ChatGPT Image Apr 30 2025 03 28 31 PM

Effortless User Management: Sync M365 (Entra ID) with Power Platform Like a Pro!

If your company is leveraging Microsoft Azure or Entra ID, you can simplify user management within CyberHoot by following this comprehensive guide. Discover how to add users to CyberHoot’s Power Platform using Azure AD/Entra ID Sync through Graph API with these detailed, step-by-step instructions.

Step-by-Step Instructions for the Power Platform

Start by logging into your account. Once you’re in, you’ll land on the Dashboard screen. From there, head over to the “Users” section or click on “Admin” followed by “User-Group-Manager,” located at the top right of the screen.

  1. Click on the “Entra ID Sync” button to kickstart the synchronization process.
  2. Select “Grant Entra ID Access” to move to the next step.
  3. Choose between “Public Cloud Access” for regular business accounts or “Government Cloud Access” if your environment is hosted on the Gov cloud.
  4. Enter your Entra ID credentials to authenticate your access.
  5. Click “Next” to proceed in the setup process.
  6. On the Entra ID Users & Groups page, you can exclude unlicensed and/or external users from synchronization. Remember, some companies prefer to train unlicensed users as well as external consultants or subcontractors.
  7. At this point, you can also decide whether to sync Entra ID managers or assign all synced users to a local manager. Click “Save Sync Settings” to continue.
  8. Choose between two synchronization options: “Sync by Groups” or “Sync by Users.”
  9. Under the “Action” column, users will be marked as “Skipped” or “Synced.” Click on either term to toggle users between these two statuses.
  10. Click “Sync Now” to manually synchronize users. Keep in mind that users are automatically synced every four hours.
  11. Finally, click on “Close” and then “Back” to wrap up the process.

Pro Tip for High Compliance

Defining managers for each employee in CyberHoot is essential. Employee managers are carbon copied (CC’d) on reminder emails sent to employees who haven’t completed an assignment by the due date. For detailed instructions on adding employee managers to their Azure AD profile, check out this comprehensive guide.

Please note that Azure AD Government Community Cloud (GCC) environments must register an Enterprise Application to synchronize users. Specific instructions for this process can be found in the relevant documentation.

Understanding Permissions and Security

CyberHoot uses a robust permission authorization flow to ensure secure access to Azure AD/Entra ID:

  1. Permission and Consent: The administrator logs into Microsoft, and CyberHoot is assigned read-only permissions using the principle of least privilege.
  2. Token Acquisition: CyberHoot requests an OAuth 2.0 token from Azure AD/Entra ID. It’s important to note that CyberHoot does not know nor store the password used by the admin.
  3. Token Grant: Azure AD/Entra ID validates the request and, if successful, issues an access token. This token encapsulates the permissions granted to CyberHoot.
  4. Accessing Resources with the Token: CyberHoot uses this token to access the necessary information to add users to CyberHoot securely.

Secure your business with CyberHoot today and experience seamless user management and enhanced security.

Similar Posts