CONBOOL
  • Blog
  • Dokumentation
  • Partner
  • Kontakt
Loslegen
CONBOOL

Sichere und automatisierte E-Mail-Sicherheit für Unternehmen – einfach, zentral und zuverlässig.

© Copyright 2026 Conbool. Alle Rechte vorbehalten.

Auszeichnungen
  • OMR Leader Badge für E-Mail-Sicherheit
Mitglied bei
  • Bitkom Mitglied – Digitalverband
  • BSI Allianz für Cyber-Sicherheit – Mitglied
Über uns
  • Blog
  • FAQ
  • Partner
  • Kontakt
Produkt
  • SecureMail
  • MailGuard
  • Disclaimer
  • Dokumentation
Add-ins
  • Disclaimer
  • SecureMail
  • SecureFiles
Rechtliches
  • Nutzungsbedingungen
  • Datenschutzerklärung
  • Impressum
Dokumentation
    • Integrationsübersicht
    • LDAP
    • Entra ID
    • DOI / NdB-Mailertabelle
  • Rollen & Berechtigungen

Entra ID

Entra ID (Azure AD) integration: Synchronize users, groups, and S/MIME certificates.

Entra ID Integration

The Entra ID integration (formerly Azure AD) connects Conbool directly with your Microsoft 365 tenant. Users, groups, and S/MIME certificates are thereby automatically available for policies, encryption, routing, and user management – without manual maintenance or local storage of sensitive data.

The integration uses the Microsoft Graph API v1.0 and supports both certificate-based authentication and client secrets.


Feature Scope

  • User synchronization – Automatic import of all users from Entra ID including pagination for large tenants
  • Group synchronization – Import of security and Microsoft 365 groups
  • S/MIME certificate retrieval – Certificates are loaded directly from Entra ID and used for email encryption
  • Change Notifications – Webhook-based notifications for changes in the tenant
  • Expiration monitoring – Automatic display of expiration dates for secrets and certificates
  • Audit logging – Every configuration change to the Entra ID connection is logged

Prerequisites

Before setting up the integration, make sure the following requirements are met:

  1. You have Global Administrator or Cloud Application Administrator rights in your Microsoft 365 tenant.
  2. An App Registration has been created in Azure AD / Entra ID (or you let Conbool create it automatically via the Admin Consent Flow).
  3. The App Registration has the required Microsoft Graph API permissions (Application Permissions):
    • User.Read.All – Read users
    • Group.Read.All – Read groups
    • Mail.Read – Email-related data (for S/MIME)
  4. A valid certificate or client secret for the App Registration is available.

Establish Connection

The connection is established via the OAuth2 Admin Consent Flow. No user password is stored in Conbool – instead, an administrator grants consent for the entire organization.

Step-by-Step Guide

  1. Navigate to Settings → Integrations → Entra ID.
  2. Click "Connect with Microsoft".
  3. You will be redirected to the Microsoft sign-in page. Sign in with an administrator account.
  4. Review the requested permissions and grant Admin Consent for your organization.
  5. After successful consent, you will be automatically redirected back to Conbool (callback).
  6. The connection details – Tenant ID, Client ID, and Scope – are automatically populated.
  7. Select the desired authentication mode (see below).
  8. Click Save.

After saving, Conbool immediately begins the first synchronization. Depending on the size of the tenant, this process may take a few minutes.


Authentication Mode

Conbool supports two authentication methods for the Microsoft Graph API. The mode is automatically detected but can also be changed manually.

FeatureCertificate (recommended)Client Secret (legacy)
Security levelHigh – private key never leaves the serverMedium – shared secret
RotationReplace certificateRenew secret regularly
Expiration monitoringYes, with warningYes, with warning
SetupUpload certificate in App RegistrationGenerate secret in Azure Portal
RecommendationProduction environmentsTest environments, migration

Microsoft recommends certificate-based authentication. Client secrets are considered a legacy method and should only be used in exceptional cases.


