Knowledge Base
Auto-Provisioning and Deprovisioning Users from M365 into MSP Process Account Management and Security
Overview:
Onboarding and offboarding employees is something MSPs always look to make as efficient as possible. By taking advantage of Microsoft's support for the SCIM protocol, it's easy to provide your technicians with access to MSP Process simply by adding and removing them from Security Groups in Microsoft 365. This KB article will walk you through the steps you'll need to follow.
Creating the Enterprise Application in Microsoft Azure
- Launch the Azure management portal (https://portal.azure.com)
- Browse to Microsoft Entra ID.
- On the left side select Enterprise applications.
- At the top of the page select + New application.
- Select the + Create your own application.
- Add the name of the application, for instance MSP Process SCIM.
- Select the radio button Integrate any other application you don't find in the gallery (Non-gallery) and click Create.
- On the left side under Manage select Provisioning.
- Again on the left side under Manage select Provisioning.
- Change the Provisioning Mode to Automatic.
- Expand Admin Credentials
Grabbing the Tenant URL and Secret Token from MSP Process
- In a separate browser tab, login to the MSP Process platform (https://app.mspprocess.com) as an Admin-level user
- Navigate to the Settings -> User Management -> SSO page and find the Tenant URL and Secret Token fields.
- Come back to Azure portal
Finishing the Configuration of the Enterprise Application in Microsoft Azure
- In the Admin Credentials section of the Enterprise application, make sure that Authentication Method is Bearer Authentication.
- Paste the found Tenant URL and Secret Token to the fields under Authentication Method.
- Click Test Connection.
- If it’s successful, then Save the configuration.
- Expand the Mappings section.
- Click on Provision Microsoft Entra ID Groups, make it disabled and Save the change.
- Click on Provision Microsoft Entra ID Users.
- Make sure that the following attribute mappings are set:
customappsso Attribute Microsoft Entra ID Attribute
userName userPrincipalName
displayName displayName
externalId objectId
- Click the Add New Mapping button at the bottom of the page
- Configure it as shown below:
- Mapping Type= Expression
- Expression = SingleAppRoleAssignment([appRoleAssignments])
- Target Attribute = roles[primary eq "True"].value
-
- Save the user mappings changes.
- In a new browser tab login to Azure, go to App registrations and find the App Registration that's been created.
- On the left side under Manage select App roles.
- Remove the User role:
- Edit the User role, and uncheck the Do you want to enable this app role? option
- Save the change
- Edit the User role again, and click the Delete button
- Edit the User role, and uncheck the Do you want to enable this app role? option
- Add Admin and Technician roles - both the Display name and the Value here needs to exactly match "Admin" or "Technician", as this is what assigns the user a specific role in MSP Process.
Pushing Users from Microsoft Into MSP Process
- In the other browser tab, where you were editing the Enterprise Application, click on the Manage -> Users and Groups tab.
- Click on + Add user/group.
- Select the security group(s) to be provisioned.
- Select the Role for the group and click Assign.
- On the left side under Manage select Provisioning.
- Click on the Start provisioning button.
Results!
It'll take anywhere from 10-40 minutes for Microsoft to provision users into MSP Process; it depends on how many users you've got in the Security Groups.
If you're interested in how Microsoft describes why provisioning through SCIM can take a bit of time, and what you should expect in your specific circumstance, check out this KB article:
Check the status of user provisioning
You can see how things are going from the Settings -> User Management -> Users page in MSP Process.
Logging in as as Provisioned User
Your technicians just need to click the Microsoft button on the MSP Process login page:
DUO: Securing Logins to the MSP Process Platform Using the DUO Mobile App Account Management and Security
Introduction
DUO (https://duo.com) is a popular identity verification platform. You can use it in MSP Process to acheive two goals:
- To secure the login process of anyone looking to access your MSP Process account at https://app.mspprocess.com. This capability requires the DUO Web SDK to be configured.
- During the end-user verification process; DUO can be used instead of sending the user a verification code via e-mail or SMS. This capability requires the DUO Auth API and Admin API to be configured. Click here for the KB article that outlines how to set this up.
This KB article will take you through all of the steps required to do the first scenario - to use DUO to secure how your technicians login to the MSP Process platform.
