Skip to content
  • There are no suggestions because the search field is empty.

Azure AD Integration Setup Process

This guide walks through the steps to automatically import employees from Azure Active Directory into ALICE database.

Azure Active Directory (Azure AD) can be integrated with ALICE Receptionist to import employees from Active Directory into ALICE Receptionist's database. This removes the need to manually create, update, or delete Employee listings on ALICE directly.

Creating the ALICE Azure AD Sync Application

  1. Navigate to the "Enterprise Applications" section and click + New Application.

    Enterprise Applications New Application

  2. Click on the + Create your own application option at the top of the screen.

    Browse Azure AD Gallery
  3. On the "Create your own application screen," give the app a name. Choose “Register an application to integrate with Azure AD (App you’re developing)" and click the Create button.
    Create your own application Azure AD
  4. On the "Register an application" screen, select the account type to give this application access. Most customers will choose the first option for single tenants. Click the Register button to create the application.

    Register an Application

  5. A notification appears showing that the app was successfully created.

    Create Application Azure AD Notification

Configuring the Azure AD Sync

  1. In the "Enterprise Applications" section, search for the created application and select it.

    Enterprise Applications Alice AD Sync
  2. In the "Overview" section of the application, copy and store the Application ID. This ID will be needed on the ALICE Azure AD Sync configuration screen.

    ALICE AD Overview
  3. Under the Manage section, click on Properties. On this screen, switch the "Visible to user?" option to Yes, then click the Save button.

    ALICE AD Sync Properties

  4. Under the "Security" section, click on the Permissions option. Select the Grant admin consent for (app name) button on this screen. Provide your credentials and click Accept when prompted.

    ALICE AD Sync Permissions
  5. Return to the Properties menu under "Manage." Select the application registration hyperlink.

    AD Sync Application Registration
  6. Click on the Certificates & Secrets menu under "Manage." Click on Client secrets to open the tab and click + New client secret.

    ALICE AD Sync Certifications
  7. Give the secret a description and select a time frame for the "Expires" field in the drop-down menu's available options. When finished, click Add.

    Add a Client Secret
  8. Use the Copy button to copy the value in the "VALUE" column (do not copy the "Secret ID"). This value will be needed on the ALICE Azure AD Sync configuration screen later.

    ALICE AD Sync Certificates and Secrets
  9. Click on the API Permissions tab under "Manage." Then, click the + Add a Permission button.

    ALICE AD Sync API Permissions
  10. Select the Microsoft Graph API.

    Request API Permissions
  11. Select Delegated permissions on the "Request API Permissions" screen, then scroll down and find the “USER” group. Select the “User.Read” and “User.Read.All” permission. Click Add Permission.
  12. Now select the following API / Permissions from the list.
    1. OpenId Permissions - email

    2. OpenId Permissions – Profile

    3. Use Permissions – User.Read

  13. Click the Add Permissions button at the bottom of the permission screen to add these three permissions.

    API Permissions Add Permission
  14. On the "API Permissions" screen, click the + Add a permission button again.
  15. Select the Microsoft Graph API again.

    Request API Permissions Application Permissions
  16. Click on Application permission.
  17. Select the following API / Permissions from the list.
    1. Directory– Directory.Read.All

    2. Group – Group.Read.All

    3. GroupMember – GroupMember.Read.All

    4. Member – Member.Read.Hidden

    5. User – User.ReadBasic.All

  18. Click the Add permission button at the bottom of the screen.
  19. Click the Grant admin consent for (Tenant name) to grant admin consent for these permissions.

    Configured Permissions
  20. The final list of API / Permissions should include those listed in the above image.

    API Permission Names
  21. Copy the"AD Tenant ID" from the Overview tab for your Azure AD Tenant. Store this ID as it will be required on the ALICE Azure AD Sync screen's configuration screen.

    API Permissions Name Example

Integrate ALICE Receptionist with ALICE Azure AD

To complete the integration, an administrative user of the ALICE Portal will need the following information from the created app.

  • Application ID

  • Azure AD Tenant ID

  • Application Secret

  1. Log into the ALICE Portal with an administrator account. Under Account Management, select Global Settings.
  2. Select the Azure Active Directory tab.
  3. Insert the Application ID, Azure AD Tenant ID, and Application Secret. Click Save.

    ALICE Portal Azure Active Directory Field
  4. The integration is complete. To set import employees or schedule imports, follow the Import Employee Azure AD Admin guide or training video.
  5. When importing employee information from Azure AD to the ALICE Receptionist database, the following mapping dictionary will define where data is pulled from in AD and what ALICE Receptionist fields will be populated from these fields.
ALICE Database Field Azure AD Field
First Name First Name
Last Name Last Name
Employee Photo Photo
Primary Number Business Phone
Mobile Phone Mobile Phone
Email Address Email
Department Department
Position Job Title
User Name User Principal Name
User ID (Not visible or editable) Object ID