Collect Azure AD Organizational Context data
This document explains how to collect Microsoft Entra ID (formerly Azure Active Directory) organizational context data by setting up a Google Security Operations feed using the Third Party API.
Azure AD Organizational Context provides directory information such as users, groups, and devices from your Microsoft Entra ID tenant. This is not event or log data — it is a periodic snapshot of directory state that enriches other log types in Google SecOps with identity context.
Before you begin
Ensure that you have the following prerequisites:
- A Google SecOps instance
- Privileged access to the Microsoft Azureportal
- One of the following roles for granting admin consent:
- Global Administrator- can grant consent for any permission, for any API
- Privileged Role Administrator- can grant consent for any permission, for any API
Configure IP allowlisting
Before creating the feed, you must allowlist Google SecOps IP ranges in your Microsoft Azure network settings or Conditional Access policies.
Get Google SecOps IP ranges
- Go to SIEM Settings > Feeds.
- Click Add New Feed.
- Note the IP ranges displayed in the feed creation interface.
- Alternatively, retrieve IP ranges programmatically using the Feed Management API .
Configure Conditional Access for workload identities (if required)
If your organization uses Conditional Access policies that restrict access by location:
- In the Microsoft Entra admin center, go to Protection > Conditional Access > Named locations.
- Click + New location.
- Provide the following configuration details:
- Name: Enter
Google SecOps IP Ranges. - Mark as trusted location: Optional, based on your security policy.
- IP ranges: Add each Google SecOps IP range in CIDR notation.
- Name: Enter
- Click Create.
- Go to Conditional Access > Policies.
- For any policies that apply to workload identities, configure an exclusion for the
Google SecOps IP Rangesnamed location or the specific service principal.
Configure Microsoft Entra app registration
Create app registration
- Sign in to the Microsoft Entra admin center or Azure portal .
- Go to Identity > Applications > App registrations.
- Click New registration.
- Provide the following configuration details:
- Name: Enter a descriptive name (for example,
Google SecOps Azure AD Context Integration). - Supported account types: Select Accounts in this organizational directory only (Single tenant).
- Redirect URI: Leave blank (not required for service principal authentication).
- Name: Enter a descriptive name (for example,
- Click Register.
- After registration, copy and save the following values:
- Application (client) ID
- Directory (tenant) ID
Configure API permissions
The integration requires the following Microsoft Graph application permissions to read directory objects:
- In the app registration, go to API permissions.
- Click Add a permission.
- Select Microsoft Graph > Application permissions.
- Search for and select the following permissions:
- Directory.Read.All- Required to read directory data (users, groups, organizational structure).
- User.Read.All- Required to read user profile data.
- Group.Read.All- Required to read group membership data.
- Device.Read.All- Required to read device information.
- Click Add permissions.
- Click Grant admin consent for [Your Organization].
-
Verify that the Statuscolumn shows Granted for [Your Organization]for all permissions.
Permission Type Description Directory.Read.AllApplication Read directory data User.Read.AllApplication Read all users' full profiles Group.Read.AllApplication Read all groups Device.Read.AllApplication Read all device information
Create client secret
- In the app registration, go to Certificates & secrets.
- Click New client secret.
-
Provide the following configuration details:
- Description: Enter a descriptive name (for example,
Google SecOps Feed). - Expires: Select an expiration period.
- Description: Enter a descriptive name (for example,
-
Click Add.
-
Copy the client secret Valueimmediately.
Set up feeds
There are two different entry points to set up feeds in the Google SecOps platform:
- SIEM Settings > Feeds > Add New Feed
- Content Hub > Content Packs > Get Started
Configure a feed in Google SecOps to ingest Azure AD organizational context data
- Click the Azure Platformpack.
- Locate the Azure AD Organizational Contextlog type.
-
Specify values for the following fields:
- Source Type: Third party API (recommended)
- OAuth Client ID: Enter the Application (client) IDfrom the app registration.
- OAuth Client Secret: Enter the client secret valueyou copied earlier.
- Tenant ID: Enter the Directory (tenant) IDfrom the app registration in UUID format (for example,
0fc279f9-fe30-41be-97d3-abe1d7681418). - Retrieve devices: Select whether to retrieve device information within user context. Set to Trueto include device data.
- Retrieve groups: Select whether to retrieve group membership information within user context. Set to Trueto include group data.
-
API Full Path: Microsoft Graph REST API endpoint URL:
graph.microsoft.com/beta -
API Authentication Endpoint: Microsoft Active Directory Authentication Endpoint:
login.microsoftonline.com
Advanced Options:
- Asset namespace: The asset namespace .
- Ingestion labels: The label to be applied to the events from this feed.
-
Click Create feed.
After creating the feed, context data will be retrieved periodically. It may take up to 24 hours for the initial directory snapshot to appear in Google SecOps.
For more information about configuring multiple feeds for different log types within this product family, see Configure feeds by product .
For more information about Google Security Operations feeds, see Google Security Operations feeds documentation . For information about requirements for each feed type, see Feed configuration by type . If you encounter issues when you create feeds, contact Google Security Operations support .
Regional endpoints
For Microsoft Entra ID deployments in sovereign clouds, use the appropriate regional endpoints:
| Cloud Environment | API Full Path | API Authentication Endpoint |
|---|---|---|
|
Global
|
graph.microsoft.com/beta
|
login.microsoftonline.com
|
|
US Government L4
|
graph.microsoft.us/beta
|
login.microsoftonline.us
|
|
US Government L5 (DOD)
|
dod-graph.microsoft.us/beta
|
login.microsoftonline.us
|
|
China (21Vianet)
|
microsoftgraph.chinacloudapi.cn/beta
|
login.chinacloudapi.cn
|
Need more help? Get answers from Community members and Google SecOps professionals.

