Setting Up a Zip Security & AzureAD Integration

Context

Follow these steps to configure OAuth credentials that the Zip Console will use to manage your AzureAD users, groups, and sessions. Then, grant permissions for the Zip application to reset Entra account passwords.
Icon
Zip now supports connecting AzureAD using OAuth! If you previously connected AzureAD by creating an app registration, it’s easy to migrate to the new setup by going to the provider in Zip, clicking ‘edit’, and proceeding with the new Quick connect option. If you’d prefer to follow the original steps, they are still included below for reference.

[New] Connect AzureAD from the Zip Console

Prerequisites

  • An account with the Global Administrator role in Azure AD
  1. Navigate to the Zip Console > Providers. Click Add > AzureAD > Quick connect.
    1. Image without caption
  1. Fill in the provider’s name, then click “Sign in with Microsoft”. You’ll be redirected to log in with Microsoft and consent to all of the application permissions that Zip needs to manage AzureAD. Note that only admins will be able to consent.
    1. Image without caption
  1. After consenting, you’ll be redirected back to the Zip Console
📣
For organizations connecting to a GCC High Tenant
  1. Expand the “Advanced Configuration” toggle at the bottom of the form
  1. Change the Address field to https://graph.microsoft.us
  1. Change the Authority Host field to https://login.microsoftonline.us
Otherwise, leave these fields as the default values.

Grant Permission to Reset Account Passwords

Complete the following steps to grant the Zip Security application permission to reset user account passwords. Passwords will only be reset when someone in your organization clicks to do so from the Zip console, and when Entra synced accounts get created for the first time.
  1. Go to the Microsoft Entra admin center
  1. Click on “Groups” → “New group”
  1. Configure the group as follows:
    1. Group type: Security
    2. Group name: Zip Security: User Password Reset
    3. Group description: blank
    4. Microsoft Entra roles can be assigned: YES
    5. Membership type: Assigned
    6. Owners: No owners selected
    7. Members: Select “Zip Security: Entra Integration” if you used OAuth to connect to Entra, or “Zip Security: AzureAD” for the legacy set up.
    8. Roles: User Administrator
  1. Click “Create” to create the group

[Legacy] Create an Application Registration for the Zip Console

Prerequisites

  • An account with at least the Application Administrator roles assignment in Azure AD
  • Someone from the customer with the Global Administrator role assignment in Azure AD
💡
We use separate credentials for AzureAD and Intune to allow for maximum flexibility and security.
Create the Application Registration
  1. Navigate to the App registrations in Azure
  1. Select “New registration” from the page menu and fill out the form as follows:
    1. Name: “Zip Security: AzureAD
    2. Supported account types: “Accounts in this organizational directory only (Zip Security only - Single tenant)
    3. Redirect URI: leave blank
    4. Select “Register” at the bottom of the page
  1. From the following page, record the following values (they are not sensitive):
    1. Application (client) ID
    2. Directory (tenant) ID
  1. From the left hand menu, select “Certificates & secrets
    1. Select “New client secret” and fill out the form as follows:
    2. Description: “Zip Security Service Account Secret
    3. Expires: “730 days (24 months)
    4. Select “Add
    5. Be sure to record the Secret “Value” from the next page in a secure place, as it will never be displayed again. It is sensitive!
  1. From the left hand menu, select “API permissions”.
    1. Select “Add a permission
    2. Search for and select “Microsoft Graph
    3. Select “Application Permissions
    4. Select “expand all
    5. Select the following permissions:
      1. Application.ReadWrite.All
      2. AuditLog.Read.All
      3. Directory.ReadWrite.All
      4. Group.ReadWrite.All
      5. GroupMember.ReadWrite.All
      6. LicenseAssignment.ReadWrite.All
      7. RoleManagement.ReadWrite.Directory
      8. User.EnableDisableAccount.All
      9. User.ManageIdentities.All
      10. User.ReadWrite.All
  1. Select “Add permissions
  1. Make sure you approve the permissions you’ve set by clicking ‘grant admin consent for Zip Security’:
    1. Image without caption
  1. And then confirming the permissions can be granted:
    1. Image without caption
      Some times this can fail the first time. If it does, wait for 5-10 minutes then log out and log back into the Microsoft partner portal, and attempt to grant permissions again - that usually fixes the problem!
  1. You should see the green check mark that each permission has been granted for Zip Security, and you’re all set!
    1. Image without caption
  1. Once you have added the permissions, navigate back to the Zip Console > Providers. Add a new AzureAD Provider with the ClientID (”Application (client) ID”), Client Secret (”Value”), and Tenant ID you jotted down in steps 3 and 4.
    1. 📣
      For organizations connecting to a GCC High Tenant
      1. Expand the “Advanced Configuration” toggle at the bottom of the form
      1. Change the Address field to https://graph.microsoft.us
      1. Change the Authority Host field to https://login.microsoftonline.us
      Otherwise, leave these fields as the default values.
      Click Save to finish.
  1. To check that you’ve got all the right permissions, you can click into the new Provider you’ve created in the Providers Table (clicking on the name) to make sure all the health checks pass!
If all goes well, you should see a green check mark under health like here:
Image without caption
Please contact info@zipsecinc.cc if you experience issues.