Get Required Information For Your Microsoft Azure AD Realm
This task explains how to get the information required to set up a Microsoft Azure AD (now called Entra ID) realm in the Cisco Security Cloud Control. You might have already obtained this information when you set up Microsoft Entra ID as discussed in Configure Microsoft Entra ID for Passive Authentication.
To configure an Entra ID realm with the Cisco Security Cloud Control, you must get all of the following values:
Entra ID name |
Cisco Security Cloud Control name |
---|---|
Application (Client) ID |
Client ID |
Client Credentials |
Client Secret |
Directory (tenant) ID |
Tenant ID |
Consumer group name |
Consumer Group ID |
Event hub name |
Event Hubs Topic |
Connection string—primary key |
Event Hubs Connection String |
Event hub host name |
Event Hubs Broker |
Procedure
1 |
Log in to https://portal.azure.com/ as a user with at least the Product Designer role. |
2 |
At the top of the page, click Microsoft Entra ID. |
3 |
In the left column, click App Registrations. |
4 |
If necessary, filter the list of displayed apps to show the one you want to use. |
5 |
Click the name of your app.
|
6 |
Click Copy (
|
7 |
Click Client Credentials. |
8 |
Unless you already know the client secret value (as opposed to the client secret ID), you must create a new client secret as follows: |
9 |
Click Copy ( |
10 |
To find the event hub connection string, see Get an Event Hubs connection string from Microsoft. |
11 |
From https://portal.azure.com/, click . |
12 |
In the right pane, click Copy (
|
13 |
Write down or copy to a text file the name of the event hub (same as the Event Hubs Namespace at the top of the page). |
14 |
In the left pane, under Settings, click Shared access policies. |
15 |
Click the name of a policy. |
16 |
Click Copy (
|
17 |
Click .Write down the following value or copy it to the clipboard. This is your consumer group name.
|
18 |
In the left pane, click Overview. |
19 |
Click Copy ( ![]() This is your event hubs topic name. |
What to do next
See Create a Microsoft Azure AD (SAML) Realm for Passive Authentication.