Skip to main content
Skip table of contents

Microsoft Entra ID & Hybrid Integration

Universal User Model & Intelligent Merging

VeridiumID has transitioned from siloed directory management to a Unified User Model.

  • Single Identity Representation: Regardless of whether a user exists in a local Active Directory, a cloud-based Entra ID, or both, they are represented as a single object within the system.

  • Conflict Resolution: When a user is discovered in multiple sources, the system applies a "Hybrid" merge strategy where LDAP acts as the authoritative primary source for core identity data.

  • Source Attribution: Each identity is explicitly tagged as Active Directory, Entra ID (Cloud-Only), or Hybrid User, allowing for granular security policies based on the user's origin.

  • Extended Attribute Mapping: Secondary attributes from Entra ID (like specific cloud-only metadata) are preserved within an extendedAttributes container, enriching the primary LDAP profile without overwriting it.

Multi-Tenant Entra ID Architecture

Organizations can now scale their cloud identity footprint by connecting to multiple tenants simultaneously.

  • Independent Configuration: Each Entra connector maintains its own unique Client IDs, Tenant IDs, and attribute mappings.

    image-20260210-110941.png
  • Domain Pattern Matching: To optimize performance and accuracy, administrators can define simple string patterns (e.g., *@company.onmicrosoft.com) to dictate which connector handles specific user domains.

Expanded User Classifications

The system now explicitly categorizes users into three distinct types for better administrative visibility:

  • Active Directory (On-Prem): Standard LDAP users with full password management capabilities.

  • Entra ID (Cloud-Only): Users existing solely in Microsoft Entra. These users utilize Entra-native identifiers but currently do not support Veridium-based password changes.

  • Hybrid User: The most robust model, linking an on-prem objectSid to a cloud objectId via a stable "Microsoft Login ID".


Configuration: The Hybrid Binding Process

Step 1: Entra ID Connector Setup

Navigate to Admin Manager > Settings > Directory Services > Entra ID to define the cloud interface:

  • General Settings: Enter the Tenant Unique Identifier, Client ID, and Tenant ID provided by your Azure/Entra App Registration.

  • Debugging: Enable "Http Debug Enabled" during initial setup to capture detailed logs of the communication between VeridiumID and Microsoft Graph.

  • FIDO2 Configuration: Set the "FIDO2 Creation Options challenge timeout" (default is 5 minutes) to define the window for cloud-based biometric registration.

Step 2: Attribute Mapping & Extended Attributes

Proper mapping is essential for identity resolution and JWT token generation

  • Standard Mapping: Ensure the Internal Attribute list correctly points to Entra fields:

    • UsernameuserPrincipalName

    • IDid

    • GroupsmemberOf

This table defines which Entra attribute maps to which internal model attribute.

Internal Attribute

Entra Attribute

ID

id

Mobile

mobilePhone

Groups

memberOf

User Account Control

accountEnabled

Email

mail

Username

userPrincipalName

Line Manager

manager

First Name

givenName

Last name

surname

Microsoft Login ID

mail

Extended attributes allow admins to map additional Entra fields not included in the standard model, as the example below.

Internal Attribute

Entra Attribute

entraId

id

userPrincipalName

entraUpn

mail

mail

userPrincipalName

userPrincipalName

  • Critical JWT Mapping: You must map entraUpn to the userPrincipalName in the Extended Attributes section. This field is specifically required to populate the entraUpn claim in JWT tokens used by downstream applications.

Step 3: Enabling Hybrid Directory Sync (LDAP Binding)

To link on-premises users to their cloud counterparts, you must modify your LDAP configuration:

  1. Toggle Hybrid Sync: Enable the "Enable Hybrid Directory Sync" option in the LDAP settings.

    image-20260210-112404.png
  2. Select Tenant: Choose the corresponding Tenant ID from your configured Entra connectors.

  3. Immutable ID Definition: Use objectGUID to bind the on-prem AD user object to the Entra account. This ensures a stable link even if a user's email or name changes.


Critical Technical Requirements & Limitations

  • NameID Attribute Mapping: When configuring SAML or OIDC applications, the NameID attribute must be mapped to userPrincipalName. Microsoft Entra ID does not support searching by mail or sAMAccountName for these lookups.

  • LDAP Dependency: For Hybrid users, the system treats LDAP as the authoritative primary source. If LDAP connectivity is down, hybrid users will face enrollment and authentication failures, as the system cannot verify the primary data source.

  • API Permissions: The Entra App Registration requires exactly 12 Microsoft Graph API permissions (e.g., User.Read.All, Group.Read.All, UserAuthenticationMethod.ReadWrite.All) with granted Admin Consent.

  • Password Management limitationsz:

Entra-Only Users

  • ⚠️ Cannot Authenticate with Entra Password: Entra-only users cannot use their Entra ID password for authentication in the system

  • ⚠️ No Self-Service Password Reset: Cannot reset passwords through the self-service portal

  • ⚠️ No Password Change: Cannot change passwords via the system

Hybrid Users

  • ✅ Can authenticate using Active Directory password

  • ✅ Can use self-service password management (when LDAP is available)

  • ⚠️ Entra password is not used for authentication

Active Directory Users

  • ✅ Full password management capabilities

  • ✅ Self-service password reset available

  • ✅ Password change through portal

Authentication & Enrollment Behavior

Operation

User Type

Requires LDAP?

Requires Entra API?

Enrollment

Hybrid

Yes (Authoritative)

Yes

Enrollment

Entra-Only

No

Yes

Authentication

Hybrid

Yes (Password source)

No (Attributes may fail)

Password Change

Hybrid

Yes

No

Scenario

LDAP Status

Entra Status

Result

Hybrid Enrollment

Up

Up

Success: Merges data from both sources.

Hybrid Re-enrollment

Down

Up

Failure: "No LDAP connection for hybrid user found".+1

Entra Authentication

Any

Up

Success: Uses Microsoft Graph API for validation.

Hybrid Authentication

Up

Down

Partial Success: Authenticates via LDAP; cloud-specific extended attributes may be missing.


UI Audit & Impact Analysis

  • UI Clarity: The "Identity Details" screen has been updated to include a dedicated "External Details" panel. This allows helpdesk agents to immediately see the UPN, Domain, and Identity Source (Hybrid, EntraID or Active Directory), reducing mean-time-to-resolution (MTTR) for login issues.

    image-20260210-113918.png
  • Security Impact (High): Unified search prevents identity fragmentation. By merging cloud and on-prem data, security policies can be applied consistently to a single user identity rather than managing separate personas.

  • Technical Impact (Medium): Administrators must audit existing Entra App Registrations to ensure the 12 required Microsoft Graph API permissions (including Group.Read.All, User.Read.All, and UserAuthenticationMethod.Read.All) are granted and have Admin Consent.

    image-20260210-113635.png

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.