Skip to main content

Using Basic Authentication with Microsoft Entra ID

With basic authentication, your Microsoft Entra ID organization will be accessed on behalf of a user. You will need to provide user name and password in the monitored item properties. Auditor will use this account to access the Microsoft Entra ID organization, automatically create an Microsoft Entra ID app with required permissions, and perform initial data collection. For that, the user account will need an administrative role in the cloud-based infrastructure.

Further permission assignment will depend on the data you plan to collect:

  • To collect activity data including logon attempts, the administrative role is required, as well as the Premium Plan license.
  • To collect activity data without logons, the privileged role can be revoked from the specified account after the initial data collection. Ongoing audit data collection will leverage Microsoft APIs access permissions granted to Microsoft Entra ID app and, therefore, requires no tenant-level administrative permissions.

Required Roles and Permissions

To...RequirementComment
Create Microsoft Entra ID application, run initial data collection, and perform Auditor upgrade from previous versionAny of the following role combinations: - Application Administrator & Privileged Role Administrator OR - Cloud Application Administrator & Privileged Role Administrator OR - Global AdminPrepare a user account and specify it in the monitored item properties. See the and Microsoft Entra ID topics for additional information.
Collect audit data, including Successful Logons and/or Failed Logons- Security Reader OR - Security Administrator OR - Application Administrator OR - Cloud Application Administrator OR - Global AdministratorTo assign the non-privileged role, see
Collect audit data (without logons)Any of the following roles: - Security Reader OR - Application Administrator OR - Cloud Application Administrator OR - Global AdminAssign the role you need, as explained above.

Assigning a Privileged Role for Microsoft Entra ID and Office 365

When configuring a monitored item for Microsoft Entra ID (formerly Azure AD) or Office 365 auditing with basic authentication, specify a data collecting account that has sufficient privileges in Microsoft Entra ID. This account should be able to create a dedicated application in your Microsoft Entra ID domain. Depending on your requirements and company policies, you can select one of the following approaches:

  • Assign a privileged role (for example, Application Administrator & Privileged Role Administrator) to the account, then revoke it after the application creation and initial data collection, and assign a less-privileged role to this account (for example, Security Reader).
  • Use the account with a privileged role on a regular basis. Any additional role assignments will not be necessary in this case. If you select this method, contact your security administrator to avoid violations of security policies in your organization.

NOTE: If you previously used a non-privileged account for Microsoft Entra ID data collection in your Netwrix Auditor, consider that after the upgrade you will have to perform the role assignment procedure again, selecting one of these approaches. Until then, data collection will not be performed.

Follow the steps to assign a privileged role to the account.

Step 1 – Sign in to Microsoft Entra ID portal using your Microsoft account.

Step 2 – Select Microsoft Entra ID on the left.

Step 3 – Select the account that you want to use as data collecting account, or create a new user.

Step 4 – Make sure you have disabled multi-factor authentication for this account.

Step 5 – Expand Directory role and select the role you need (for example, Global admin or any other privileged role).

Remember, In Microsoft Graph API, Microsoft Entra ID Graph API, and Microsoft Entra ID PowerShell, the Global admin role is identified as Company Administrator.

Step 6 – Click OK.

Step 7 – In Auditor, create a monitoring plan for auditing Microsoft Entra ID and specify this account with this privileged role on the Specify the account for collecting data step.

Step 8 – Wait until initial data collection completes.

Step 9 – Open Microsoft Entra ID portal and remove the privileged role from the account.

Step 10 – Assign a less-privileged role to this account.

A less privileged role has now been assigned to the account.

Assigning 'Security Administrator' or 'Security Reader' Role

To audit Successful and/or Failed Logons in Microsoft Entra ID, the Security Administrator or Security Reader role is required. Follow the steps to assign the role you need:

Step 1 – Sign in to Microsoft Entra ID portal using your Microsoft account.

Step 2 – Select Microsoft Entra ID portal on the left.

Step 3 – Navigate to Roles and administrators.

Step 4 – Click the Security administrator or Security Reader role.

Step 5 – Click Add member and select the account that you want to assign the role to.

Refer to the following Microsoft article: Microsoft Entra built-in roles for additional information on the Administrator role permissions.