Microsoft Azure AD

Configuring Veza and your Azure tenant for connection to Azure Active Directory

Veza discovers Authorization metadata for Azure Active Directory, including roles, groups, users, and service principals, for any Microsoft Azure tenant configured as a Cloud Provider.

If your organization only utilizes Azure AD, and doesn't require Veza discovery of entities such as storage resources, virtual machines, or SQL databases, you can disable those services and data sources when editing or adding an Azure integration.

Veza can optionally gather and show custom security attributes on Azure AD objects. To enable this, the Enterprise Application used by Veza to connect must have the CustomSecAttributeAssignment.Read.All Microsoft Graph permission. These attributes must be specified in the Azure tenant configuration.

Last updated