Synchronized Data

User Attributes

The following fields are retrieved per user from Entra ID:

Entra ID FieldConbool PlaceholderDescription
displayName{user.display_name}Display name
mail{user.email}Primary email address
userPrincipalName—Sign-in name (UPN, internal)
mobilePhone{user.mobile}Mobile phone number
jobTitle{user.job_title}Job title
department{user.department}Department
officeLocation{user.office}Office location
city{user.city}City
country{user.country}Country
postalCode{user.postal_code}Postal code
streetAddress{user.street}Street address
businessPhones{user.phone}Business phone number

These attributes are available as placeholders in disclaimers and templates. Use the Conbool placeholder names (e.g., {user.department}) to insert dynamic content into email disclaimers.

Groups

All security groups and Microsoft 365 groups are synchronized. Groups can be used as conditions in policies, e.g., "Only members of the Sales group may send unencrypted."

S/MIME Certificates

Conbool retrieves S/MIME certificates directly via the Microsoft Graph API. The certificates are not stored locally but loaded in real time on demand. This ensures that the current certificate from Entra ID is always used.


Configuration Fields

FieldDescriptionExample
Tenant IDUnique ID of your Microsoft 365 tenanta1b2c3d4-e5f6-...
Client IDID of the App Registration in Entra IDf7g8h9i0-j1k2-...
ScopeAPI permission scopehttps://graph.microsoft.com/.default
Auth modeCertificate or client secret (automatically detected)certificate / client_secret
Secret expiration dateAutomatically displayed when a secret is configured2026-12-31

Disconnect

To deactivate the Entra ID integration:

  1. Navigate to Settings → Integrations → Entra ID.
  2. Click "Disconnect" or deactivate the toggle.
  3. Confirm the disconnection.

After disconnecting, no further data is synchronized from Entra ID. Previously synchronized user data remains in Conbool until manually removed. Certificates that were only loaded from Entra ID are no longer available.

To also remove the connection on the Microsoft side, delete the Admin Consent in the Azure Portal enterprise application or remove the App Registration.


Troubleshooting

Connection fails

  • Tenant ID or Client ID incorrect – Verify the values in the Azure Portal App Registration under Overview.
  • Missing Admin Consent – Ensure that a Global Administrator has granted the permissions. Under API permissions, the status must show "Granted for [Organization]".
  • Network restrictions – Conbool must be able to reach login.microsoftonline.com and graph.microsoft.com over HTTPS.

Users are not synchronized

  • Pagination – For tenants with more than 999 users, Conbool uses automatic pagination. Check whether the synchronization is still running.
  • License filter – Only licensed users with a valid mail attribute are synchronized.
  • Permissions – The app requires User.Read.All as an Application Permission (not Delegated).

Certificates not available

  • S/MIME certificates must be stored in the user profile in Entra ID.
  • Check whether the Mail.Read API permission has been granted.

Secret expired

  • Conbool displays the secret's expiration date in the settings. Renew the secret in time in the Azure Portal and update it in Conbool.
  • Consider switching to certificate-based authentication to reduce dependency on expiring secrets.

Security Notes

  • No local storage of certificates – S/MIME certificates are loaded from Entra ID on demand and are not permanently stored in Conbool.
  • Audit trail – All changes to the Entra ID configuration (activation, deactivation, credential changes) are fully logged and viewable in the audit log.
  • Principle of least privilege – Grant the App Registration only the Graph API permissions that are actually needed.
  • Prefer certificate-based authentication – Avoid client secrets in production environments. Certificates provide a higher security level since no shared secret is transmitted.
  • Regular review – Regularly check the granted permissions in the Azure Portal enterprise application and remove access that is no longer needed.
  • Webhook security – Change notifications are received and validated via secured HTTPS endpoints.

Further Documentation

  • Integrations Overview – Overview of all available integrations.
  • Placeholders – Using user attributes such as {user.department} in disclaimers and templates.
  • Groups – Group management and using synchronized groups in policies.

Auf dieser Seite

  1. Entra ID Integration
    1. Feature Scope
    2. Prerequisites
    3. Establish Connection
    4. Authentication Mode
    5. Synchronized Data
    6. Configuration Fields
    7. Disconnect
    8. Troubleshooting
    9. Security Notes
    10. Further Documentation