Step 1: Configuring the Web SDK Entity in DUO
What is the DUO Web SDK? The Duo Web SDK adds the two-factor authentication screens and workflow to the MSP Process login flow.
How is the Web SDK Used? This module only needs to be setup if you want to use DUO to secure how you and your techs login to the MSP Process platform. It is not required if you only plan on using DUO for End-User Verification.
- Login to the DUO Admin portal (https://admin.duosecurity.com/)
- From the left-hand menu, navigate to Application -> Protect an Application
- Search for "Web SDK" in the Search field
- Click on the Protect button beside Web SDK
- In the Details section, copy the Client ID, Client Secret and API Hostname; you'll need them later
- In the Settings section, change Name field to say "MSP Process"
- Under the Universal Prompt section, choose the Show traditional prompt option
- Click Save
- When prompted, choose No, thanks - you don't want to use the Universal prompt.
Step 2: Integrating MSP Process with DUO
- Login to the MSP Process portal (https://app.mspprocess.com)
- Navigate to Settings -> Integrations -> Security Integrations
- Click the Add new integration button
4. Click the DUO Web SDK button; specify a name, and then enter the Integration Key, Secret Key and API Hostname from Step #2.
5. Click Submit when you're done.
Step 3: Configuring Your MSP Process User Account To Use DUO During The Login Process
- From the MSP Process UI, click on the Profile button in the top right-hand corner of the UI
- Enable the Link DUO feature
- Follow the on-screen prompts from DUO that will link your MSP Process account to DUO
- Once you've gone through the DUO screens, and have been returned to the MSP Process UI, click Submit
Congratulations! You're Done!
You've now setup the required entities in DUO and configured MSP Process with the information it needs to start using DUO to secure the login process to your MSP Process UI.
Roles and Permissions in MSP Process Account Management and Security
Roles:
There are two Roles in MSP Process - Admin, and Technician. By default, users who are invited to the platform are given the Technician role. Here are the differences between the two Roles:
| The Admin Role... | The Technician Role.... |
|
|
Permissions:
There are two permissions that can be applied to any User in MSP Process, regardless of what Role (Admin or Technician) they have been assigned:
- The Use MFA option forces that user to setup MFA
- The Allow Access to UI option offers you two choices:
- If Disabled, the user can only login to the ConnectWise/Halo/Autotask pod, and cannot login to the main https://app.mspprocess.com website
- If Enabled, the user can login to both the ConnectWise/Halo/Autotask pod and the main https://app.mspprocess.com website
Editing The Roles/Permissions of a User:
To edit a user's Role, or the Permissions assigned to that user, navigate to the Teams -> Users page, and in the Actions column click the pencil icon for that user:
You'll then be presented with a screen that will allow you to edit that user's Roles and Permissions:
Using DUO's "Traditional" Login Prompt Account Management and Security
Context:
Recent changes made by DUO have made it so that their Universal Prompt cannot be rendered in an iframe. The main UI of the MSP Process platform is not affected by this change, but our PSA-embedded Pod (ConnectWise and Halo PSA) and Insight (Autotask) are affected, as they are iframes within the UI of those PSA platforms.
This KB article guides you through how to change your DUO configuration for MSP Process to use DUO's "traditional" prompt, which will allow you to continue to securely login to the MSP Process Pod/Insight when you've chosen to use DUO as your MFA provider.
Instructions:
- Login to your DUO admin panel (the URL will be something like https://admin-.duosecurity.com/ )
- Click on the Applications menu
- Find the Web SDK entry for MSP Process, and edit it
- Under the Universal Prompt section, choose the Show traditional prompt option
- At the bottom of the page, click the Save button
Conclusion:
You've now successfully configured your DUO tenant to use their traditional promp for the MSP Process platform. You'll find that your login experience does look different, as DUO's traditional prompt has a different look and feel:
IP Address info for MSP Process Account Management and Security
FQDNs:
If you need to whitelist our IP or domains they are shown below:
IP address for https://app.mspprocess.com and https://pod.mspprocess.com:
20.118.48.12
API / App Bots / Live Chat/ Client Portal Outbound IP Address:
64.236.54.139
Uptime Monitor IP Addresses:
- Central US: 20.98.161.12
- West Europe: 20.56.100.179