Connect Microsoft Azure AD
How to connect Azure Active Directory so Doow can discover your users, groups, and SaaS app sign-ins.
Connecting Azure Active Directory (Azure AD) lets Doow discover which SaaS applications your team uses through Microsoft 365 and Azure AD, who is using them, and how often. Doow requests read-only access and never modifies your directory.
What Doow reads from Azure AD
When you connect Azure AD, Doow pulls:
- Users — display name, user principal name, department, and account status
- Groups — group names and memberships, used to map departments and teams
- Enterprise application sign-ins — sign-in logs for enterprise applications registered in Azure AD
- App role assignments — which users are assigned to which applications
Doow does not read: passwords, MFA settings, user attributes beyond the fields listed above, conditional-access policies, or device information.
Before you start
You need:
- A Microsoft Entra ID (Azure AD) tenant with one of these roles: Global Administrator, Application Administrator, or Cloud Application Administrator
- Permission to grant admin consent for application permissions
- Azure AD Premium P1 or P2 if you want sign-in log data (standard Azure AD does not include sign-in logs via Microsoft Graph)
Step 1 — Register an application in Azure AD
- Sign in to the Azure portal and go to Microsoft Entra ID → App registrations.
- Click New registration.
- Enter a name (e.g. "Doow integration").
- Under Supported account types, select "Accounts in this organisational directory only."
- Leave Redirect URI blank.
- Click Register.
- From the Overview page of your new registration, copy the Application (client) ID and Directory (tenant) ID.
Step 2 — Create a client secret
- In your app registration, go to Certificates & secrets → Client secrets.
- Click New client secret.
- Enter a description (e.g. "Doow read-only access") and choose an expiration (24 months is recommended).
- Click Add.
- Copy the secret Value immediately — it is only shown once.
Step 3 — Assign API permissions
- In your app registration, go to API permissions → Add a permission.
- Select Microsoft Graph → Application permissions.
- Add the following permissions:
| Permission | Why Doow needs it |
|---|---|
User.Read.All | Read user profiles |
Group.Read.All | Read group names and memberships |
AuditLog.Read.All | Read sign-in logs for utilisation data |
Application.Read.All | Read enterprise application details |
- Click Grant admin consent and confirm.
Step 4 — Enter the details in Doow
- In Doow, go to Settings → Integrations.
- Click Connect integration and select Microsoft Azure AD.
- Enter the Directory (tenant) ID, Application (client) ID, and Client secret.
- Click Connect.
Doow validates the credentials and starts an initial sync. The first sync typically takes 5–15 minutes. Sign-in logs can take up to 24 hours to become available in Microsoft Graph after you grant the AuditLog.Read.All permission, so utilisation data may not appear immediately.
Step 5 — Verify the sync
Once the sync completes, applications discovered from Azure AD sign-in logs appear on your Applications page (marked with an SSO badge). The sync status and user count are shown on the integration card in Settings → Integrations.
Rotating the client secret
When your client secret is near expiration, Doow shows a warning on the integration card. To rotate:
- Create a new client secret in Azure AD (Step 2 above).
- In Doow, go to Settings → Integrations → Azure AD and click Update credentials.
- Paste the new secret and click Update.
- Once the new secret is working, delete the old secret in Azure AD.
What to read next
- How integrations work — understand how Doow syncs data
- Pause or disconnect an integration — manage your active integrations