Integrating O365 with Grip Security

Overview

The integration of Grip with O365 enables organizations to gain a comprehensive overview of their managed and unmanaged applications, including provisioning details and insights into sign-in and usage patterns, as well as applications detected with email-based interactions. This collaboration enhances monitoring and controlling access across the organization's application landscape, ensuring that all application interactions are transparent and managed efficiently.

Prerequisites

  • An Entra ID admin user with privileges to create enterprise applications.

  • Public certificate file received from Grip.

Permissions

The following outlines the required permissions.

Step-by-step instructions are provided in the next sections of this article.

Required Microsoft Graph Permissions

Grip requires several OAuth permissions from Microsoft Graph to perform the discovery process. The required permissions and their respective reasoning are as follows:

Permission

Reason

Mail.Read

Used to identify SaaS events in emails, including new registrations, billing updates, password resets, etc.

User.Read.All

Used to retrieve user and alias information to map the relationships between users and SaaS usage

AuditLog.Read.All

Used to gather sign-in logs for managed applications and social login applications within Entra ID domain

Application.Read.All

Used to gather the list of managed applications within the Entra ID environment

Directory.Read.All

Used for retrieving group, group alias, and member information to present identity and group-centric views into SaaS use

Optional - Additional Graph permissions for O365 posture (SSPM)

Permissions

Product/Service

  • Directory.Read.All

  • GroupMember.Read.All,    

  • Organization.Read.All

  • Policy.Read.All,      

  • RoleManagement.Read.Directory

  • User.Read.All        

  • PrivilegedEligibilitySchedule.Read.AzureADGroup

  • PrivilegedAccess.Read.AzureADGroup      

  • RoleManagementPolicy.Read.AzureADGroup

Graph API

  • Sites.FullControl.All  

SharePoint Online

  • Exchange.ManageAsApp  

Exchange Online

  • Global Reader

Identity Roles

  • Defender for Office 365

Global Reader

  • Microsoft Teams

Global Reader

For OAuth Revocation

Permissions

Product/Service

DelegatedPermissionGrant.ReadWrite.All

Graph API

Read more in this article

How to Perform the Setup

The process is comprised of the following steps:

  • Step 1 - Create the application.

  • Step 2 - Grant permissions.

  • Step 3 - Add the certificate.

  • Step 4 - Send relevant identifiers to Grip.

Step 1 – Create the application

  • Go to App registrations in your Entra ID admin panel (link)

  • Select New registration

  • In the Name field enter Grip Security.

  • In the Supported account types field select the first option Accounts in this organizational directory only (<your org> only - Single tenant).

  • Click Register.

  • You are redirected to your new application’s page. Copy the following values with their respective titles and save them, to be shared later with Grip.

    • Application (client) ID

    • Directory (tenant) ID

Step 2 – Grant Graph permissions

  • In the left sidebar of the new app’s page, select Manage ->API permissions.

  • Click Add a permission.

  • On the new right sidebar, select Microsoft Graph.

  • Select Application permissions.

  • Select and select the following permissions

    • Mail.Read

    • User.Read.All

    • AuditLog.Read.All

    • Application.Read.All

    • Directory.Read.All

Note.

  • Make sure all 5 permissions have been added to the list.

  • Sometimes there will be an extra permission at the beginning – User.Read. This is OK.

  • Click “Grant admin consent for <your org name>” and select “Yes” in the confirmation popup.

Optional - Graph permissions for SSPM

  • Directory.Read.All

  • GroupMember.Read.All,    

  • Organization.Read.All

  • Policy.Read.All,      

  • RoleManagement.Read.Directory

  • User.Read.All        

  • PrivilegedEligibilitySchedule.Read.AzureADGroup

  • PrivilegedAccess.Read.AzureADGroup      

  • RoleManagementPolicy.Read.AzureADGroup

  • Click on “Add Permissions

For OAuth Revocation

Permissions

Product/Service

DelegatedPermissionGrant.ReadWrite.All

Graph API

Read more in this article

Optional - Additional permissions for SSPM

Sharepoint

From “Select an API » Microsoft APIs,” select “Sharepoint

  • Select “Application permissions”.

  • Select the following permissions – “Sites.FullControl.All

  • Click on the “Add permissions” button. 

Note: The Sites.FullControl.All permission is the minimum required to read admin center configurations for SharePoint Online, as this is a limitation of the API provided by Microsoft. Grip does not utilize the write privileges in its assessments.

_____________________________________________________

Exchange Online

  • Click “Add a permission.”

  • On the right-side panel, select the “APIs my organization uses” tab.

  • Search for Office 365 Exchange Online and select the entry with the same name.

  • Select “Application permissions,” then search and select the following permission: Exchange.ManageAsApp

  • Click the ”Add permissions” button. 

💡 Note.

Ensure all  11  permissions have been added to the list.

Sometimes, there will be an extra permission at the beginning – User.Read. This is OK.

Click the ”Grant admin consent for <your org name>” tab (18) and select "Yes"  in the confirmation popup.

_____________________________________________________

Assign user role

  • Go to Microsoft Entra roles and administrators in your Entra ID admin panel.

  • Search for Global Reader and select the entry.

  • Click "+ Add assignments"

  • Search for the full name you assigned for your app (Grip Security – SSPM), select it, and click "Add"

Step 3 – Upload certificate

  1. On the left sidebar select Certificates & secrets.

  2. Select the Certificates tab.

  3. Click Upload certificate.

  4. On the new right sidebar, upload the certificate you received from Grip.

  5. Enter a description for internal use (optional).

  6. Click Add.  

What next? - Post completion requirements

Send Grip the fields you saved in the Create the application step:

  • Application (client) ID

  • Directory (tenant) ID

Summary

You have now created your part of the integration. After sending the relevant identifiers to Grip the discovery process will begin. You can get a time estimation from your Grip representative.