Skip to main content

Capabilities

ResourceSyncProvision
Accounts
Groups*
Enterprise applications
Directory roles
Licenses
Managed identities
The Entra ID connector supports automatic account provisioning and deprovisioning. When a new account is created by C1, the account’s password will be sent to a vault.

Account creation fields

The following fields are available when provisioning a new Entra ID user account:
FieldRequiredDescription
displayNameYesThe name to display for the user
mailNicknameYesThe mail alias for the user
userPrincipalNameYesUPN in RFC 822 email format (e.g., user@domain.com)
accountEnabledNoWhether the account is enabled on creation. Defaults to true
onPremisesImmutableIdNoRequired only when a federated domain is used for the UPN
givenNameNoThe user’s first name
surnameNoThe user’s last name (family name)
employeeIdNoEmployee identifier assigned by the organization (max 16 characters)
jobTitleNoThe user’s job title
departmentNoThe department the user works in
managerNoManager identifier: Entra object ID (GUID), UPN, or employee ID
additionalAttributesNoJSON object of additional Microsoft Graph user properties (see below)
If manager resolution fails, the user is still created and a warning is logged. The additionalAttributes field accepts a JSON string containing any writable Microsoft Graph user property. For example: {"city":"Springfield","usageLocation":"US","companyName":"SNPP"}. This field cannot override any of the explicitly named fields listed above.
Tip: If you plan to assign licenses to the user (either directly or via a group), include usageLocation in additionalAttributes. Microsoft requires a usage location before a license can be assigned.
*Due to limitations of the Microsoft Graph API and Office 365 Exchange Online API, the connector cannot provision Mail Enabled Security groups or Distribution groups using OAuth.

Connector actions

Connector actions are custom capabilities that extend C1 automations with app-specific operations. You can use connector actions in the Perform connector action automation step.
Action nameAdditional fieldsDescription
enable_useruser_id (string, required)Enables a disabled Microsoft Entra user account
disable_useruser_id (string, required)Disables an active Microsoft Entra user account
update_useruser_id (string, required)
user_profile (JSON string, required)
Updates user account attributes including profile information, employment details, and contact information
set_manageruser_id (string, required)
manager_identifier (string, optional)
Sets or updates a user’s manager relationship. Accepts manager ID, UPN, or Employee ID. Leave manager_identifier empty to remove the current manager.
check_upnproposed_upn (string, required)Checks if a User Principal Name (UPN) is available. If taken, finds an available UPN by appending incrementing numbers.
update_profileuser_id (string, required)
Plus optional profile fields
Updates user profile attributes including mail, displayName, jobTitle, employeeId, department, companyName, country, and extensionAttribute1 through extensionAttribute15.
create_groupdisplayName (string, required)
group_type (string, required): security or microsoft_365
mailNickname (string, optional): auto-generated from display name if omitted
description (string, optional)
isAssignableToRole (bool, optional): security groups only
owner (resource ID, optional): initial group owner
userMembers (resource ID list, optional): initial group members
Creates a new Entra ID group. Supports security and Microsoft 365 (unified) group types with assigned membership. Requires the Group.Create permission.

Gather Entra ID credentials

Configuring the connector requires you to pass in credentials generated in Entra ID. Gather these credentials before you move on.
If you prefer to set up a cloud-hosted Entra ID connector using OAuth, skip ahead to the OAuth tab below.
A user with the Global Administrator permission in Entra ID must perform this task.

Create a new Entra application

1
In Entra admin center, navigate to App registrations.
2
Click + New registration.
3
Give the application a name, such as “C1”, and select the supported account type relevant to your Entra installation. You do not need to set a redirect URL.
4
Click Register.
5
The new app is created. Carefully copy and save the Application (client) ID and the Directory (tenant) ID shown on the application summary page.
6
Next, we’ll generate a client secret for this app. Click Certificates & secrets.
7
Click + New client secret.
8
Give the client secret a description and set its expiration.
9
Click Add.
10
The client secret is generated. Carefully copy and save the Secret Value.

