: leave blank
    4. Select “Register” at the bottom of the page
  1. From the following page, record the following values (they are not sensitive):
    1. Application (client) ID
    2. Directory (tenant) ID
  1. From the left hand menu, select “Certificates & secrets
    1. Select “New client secret” and fill out the form as follows:
    2. Description: “Zip Security Service Account Secret
    3. Expires: “730 days (24 months)
    4. Select “Add
    5. Be sure to record the Secret “Value” from the next page in a secure place, as it will never be displayed again. It is sensitive!
  1. From the left hand menu, select “API permissions”.
    1. Select “Add a permission
    2. Search for and select “Microsoft Graph
    3. Select “Application Permissions
    4. Select “expand all
    5. Select the following permissions
      1. Application.Read.All
      2. Device.Read.All
      3. DeviceManagementApps.ReadWrite.All
      4. DeviceManagementConfiguration.ReadWrite.All
      5. DeviceManagementManagedDevices.PrivilegedOperations.All
      6. DeviceManagementManagedDevices.ReadWrite.All
      7. DeviceManagementRBAC.ReadWrite.All
      8. DeviceManagementScripts.ReadWrite.All
      9. DeviceManagementServiceConfig.ReadWrite.All
      10. Group.ReadWrite.All
      11. LicenseAssignment.ReadWrite.All
      12. User.EnableDisableAccount.All
      13. User.Read.All
      14. WindowsUpdates.ReadWrite.All
    6. Select “Add permissions
  1. Make sure you approve the permissions you’ve set by clicking ‘grant admin consent for Zip Security’:
    1. Image without caption
  1. And then confirming the permissions can be granted:
    1. Image without caption
  1. You should see the green check mark that each permission has been granted for Zip Security, and you’re all set!
    1. Image without caption
  1. Once you have added the permissions, navigate back to the Zip Console > Providers > Intune > Advanced Setup. Add a new Intune Provider with the ClientID (”Application (client) ID”), Client Secret (”Value”), and Tenant ID you jotted down in steps 3 and 4.
    1. 📣
      For organizations connecting to a GCC High Tenant
      1. Expand the “Advanced Configuration” toggle at the bottom of the form
      1. Change the Address field to https://graph.microsoft.us
      1. Change the Authority Host field to https://login.microsoftonline.us
      Otherwise, leave these fields as the default values.
      Click Save to finish.
  1. To check that you’ve got all the right permissions, you can click into the new Provider you’ve created in the Providers Table (clicking on the name) to make sure all the health checks pass!
If all goes well, you should see a green check mark under health like here:
Image without caption
Please contact info@zipsecinc.cc if you experience issues.
Zip Security & Intune Licensing