Configuring an Azure AD or Entra ID Password Changer
The built-in templates use Microsoft Graph in Entra ID (Azure AD). The password changer works based on a combination of items including:
- Entra ID tenant ID.
- Client ID (originates from an app registration in Azure AD or Entra ID).
- Client secret (originates from an app registration in Azure AD or Entra ID).
- Username of the managed user in UPN format (username@domain).
- Password of the managed user.
- New password of the managed user generated by the Secret Server password changer.
The built-in templates are designed to perform the password change as the application registration itself, in order to facilitate managing MFA-protected accounts. The heartbeat functionality is designed for both MFA and non-MFA protected accounts using error-handling logic.
Requirements
-
A valid Entra ID tenant.
-
A dedicated app registration for the password changer:
- See Register an application with the Microsoft identity platform for more information on creating an app registration. See Task 1: Creating an App Registration for details.
- Azure Application Registration template to store application registration information in secret-server. This comes with the out-of-the-box integration.
- Entra ID User Account template to store Entra ID secrets. This also comes with the out-of-the-box integration.
-
The username should be stored in UPN format (username@domain.com) for the password changer to function.
-
User Administrator permissions are needed to configure Entra ID RPC.
Task 1: Creating an App Registration
The application registration provides the password changer with the permissions to perform the password change. The following steps are required to create the application registration:
-
Log into the Entra ID or Azure AD Portal (https://portal.azure.com).
-
Navigate to Microsoft Entra ID.
-
Navigate to App Registrations.
-
Click New Registration.
-
Provide a name for the application registration. You will need this name later in the instruction.
-
Select the account type (single tenant or multi-tenant).
-
Optionally, provide a redirect URI.
-
Click Register. Make note of the application (client) ID, which is required when creating the corresponding secret in secret-server.
-
While still on the App Registration page, navigate to Manage > Certificates & Secrets.
-
Click New Client Secret.
-
Provide a description for the client secret.
-
Select an expiration date.
-
Click Add.
Make note of the client secret value, which is required when creating the corresponding secret in Secret Server. -
Navigate to API Permissions.
-
Check if the following API permission is assigned: User.Read. If not assigned add the permission by:
-
Clicking Add a Permission.
-
Selecting Microsoft Graph.
-
Selecting Delegated Permissions.
-
Choosing the User.Read permission.
-
-
Click on Grant Admin Consent for the respective tenant button. This completes the creation of the application registration.
Task 2: Providing the Password Changer App the Permissions to Manage Users
- If necessary, log into the Azure Portal (https://portal.azure.com)
- Navigate to Microsoft Entra ID.
- Navigate to Manage > Roles and Administrators.
- In the search bar, search for the role (such as Global Administrator). We recommend the Privileged Authentication Administrator role.
- Click the role name in the resulting list.
- Click Add Assignments.
- Search for and select the previously created application registration.
- Click Add.
Task 3: Creating an Azure App Registration Secret in secret-server
-
Log into secret-server or platform.
-
Navigate to Secrets.
-
Click Create Secret.
-
Select the template to store the application registration information (Azure Application Registration).
-
Fill out the required fields with the information from the application registration:
- Secret Name (for example, Delinea Entra ID Password Changer).
- Client ID.
- Client Secret, which you created earlier when creating the app registration (recorded in an task earlier step).
- Tenant ID, which you can retrieve from Entra ID, specifically, the Directory (tenant) ID property.
- Application ID, can be added to the notes for reference. You can retrieve this ID from the Application Registration > Application (client) ID (noted down in an task earlier step).
-
Click Create Secret.
Task 4: Associating the Privileged Account with the Entra ID Account Secret
To correctly use the password changer, the privileged account must be associated with the Entra ID User Account secret:
- Log into secret-server or platform.
- Navigate to Secrets.
- Locate your secret(s) based on the Entra ID User Account template.
- Click on the secret.
- Click Remote Password Changing.
- Select Privileged Account Credentials on the Change Password Using selection button.
- Click No Secret Selected. A list of eligible secrets appears.
- Search for and select the earlier-created Azure Application Registration secret.
- Click Save.
Task 5: Testing the Configuration
If all went well, you now should have:
- A secret in secret-server for the application registration.
- An Entra ID User Account secret (not covered in this guide).
- The application registration secret associated with the Entra ID User Account secret.
To test the configuration, you can start with performing a heartbeat on the Entra ID User Account secret:
- Log into secret-server.
- Navigate to Secrets.
- Locate your secret based on the Azure AD Account template.
- Click the secret.
- Click Heartbeat. After a few moments the heartbeat should complete successfully.
To further test the configuration, you can change the password of the Entra ID User Account secret:
- Log into secret-server.
- Navigate to Secrets.
- Locate your secret based on the Entra ID User Account template.
- Click the secret.
- Click Change Password Now.
- Select Randomly Generated or Manual (and enter a password).
- Click Change Password.