Important Information for CSP Microsoft Integrations
Table of Contents
This document describes some important prerequisites as well as the steps for configuring your Cloud Solution Provider (CSP) Microsoft 365 Tenant for integration with Syncro. (For the Syncro-specific integration steps, see Integrate With Microsoft.)
You can either integrate:
- Your Microsoft Tenants in bulk through your CSP Microsoft 365 Tenant credentials and Microsoft Granular Delegated Admin Privileges (GDAP) relationships, or
- Each Microsoft Tenant as a Single Tenant using a unique Global Administrator account for each individual Microsoft 365 Tenant.
CSP Integration Prerequisites
Connecting to Microsoft 365 Tenants through a CSP Microsoft 365 Tenant requires specific authenticating user requirements and Microsoft 365 customer tenant relationships with specific GDAP roles.
The authenticating user must:
- Be a CSP Microsoft 365 Tenant Global Administrator,
- Have AdminAgent privileges,
- Be a member of the AdminAgents Security Group,
- Be a member of the Security Group associated with the appropriately privileged GDAP relationships with the Microsoft 365 Tenant, and
- Be prompted by Entra ID MFA when authenticating. (Microsoft does not allow access to Microsoft 365 Tenants via GDAP using third-party MFA applications.)
Each Customer Microsoft 365 Tenant must have:
- A Customer GDAP relationship,
- A CSP Microsoft 365 Tenant Security Group with the appropriate roles assigned.
- A GDAP relationship with either a Global Administrator privilege or ALL 12 specific privileges assigned.
Tip: You only need to enable a Customer GDAP relationship for the Microsoft 365 Tenants you want to integrate. For example, if your CSP Microsoft 365 Tenant can access 100 Customer Microsoft 365 Tenants and you only want to integrate 75, you'll need to create a Customer GDAP relationship with the desired 75 Microsoft 365 Tenants.
Step 1: Create the Syncro Service Account
First, create the Syncro Service Account so you have an authenticating user that works for the Syncro-Microsoft integration. Follow these steps:
- Log into the Microsoft Entra Amin Center.
- From the “+ Add” menu, select User > Create New User:
- Enter an easily identifiable User Principal Name (e.g., Syncro_Integration).
- Enter an easily identifiable Display Name (e.g., Syncro Integration Account).
- Uncheck Auto-generate Password box. Set a strong Password and save it in a secure location (e.g., a password manager):
- Click Next: Properties.
- Add any desired additional information for this account.
- Click Next: Assignments.
- Click “+ Add Group.”
- Check the box for the AdminAgents group, then click Select:
- Click “+ Add Role.”
- Search for and check the box for the Global Administrator role. Then click Select:
- Click Next: Review + Create.
- Click Create.
Step 2: Configure MFA for the Syncro Service Account
Microsoft requires Entra ID MFA enforcement to access Customer tenants using GDAP relationships. There are two ways to enforce MFA, depending on your Microsoft 365 licensing.
Conditional Access Policy (Recommended)
Note: You can configure the Conditional Access policy for the Syncro Service Account in accordance with your security policies; however, MFA should always be required.
Assign the Syncro Service Account to a Policy That Requires MFA
- Log into the Microsoft Entra Amin Center.
- In the left navigation, expand the Protection section and then select Conditional Access.
- First, exclude the Syncro Service Account from all existing policies:
- From the inner side panel, click Policies.
- Click the Policy Name for a Conditional Access policy shown at the bottom:
- Click the hyperlinked text in the Users section.
- Select the Exclude subtab.
- Check the Users and Groups box.
- Search for and select the Syncro Service Account.
- Click Select.
- Appropriately handle the “Don’t lock yourself out message!”
- Click Save.
- Repeat steps a through j for each Conditional Access policy.
- Next, create a new Conditional Access policy:
- From the inner side panel, click Policies.
Tip: Click the “Conditional Access | Policies” breadcrumb at the top of the page: - Click “+ New Policy.”
- Enter a Name for the policy (e.g., Syncro Service Account MFA Policy).
- Click the hyperlinked text in the Users section.
- Select the Include subtab.
- Select the “Select Users and Groups” radio button, then check the Users and Groups box:
- Search for and select the Syncro Service Account.
- Click Select.
- Click the hyperlinked text in the Access Controls > Grant section:
- In the right side panel, select the “Grant Access” radio button, then check the Require MFA box:
- Click Select.
- Click Create.
- From the inner side panel, click Policies.
Set the Session Sign-in Frequency
To set the session sign-in frequency, follow these steps:
- Click the hyperlinked text in the Access Controls > Session section.
- Check the Sign-in Frequency box, then select the “Every Time” radio button.
- Click Select.
- Toggle the “Enable Policy” to the On position.
- Click Create.
Security Defaults
We strongly recommend you follow the steps to configure MFA using a conditional access policy as described above. However, if that's not possible, follow these steps:
- Log into the Microsoft Entra Amin Center.
- From the Overview section, select the Properties tab:
- At the bottom of the screen, click the "Manage Security Defaults" link.
- From the Security Defaults dropdown menu, select Enabled:
Step 3: Configure Customer GDAP Relationships
Now you can configure GDAP:
- For individual Customers using Microsoft Partner Center.
- For any or all Customers using Microsoft Lighthouse.