Connection Guide
Connect Microsoft Entra ID (Azure AD) and Microsoft 365 Without Breaking the Audit Trail
Use this guide to connect Microsoft Entra ID (Azure AD) and Microsoft 365 or confirm the export-based path that fits your environment. Aurora keeps source, timestamps, ownership, and collection history attached so the first run becomes reusable proof instead of one-off setup work.
First-Run Checklist
Use this sequence to connect Microsoft Entra ID (Azure AD) and Microsoft 365 and make sure the first collection lands cleanly.
- 1Create an Entra ID app registration (single-tenant).
- 2Grant required Microsoft Graph Application permissions and admin-consent them.
- 3Create a client secret and store it in your secret manager.
- 4Configure tenant_id, client_id, and client_secret.
- 5Validate, then run full sync; incremental sync advances a time watermark cursor.
Credentials and Secrets
The keys, secrets, or tokens Aurora uses to authenticate and collect proof.
Recommended Access
Aurora only asks for the minimum read access needed for collection and checks.