Deploying Microsoft Authenticator via GDAP for CSP M365 Tenants
Introduction
Microsoft's Authenticator app is a great tool to use when verifying someone's identity through the MSP Process platform - it's more secure than just sending an SMS message, it can leverage additional biometric security mechanisms like Apple's FaceID, and it's convenient - your end-users likely already have the Microsoft Authenticator app on their phone.
In order for the MSP Process platform to send a push notification to your end-users, there are configuration steps that must be taken within that end-user's M365 tenant. This KB article will guide you through using GDAP Relationships in your CSP-model M365 tenant to complete those steps.
Prerequisites
- Your end-user's M365 tenants must have an Entra P1 license (or higher) assigned to it
- You must have a set of credentials for your CSP-model M365 tenant that have Cloud Application Administrator permissions
- You must have access to your Microsoft Partner Center account
Obtaining the Redirect URI
You'll be creating an App Registration in your CSP-model M365 tenant; as part of configuring that App Registration, you'll need a Redirect URI - let's grab that from MSP Process:
- Login to the MSP Process UI (https://app.mspprocess.com)
- Navigate to Integrations -> Security Integrations
- Click the Add New Integration button
- Click on Microsoft Authenticator
- Click the CSP-model M365 Tenant button
- In the pop-up window that appears, click on the copy icon for the Link for Redirect URI parameter:
- Leave the MSP Process window open; we'll be coming back to it in just a few minutes.
Configuring the Enterprise Application your CSP-model M365 Tenant
NOTE: The GDAP Relationships you've established with your client's M365 tenants must have the Application administrator and User administrator roles assigned.
-
- Login to your Microsoft Azure portal (https://portal.azure.com)
- Navigate to App Registrations
- Add a new App Registration, and configure it as follows (note that the URL will change, depending on the ID of your M365 integration):
- Name: MSP Process: MS Authenticator Deployment App
- Supported Account Types: Accounts in any organizational directory (Any Microsoft Entra ID tenant - Multitenant)
- Redirect URI: Web; URI: This is the URI you copied from the previous step, in MSP Process
- Within the App Registration, go to Manage -> API Permissions, and assign the app the following permissions:
- Within the App Registration, navigate to Manage -> Certificates & Secrets, and add a new Client Secret. Copy that Client Secret, as you'll need it in just a moment
- Back in MSP Process, fill in the rest of the fields in that Connect to Microsoft 365 (GDAP) pop-up window:
- The Domain Name of your M365 CSP tenant (this is the Primary Domain that you'd see on the Home page, in Microsoft Entra)
- The Application ID of the app you just registered; this can be found on the Overview page of the App Registration
- The Client Secret from step #5
- Click Submit
- In the Microsoft window that appears, sign-in to your CSP-model M365 tenant
- Follow the prompts to provide MSP Process with the required permissions:
- You'll be brought back to the MSP Process UI
- If you then click into the Microsoft Authenticator card, you'll see the child tenants we've been able to successfully setup:
At this point, you've setup MSP Process to use Microsoft Authenticator to verify the end-users in that M365 tenant with their Microsoft Authenticator app. You'll now see Microsoft Authenticator available as an option within your PSA:
ConnectWise/Halo PSA:
Autotask: