Use this article to integrate Lifecycle Manager with Microsoft Endpoint Manager. Two configured applications are required to grant access to the device and software information of your tenant and your customer tenants, in order to integrate Microsoft Endpoint Manager with Lifecycle Manager.
Known limitation with indirect or unmanaged resellers |
Prerequisites
To use either Microsoft Endpoint Manager integration, users will need:
Work (or school) accounts from Microsoft. This includes organizations that use Office 365
An active Intune subscription
Administrator user credentials for Microsoft Azure, and Microsoft Partner.
Administrator user credentials for Lifecycle Manager or member permissions of Manage Sync Settings selected
Access to the App Management module
Microsoft Partner application setup
Granting Partner application process
If you can access the App Management module (Steps 1 - 3), you have the access to the API required for a multi-tenant integration. The multi-tenant integration cannot be completed if the App Management module is not visible. To continue, you are able to set up multiple instances of a Microsoft Endpoint Manager single-tenant integration.
In order to enable multiple instances of Microsoft Endpoint Manager single-tenant integration, please contact success@scalepad.com. |
Sign in to your Microsoft Partner Center Dashboard using a global administrator account.
From the Settings menu (gear icon), select Account settings.
On the Account settings page, choose App management.
If
You do not have an existing web app registered:
Add a new web app
You have an existing web app registered:
Choose the Add key button
The keys are in the table below the app details. Copy the app registration details:
App ID / Client ID
Account ID / Tenant ID
Key / Client secret
Important The Key value is not retrievable after navigating away from the page, so please ensure it is recorded in a safe place. |
Configuring Partner application permissions
Sign in to Azure AD from the Azure portal using a global administrator account.
From the Azure Directory admin center, navigate to Azure Active Directory > App registrations > All applications.
Select the application that is registered to the Partner Center in the previous step by using the App Name. By default, this may be called Partner Center Web App.
Navigate to the API permissions section
Ensure that the application has the delegated permissions with admin consent (if this is not the case, see below):
Azure Active Directory Graph
Directory.AccessAsUser.All
User.Read
Microsoft Partner Center
User_impersonation
Grant the following application permission to:
Azure Active Directory Graph
Directory.Read.All
If the application does not have the delegated permissions:
Click the add a permission button
In the Request API permissions screen, select APIs my organization uses
Select Windows Azure Active Directory, and then Delegated Permissions
Search and select: User.Read
Search and select: Directory.AccessAsUser.All
Search and select: user_impersonation
Click Add permissions
Click Grant admin consent
Microsoft Lifecycle Manager application setup
Creating the Lifecycle Manager application setup
We recommend creating a dedicated application that Lifecycle Manager uses to access device and software information.
Sign in to Microsoft Azure as a global administrator
From the Azure Directory admin center, navigate to Azure Active Directory > App registrations
Click the +New Registration button
Enter a user-facing display name for the new application registration (for example, Lifecycle Manager MEM Integration).
Under Supported account types, make sure Accounts in any organizational directory (Any Azure AD directory – Multitenant) is selected. The rest of the defaults for registration should be left as is.
Click Register to create the application
Under your newly created application, take note of the Application (client) ID and the Directory (tenant) ID.
Tracking Microsoft Defender for Endpoint through Microsoft Endpoint Manager
If you have assets with Windows Defender for Endpoint that you want to track, you have to add API permissions through Microsoft Endpoint Manager so that we can provide reporting on endpoint protection by consuming windows defender information through Microsoft Endpoint Manager.
Here are the steps to track Microsoft Defender for Endpoint through Microsoft Endpoint Manager.
Click the add a permission button
In the Request API permissions screen, select APIs my organization uses
Manually type in WindowsDefenderATP, select WindowsDefenderATP, and then Application Permissions
Search and select: Machine
5. Search and select: Machine.Read.All
6. Click Grant admin consent
Ensure that the Include Microsoft Defender for Endpoint option is selected when setting your sync settings for Microsoft Endpoint Manager - Multi-Tenant.
When adding the Microsoft Endpoint Manager integration to Lifecycle Manager, you will need to add the Application (client) ID and Directory (tenant) ID to the Microsoft Endpoint Manager add integration page. |
Configuring Lifecycle Manager application permissions
Users/admins are required to grant permissions to applications before they can call APIs. For full functionality, the following permissions are required:
Organization.Read.All
DeviceManagementManagedDevices.Read.All
DeviceManagementApps.Read.All
Navigate to the *API permissions* section
Click the Add a permission button
In the Request API permissions screen, select Microsoft Graph and then select Application permissions
In the Select permissions section, click the arrows next to *DeviceManagementManagedDevices*, *DeviceManagementManagedApps*, and *Organization* to expand each section or start typing the permission to filter the results.
* In the *DeviceManagementManagedApps* module, select the DeviceManagementApps.Read.All.
In the DeviceManagementManagedDevices module, select the
DeviceManagementManagedDevices.Read.All.
In the Organization module, select the Organization.Read.All.
Click Add permissions
After selecting Add permissions, we will need to add administrator consent. This is done by selecting Grant admin consent.
(Optional) Grant the following application permission to: - Only applicable if you want to track Microsoft Defender for Endpoint through Microsoft Endpoint Manager.
Machine
Machine.Read.All
After adding permissions, you need to add administrator consent for each permission name. |
Configuring Lifecycle Manager application process:
Navigate to the Azure Active Directory > Groups section
Search for AdminAgents, and then select it. The name must only be AdminAgents
Navigate to the Members section for the group
Select Add members, and search for the Lifecycle Manager application that was created (e.g. Lifecycle Manager MEM Integration), then click Select.
Granting Lifecycle Manager application access
Client secrets, also known as application passwords, are secret strings that the application uses to prove its identity when it requests a token.
Navigate to the Certificates & secrets section
In the Client secrets section, click the New client secret button
Add a description for the client secret. After entering a description, we recommend leaving the default expiry settings to 6 months.
Click the Add button.
Take note of the Secret ID, as this value is required when adding the integration to Lifecycle Manager.
Why 6 months for expiry? |
Note: Keep the Client secret value in a secure location, because this value is not recoverable once navigating away.
Adding Lifecycle Manager integration
Navigate to the Microsoft Endpoint Manager Multi-Tenant add integration page and fill in the following information gathered previously, mapping to the following fields:
Microsoft Partner Account ID --> Azure Tenant ID
Microsoft Partner App ID --> Partner Application (client) ID
Microsoft Partner App Key --> Partner Application Client Secret
Microsoft Lifecycle Manager App ID --> ScalePad Application (client) ID
Microsoft Lifecycle Manager App Key --> ScalePad Application Client Secret
Click Save Microsoft Endpoint Manager Setup
When you click Save Microsoft Endpoint Manager (Multi-Tenant) Setup, Lifecycle Manager performs a full sync. When finished, you should be able to view your hardware assets in your account, as well as any software assets.