Introduction
This article is designed to assist you in configuring Customer Identity Verification via MS Authenticator on CyberQP Dashboard.
*Identity verification via MS Authenticator will be launched for PSA platforms in the future.
**Please note that this current release does not support AD connect accounts.
Prerequisites
- This article assumes the End-Users are already imported into Quickpass. If not follow one of these articles first.
Manual Import
Automatic Import of AD Accounts Linked to O365
Automatic Import of AD Accounts not Linked to O365
Automatic Import of O365/Azure Only Accounts - M365 Integration is enabled for the customers
- End-users should have their M365 account registered with the MS Authenticator app on their phone. Please see this KB article How to verify end-users using MS Authenticator
- End User Account imported to the Dashboard must be sourced from M365 only or AD with M365 Password Sync Enabled.
*Please note that this KB allows you update the permissions for the CyberQP application which is required to setup MS authenticator. We will be auto-updating permissions for all existing integrations on 30th October. If you want to use this feature right away, please follow the steps in the KB.
For any new CyberQP customers, please follow this KB. In case, the below permission is already enabled for the CyberQP application, feel free to skip this article.
Process
- Ensure that the customer on CyberQP dashboard is connected to the M365 ('Connect 365' option should be disabled) and is in an online status
- Login onto the Microsoft Azure portal via an account that has administrative privileges for the tenant and search for 'Enterprise Application' in the search bar
https://portal.azure.com/#home
- In the Enterprise Applications view, click on the 'Quickpass' or 'CyberQP' Application view. This is the application that will use the Microsoft Graph API. The Application ID in NA tenants is: 92ae02b7-9ca9-4b62-9130-a35011636a45,
- Expand 'Security' dropdown and click on 'Permissions' from the side menu
- Click on 'Grant admin consent' tile and sign-in with the required account
- In the Microsoft Permissions requested modal, click on 'Accept'
- A success banner displaying 'Admin consent was successfully granted' appears on the UI
- Viewing the Permissions after the increased permissions are assigned will show the following:
Comments
0 comments
Article is closed for comments.