To complete the below procedure, you require a SAC admin and an Azure AD administrator able to grant permissions.

Part 1: Azure AD:

  1. Log in to your Azure AD as an administrator, navigate to Azure Active Directory and select app registration. 
  2. Click the +new registration button.
  3. Enter a meaningful name for your application and add the following redirect URI:
    https://login.luminatesec.com/login/callback
    There are additional environments that may vary in suffix, the above url will match a tenant in the *luminatesec.com domain. If your tenant's suffix is different, change the suffix in the above URL to take it into consideration.
  4. Click register.
  5. Select the newly created application and go to the next step.
  6. Next, configure the API permissions:
  7. Click add a permission:
  8. Go to Microsoft Graph:
    The permission levels are divided between Delegated and application, look for the appropriate container and in it look for the appropriate permission level
    Below is the necessary permission level for a working integration:

    Select the type of permission and start typing the name, you will see the permission and will be able to select it:
  9. Once you've finished adding all the appropriate permissions be sure to click the "grant admin consent for Luminate Security" if the button is grayed out, your permission level for Azure is insufficient.
  10. Once granted all of the pending permissions will turn to Granted:

  11. Next, let's create a client Secret:
  12. Click the Certificates & secrets option
  13. Click the New client secret and the below will pop up:
  14. Provide a name and save, write the client secret aside.
  15. Next, go to the overview tab and copy the Application (client) id

    Your Azure AD is now configured!!
  16. Next, log in to your SAC tenant and navigate to the admin portal.
  17. Under Settings, Identity providers, select New and choose Azure AD
  18. Provide a meaningful name for the integration and your domain name.
  19. Paste the Application ID and Secret created in the previous steps from Azure AD.
  20. Save and continue

    The Domain alias will indicate to your secure Access tenant that the user trying to log in is managed by Azure AD.
  21. Click Save and continue.