Microsoft Azure integration
Integrate Identity Security Posture Management (ISPM) with Microsoft Azure by assigning a reader role to the ISPM app. The integration allows ISPM to analyze the access to Microsoft Entra ID cloud resources.
Before you begin
Complete the steps in Microsoft Entra ID integration. This is required to integrate ISPM with Microsoft Azure.
Select the assignment scope
You can assign a role to a subscription, management group, or tenant root group. Each assignment scope gives Identity Security Posture Management the same level of access to your Microsoft Entra ID resources.
Assign the role to a subscription
- In the Microsoft Entra ID admin center, go to the Subscriptions panel.
- Select the subscription that you want to associate with the Identity Security Posture Management app.
- Click Access Control (IAM).
- In the Add dropdown menu, select Add role assignment.
- Select the Reader role, and then click Next.
- On the Members tab, assign access to User, group, or service principal, and then click Select members.
- Search for and select the registration app that you created in the Microsoft Entra ID integration task.
- Click Review + assign.
Assign the role to a management group
- In the Microsoft Entra ID admin center, go to the Management Groups panel.
- Select the management group that you want to assign ISPM to.
- Click Access Control (IAM).
- In the Add dropdown menu, select Add role assignment.
- Select the Reader role, and then click Next.
- On the Members tab, assign access to User, group, or service principal, and then click Select members.
- Search for and select the registration app that you created in the Microsoft Entra ID integration task.
- Click Review + assign.
Assign a role to the tenant root group
This method requires you to temporarily elevate your admin role to a user access admin. To avoid this, ISPM recommends that you assign a role to a subscription, or create a management group and then assign the role to it.
- In the Microsoft Entra ID admin center, go to the Microsoft Entra ID panel.
- Select .
- Toggle on Access management for Microsoft Entra ID resources.
- Click Save.
- Refresh the browser for the changes to take effect.
- In the Microsoft Entra ID admin center, go to the Management Group panel.
- Click Tenant Root Group.
- Click Access Control (IAM).
- In the Add dropdown menu, select Add role assignment.
- Select the Reader role, and then click Next.
- On the Members tab, assign access to User, group, or service principal, and then click Select members.
- Search for and select the registration app that you created in the Microsoft Entra ID integration task.
- Click Review + assign.
- Go to and toggle off Access management for Microsoft Entra ID resources.
Enable the integration in ISPM
-
In the Identity Security Posture Management console, go to .
-
Select Azure Cloud, and then click Connect.
-
Select the Related AAD and choose a Source name.
-
Click Add Azure connection.