Give the new Entra app API permissions

1
Click API permissions.
2
Click + Add permissions > Microsoft Graph.
3
Click Application permissions. Select each permission in the relevant set below:To sync access data:
Application.Read.All
AuditLog.Read.All
Directory.Read.All
Group.Read.All
GroupMember.Read.All
MailboxSettings.Read
RoleAssignmentSchedule.Read.Directory
RoleEligibilitySchedule.Read.Directory
RoleManagement.Read.All
RoleManagement.Read.Directory
RoleManagementAlert.Read.Directory
RoleManagementPolicy.Read.AzureADGroup
RoleManagementPolicy.Read.Directory
ServicePrincipalEndpoint.Read.All
User.Read.All
User.ReadBasic.All
To sync access data and provision/deprovision access:
Application.ReadWrite.All
AppRoleAssignment.ReadWrite.All
AuditLog.Read.All
Directory.ReadWrite.All
Group.ReadWrite.All
GroupMember.ReadWrite.All
MailboxSettings.ReadWrite
RoleAssignmentSchedule.Read.Directory
RoleEligibilitySchedule.Read.Directory
RoleManagement.Read.All
RoleManagement.ReadWrite.Directory
RoleManagementAlert.Read.Directory
RoleManagementPolicy.Read.AzureADGroup
RoleManagementPolicy.Read.Directory
ServicePrincipalEndpoint.ReadWrite.All
Synchronization.ReadWrite.All
User.ReadWrite.All
User.ReadBasic.All
User.EnableDisableAccount.All 
To deprovision users who have a privileged role assigned to them, the app requires, in addition to the stated permissions, a privileged role such as Global Administrator or Privileged Authentication Administrator.
Optional: To enable group management (creating groups via connector actions), add the following permission in addition to the provisioning permissions above:
Group.Create
This permission is only required if group management is enabled on the connector.
4
Navigate to Identity > Applications > Enterprise applications > All applications.
5
Locate your new C1 app.
If the app doesn’t appear in the list right away, wait a minute and click Refresh.
On the app’s page, click Permissions on the left side.
6
Click Grant admin consent for ….
That’s it! Next, move on to the connector configuration instructions.

Optional: Configure Exchange groups provisioning with client secret-based auth

To set up the connector to support provisioning owners and members to Exchange groups, which are distribution lists and mail-enabled security groups, follow these steps:
1
In the Microsoft Entra Admin Center, navigate to App registrations and click the name of the app you created for this connector.
2
In the application dashboard, click API permissions > Add a permission.
3
Select APIs my organization uses. Search for and select “Office 365 Exchange Online” (the application ID is 00000002-0000-0ff1-ce00-000000000000).
4
Click on Application permissions. Search for and select “Exchange” and enable the Exchange.ManageAsApp permission.
5
Click Add permissions.
6
When prompted to grant admin consent, click Yes.
7
Next, grant global permissions. Navigate to Admin Center > Roles & admins.
8
Search for and select “Exchange Administrator”, then click Add assignments.
9
Click No member selected, then find the application used for this connector on the Enterprise applications tab and click Select.
10
Click Next.
11
On the Settings tab, select Active as the Assignment type.
12
Check Permanently assigned and add a justification, such as:Required to allow the C1 connector to grant and revoke memberships for managed distribution lists and mail-enabled security groups, both managed by Exchange.
13
Click Assign.
That’s it! Your connector is now ready to allow the provisioning of users as owners and members in Exchange groups.

