This article explains how you can integrate Timus with Microsoft Entra ID to enable users to sign in to your corporate network using their Microsoft Entra ID(Azure AD) account credentials.
- Click on Microsoft Entra ID under the heading Microsoft Entra ID Services on the Homepage or select Microsoft Entra ID from the left Portal Menu of the Microsoft Entra ID Portal.

- Select App Registrations from the menu on the left of the open page. Click + New registration.


- Enter a user-facing display name for Timus apps.
- Choose the most suitable option for your account from first three supported account types.
- Accounts in this organizational directory only (Default Directory only - Single tenant)
- Accounts in any organizational directory (Any Microsoft Entra ID directory - Multitenant)
- Accounts in any organizational directory (Any Microsoft Entra ID directory - Multitenant) and personal Microsoft accounts (e.g., Skype, Xbox)

-
For Redirect URL, choose a platform. In Timus's case, it would be the Web option. After that, enter this link: https://auth.timuscloud.com/user/externalClick the Register button.
- After you click the register button, you have successfully created a new application on Microsoft Entra ID.
- The opened page displays on the screen with Tenant ID and Client ID, which you need to enter the Microsoft Entra ID Configuration screen on Timus Manager.
-
The opened page displays on the screen with Tenant ID and Client ID, which you need to enter the Microsoft Entra ID Configuration screen on Timus Manager.
- For Client Secret, you see Certificates and Secrets at the far left of the Timus page on the Microsoft Entra ID portal.
- Please click on it and go to this Certificates and Secrets page.

- On this page, click on + New Client Secret.

- The Add a Client Secret popup is on the screen.
- Enter a name for the new client secret you are about to create here. Choose an expiration date, which is recommended to be 730 days (24 months) by us.

- Click Add.

- After clicking Add, you will see Client Secret Value on the page.

Please note that Delegated: User.Read permission has to be granted by default. Otherwise, the sync cannot be done successfully.
- Click App Registrations from the shortcut list on the left of the Dashboard.
- Click on the app you created for Timus on the page.
- Click on API Permissions that you will view on the left of the page that opens.

- Select Application Permissions.

- Click User from the list under the Select Permissions heading and check User.Read.All.

- Then, click Group from the list and check Group.Read.All.

- Click the Add Permissions button.
- Grant Admin Consent for Default Directory from the same screen for your added API permissions.

- Go to Timus Manager -> Settings -> Integrations -> Microsoft Entra ID -> Enable screen.

- Copy and Paste Tenant ID, Client ID, and Client Secret Value you have created into the empty fields on the Microsoft Entra ID Integration screen.
- Click Confirm.

- Enable Synchronization ON from the Preferences.
- Under Mapping, Choose the Microsoft Entra ID groups you want to synchronize. Users in the groups you choose will be added to the Microsoft Entra ID Users team on Timus.
- Click Confirm.
- You can change your Microsoft Entra ID credentials from the Configuration page.
- You can disable the integration with the Disable Integration button from the Integrations page.
WARNING: The Security Group names in Entra ID must not exceed 29 characters; otherwise, they cannot be tagged in Timus Manager.
Adding users via integration does not generate the email chain that provides a download link for your users. The download files are available via the links found under settings in the manager, also via my.timusnetworks.com for the users to download. Additionally, you can utilize an RMM tool to silently deploy the agent on both Windows and Apple iOS operating systems.
0 comments
Please sign in to leave a comment.