GCC Azure Only: Integration Step 2 – Add Azure Permissions

16th August 2021 | Platform GCC Azure Only: Integration Step 2 – Add Azure Permissions

Please note: Only Azure AD Government Community Cloud (GCC) environments need to follow these instructions.

If you wish to watch our walkthrough video instead of reading through each step, click play below.

HINT: If you can’t find something in Azure, you can always use the search bar at the top of your screen to find what you’re looking for.

1) Login at https://portal.azure.com

2) Click “App registrations”

3) Click “CyberHoot” under “Owned applications”

4) Click “API Permissions”

5) Click “+Add a permission”

6) Click “Microsoft Graph”

7) Click “Application Permissions”

8) Expand the “User” Permissions

9) Select “User.Read.All”

10) Select “User.Export.All”

11) Expand “Group” Permissions

12) Select “Group.Read.All”

13) Expand “GroupMember” Permissions

14) Select “GroupMember.Read.All”

15) Click “Add permissions”

16) Click “Expose an API”

17) Click “+ Add a scope”

18) Type “CyberHoot.Read” as the “Scope name”

19) Click the “Admin consent display name” field

20) Type “CyberHoot” as the “Admin consent display name”

21) Click the “Admin consent description” field.

22) Type “Allow CyberHoot Read access” in the “Admin consent description”

23) Click “Add scope” at the bottom of the window

24) Click “Overview”

25) Click this icon to copy the “Client ID” to your clipboard.

26) Click “Expose an API” and then click “+ Add a client application”

27) Enter the “Client ID” of the registered application and select the scope
you just created to authorize. It should be saved in your clipboard.

28) Click “Add application” at the bottom of the window

29) Click “API permissions”

30) Click “Grant admin consent for…” your domain.

31) Click “Yes” to grant access.

32) Click Here to head to Step Three

For more instructional ‘HowTo’ videos, head over to our HowTo Library for more guidance. If you’re unsure where to start, review the following recommended videos and articles around common Administrator (or SuperAdministrator) pain points: 

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Safe AI Adoption: Five Rules Every Business Must Follow

Safe AI Adoption: Five Rules Every Business Must Follow

Artificial Intelligence (AI) tools are entering our businesses like a new intern with great ideas but no...

Read more
From Fear to Feedback: Report Phishing Channel Works Wonders

From Fear to Feedback: Report Phishing Channel Works Wonders

CyberHoot believes security awareness should feel positive, empowering, and rewarding. Traditional phishing...

Read more
Why Security Culture is Critical — And How CyberHoot Makes It Stick

Why Security Culture is Critical — And How CyberHoot Makes It Stick

In today’s cybersecurity landscape, breaches are rarely caused by a lack of technology. Instead, they stem from...

Read more