Configure the Entra ID connector

To complete this task, you’ll need:
  • The Connector Administrator or Super Administrator role in C1
  • Access to the set of Entra ID credentials generated by following the instructions above
Follow these instructions to use a built-in, no-code connector hosted by C1.
1
In C1, navigate to Integrations > Connectors and click Add connector.
2
Search for Entra ID and click Add.
3
Choose how to set up the new Entra ID connector:
  • Add the connector to a currently unmanaged app (select from the list of apps that were discovered in your identity, SSO, or federation provider that aren’t yet managed with C1)
  • Add the connector to a managed app (select from the list of existing managed apps)
  • Create a new managed app
4
Set the owner for this connector. You can manage the connector yourself, or choose someone else from the list of C1 users. Setting multiple owners is allowed.If you choose someone else, C1 will notify the new connector owner by email that their help is needed to complete the setup process.
5
Click Next.
6
Find the Settings area of the page and click Edit.
7
Select Client secret.
8
Paste the tenant ID into the Entra tenant ID field.
9
Paste the client ID into the Entra client ID field.
10
Paste the client secret into the Entra client secret field.
11
Optional. Check the box if you want to Skip syncing Active Directory Server groups.
12
Optional. If you enabled Skip syncing Active Directory Server groups in the previous step, you can also enable Include on-premises users in cloud group memberships. This keeps on-premises synced users as members of cloud-native Entra groups. See Hybrid AD configuration below for details. This setting has no effect if Skip syncing Active Directory Server groups is disabled.
13
Optional If you connect to a Microsoft Graph API domain other than graph.microsoft.com, specify your domain in the Microsoft Graph domain field.
14
Optional. To capture Entra usage data, click to enable Fetch user sign-in activity.The usage data feature requires a Microsoft Entra ID P1 or P2 license. Usage data collection is not supported on Microsoft Entra ID Free licenses.
15
Optional. Click to opt into Schedule SCIM provisioning, which forces an Entra SCIM sync when a new entitlement is provisioned for a user in C1.
16
Optional. Click to Disable resource changed event feed. These logs are enabled by default.Make sure to disable this feed if the List directoryAudits API endpoint is not supported in your location.
17
Optional. Click to enable Sync on-premises extension attributes for users if you want to sync on-premises extension attributes.
18
Click Save.
19
The connector’s label changes to Syncing, followed by Connected. You can view the logs to ensure that information is syncing.
That’s it! Your Entra ID connector is now pulling access data into C1.

Hybrid AD configuration

Organizations that use Microsoft Entra Connect to sync on-premises Active Directory with Entra ID have a mix of cloud-native and on-premises synced objects. The connector provides two settings to control how these are handled:

Skip Active Directory Server groups (--skip-ad-groups / BATON_SKIP_AD_GROUPS)

When enabled, the connector excludes groups that originate from on-premises Active Directory (where onPremisesSyncEnabled is true). Only cloud-native Entra groups are synced. By default, this also filters out on-premises synced users from the membership lists of cloud groups. This means that if a cloud group contains both cloud-native and on-premises synced users, only the cloud-native members will appear as grants. All users (both cloud-native and on-premises synced) are always synced to C1 regardless of this setting. This setting only affects groups and group memberships.

Include on-premises users in cloud group memberships (--include-on-prem-group-members / BATON_INCLUDE_ON_PREM_GROUP_MEMBERS)

This setting modifies the behavior of Skip Active Directory Server groups. When both settings are enabled:
  • On-premises AD groups are still skipped (not synced)
  • On-premises synced users who are members of cloud groups are included in those groups’ membership grants
This is useful in hybrid environments where cloud-native Entra groups contain a mix of cloud and on-premises synced users, and you want full visibility into who has access to what through those cloud groups.
This setting has no effect unless Skip Active Directory Server groups is also enabled. When Skip Active Directory Server groups is disabled, all groups and all their members are synced regardless of this setting.

What’s next?

If Entra ID is your company’s identity provider (meaning that it is used to SSO into other software), the integration sync will automatically create applications in C1 for all of your SCIMed software. Before you move on, review the Create applications page for important information about how to set up integrations with the SCIMed apps.