Skip to main content

Microsoft Entra External Identities

Description

The Microsoft Entra External Identities connector uses the Microsoft Graph API to discover B2B (business-to-business) and B2C (business-to-consumer) guest and external user accounts within an Entra ID (Azure AD) tenant. It enumerates external users, their assigned directory roles, and group memberships to provide visibility into third-party and partner identity sprawl.

System Type Classification

FieldValue
System TypeDirectory Service
Default Scan Priority10

Version Support

OrbisID EditionSupported
CommunityNo
ProYes
EnterpriseYes

Supported Protocol

ProtocolPortNotes
Microsoft Graph API (HTTPS)443 TCPOAuth 2.0 client credentials flow

What OrbisID Discovers

DataSource
External / guest usersGET /v1.0/users?$filter=userType eq 'Guest'
Directory role assignmentsGET /v1.0/directoryRoles/{id}/members
Group membershipsGET /v1.0/users/{id}/memberOf
User enabled/disabled stateaccountEnabled property

Connection Requirements

Required Permissions

Register an application in Microsoft Entra ID and grant it the following application permissions (not delegated):

Minimum permissions:

  • User.Read.All — read all user profiles including guest accounts
  • Group.Read.All — read group memberships
  • RoleManagement.Read.Directory — read directory role assignments

Credential Mapping

OrbisID FieldValue
credential.usernameApplication (Client) ID
credential.passwordClient Secret value
system.tenantIdEntra ID Tenant ID (Directory ID)

Network Requirements

The OrbisID server must have HTTPS access to login.microsoftonline.com and graph.microsoft.com on port 443.

Configuration Steps

  1. In the Azure portal, navigate to Entra ID → App registrations → New registration
  2. Grant the required application permissions and obtain admin consent
  3. Create a Client Secret under Certificates & secrets
  4. Create a Credential in OrbisID:
    • Username: Application (Client) ID
    • Password: Client Secret value
  5. Navigate to Systems → Add System
  6. Fill in the fields:
FieldValue
NameDescriptive name (e.g., Entra External Identities – Contoso)
OS TypeEntraExternalIdentities
System TypeDirectory Service
Tenant IDEntra ID Tenant ID
CredentialThe app registration credential
  1. Click Test Connection
  2. Click Save

Troubleshooting

SymptomLikely CauseResolution
Authentication failedInvalid client ID or secretVerify the app registration credentials in the Entra portal
No guest users returnedFilter issue or no guests presentConfirm guest accounts exist; check userType filter
Insufficient privilegesMissing Graph permissionsEnsure all required permissions have admin consent
AADSTS700016App not found in tenantVerify the Tenant ID and Client ID match