Update Azure Connector for AI security features
Third-party documentation and product interfaces are subject to change. These changes may not always be reflected in BeyondTrust documentation.
Important information
If you used a custom name when deploying your connector service principal, ensure you update the script to reflect this name before running it, to avoid creating a new service principal.
Prerequisites
-
You must have auditing enabled in Azure. See View Microsoft's Audit documentation for more information and procedures.
-
You must have Azure Global Administrator privileges to create this connector.
-
You must have Azure Power Platform Administrator privilege to register the connector in Power Platform.
-
You must have at minimum at least a Microsoft Entra ID P1 license.
license. View Microsoft license documentation.
Update steps
-
Log into Insights and navigate to the connector creation screen for a new Microsoft Azure Connector. Follow steps 2 to 4 only and discard this connector configuration afterwards. You need to re-run the setup script to add custom permissions for the BT-SP-Connector Service Principal.
-
Register the connector as an admin management application. View Microsoft documentation.
- Requires PowerShell for Power Platform Administrators module
- Use the client ID of your configured BT-SP-Connector in Azure as the $appId in the script.
- Use the tenant ID of your Azure environment as the $tenantId in the script
- If you use the Microsoft script example, you may need to add the $tenantId variable
- Run the script to register the connector as an admin management application
-
From the Azure portal, launch Power Platform
-
Navigate to Manage > Environments
-
For each environment:
Important information
Failure to configure all environments may result in connector errors indicating Insights is unable to retrieve data relating to agents. However it will only affect those environments which have not been configured.
-
Select the environment
-
If Dataverse has not been enabled in your environment, select Add Dataverse
-
Elevate your user account to the System Administrator role. View Microsoft documentation.
-
Navigate to Security Roles > + New Role and configure:
-
Role Name:
BT-Read-Only -
Business Unit: Select the current environment’s business unit
-
Leave the Member's privilege inheritance on the default value of Direct User (Basic) access level and Team privileges
-
Uncheck Include App Opener privileges for running Model‑Driven apps
-
Select Save
-
Select Organization for Read column for the following rows:
Table Name Copilot bot Copilot component botcomponent Process workflow
-
-
Return to the environment main page, navigate to S2S apps > + New app user and configure
-
App: Add BT-SP-Connector as an app user
-
Business Unit: Start typing the name of the current environment's business unit, and select the appropriate value
-
Assign the BT-Read-Only role and accept the confirmation prompt
-
Click Create to complete the setup
-
Updated 17 days ago