Azure Active Directory Support
In addition to Active Directory, Tenable Identity Exposure supports Azure AD (AAD) to expand the scope of identities in an organization. This capability leverages new Indicators of Exposure that focus on risks specific to AAD.

The support of Azure AD requires the collecting of data from AAD such as users, groups, applications, service principals, roles, permissions, policies, logs, etc. It collects this data using Microsoft Graph API and service principal credentials following Microsoft recommendations.
Prerequisites: You must sign in to Azure AD as a user with permissions to grant tenant-wide administrator consent on Microsoft Graph, which must have the Global Administrator or Privileged Role Administrator role (or any custom role with appropriate permissions), according to Microsoft.
Use the following procedures (adapted from the Microsoft Quickstart: Register an application with the Microsoft identity platform documentation) to configure all required settings in Azure AD.
-
Create an application:
-
In the Azure Admin portal, open the App registrations page.
-
Click + New registration.
-
Give the application a name (Example: "Tenable Identity Collector"). For the other options, you can leave the default values as they are.
-
Click Register.
-
On the Overview page for this newly created app, make a note of the "Application (client) ID" and the "Directory (tenant) ID".
-
-
Add credentials to the application:
-
In the Azure Admin portal, open the App registrations page.
-
Click on the application you created.
-
In the left-hand menu, click Certificates & secrets.
-
Click + New client secret.
-
In the Description box, give a practical name to this secret and an Expiry value compliant with your policies. Remember to renew this secret near its expiry date.
-
Save the secret value in a secure location because Azure only shows this once, and you must recreate it if you lose it.
-
-
Assign permissions to the application:
-
In the Azure Admin portal, open the App registrations page.
-
Click on the application you created.
-
In the left-hand menu, click API permissions.
-
Click + Add a permission.
-
Select Microsoft Graph.
-
Select Application permissions.
-
Use the list or the search bar to find and select all the following permissions:
-
AuditLog.Read.All
-
Directory.Read.All
-
IdentityProvider.Read.All
-
Policy.Read.All
-
Reports.Read.All
-
RoleManagement.Read.All
-
UserAuthenticationMethod.Read.All
-
Click Add permissions.
-
Click Grant admin consent for <tenant name> and click Yes to confirm.
-
-
After you configure all required settings in Azure AD:
-
Create a new credential in Tenable Vulnerability Management of type "Microsoft Azure".
-
Select the "Key" authentication method and enter the values that you retrieved in the previous procedure: Tenant ID, Application ID, and Client Secret.
-

-
In Tenable Identity Exposure, click on the Systems icon
in the left navigation menu.
-
Click on the Configuration tab.
The Configuration page opens.
-
Under Application Services, click on Tenable Cloud.
-
In Activate Azure AD Support, click the toggle to enabled.
-
If you have not previously logged in to the Tenable Cloud, click the link to go to the login page:
-
Click Forgot your password? to request a password reset.
-
Type the email address associated with your Tenable Identity Exposure license and click Request Password Reset.
Tenable sends an email to that address with a link to reset your password.
Note: If your email address is not the same as the one associated with the Tenable Identity Exposure license, contact your Customer Support for assistance.
-
-
Log in to Tenable Vulnerability Management.
-
To generate API keys in Tenable Vulnerability Management, go to Tenable Vulnerability Management > Settings > My Account > API Keys.

Adding a tenant links Tenable Identity Exposure with the Azure AD tenant to perform scans on that tenant.
-
In the Configuration page, click on the Tenant Management tab.
The Tenant Management page opens.
-
Click on Add a tenant.
The Add a tenant page opens.
-
In the Name of the tenant box, type a name.
-
In the Credentials box, click the drop-down list to select a credential.
-
If your credential does appear in the list, you can either:
-
Create one in Tenable Vulnerability Management (Tenable Vulnerability Management > Settings > Credentials). For more information, see the procedure to create an Azure-type credential in Tenable Vulnerability Management.
-
Check that you have the "Can use" or "Can edit" permission for the credential in Tenable Vulnerability Management. Unless you have these permissions, Tenable Identity Exposure does not show the credential in the drop-down list.
-
-
Click Refresh to update the drop-down list of credentials.
-
Select the credential you created.
-
Click Add.
A message confirms that Tenable Identity Exposure added the tenant, which now appears in the list on the Tenant Management page.

Note: Tenant scans do not occur in real time and require at least 45 minutes AAD data is visible in the Identity Explorer.