Note on third‑party tools
We aim to provide accurate and helpful details about third‑party tools, but we can’t guarantee that this information is always complete or up to date. For the most reliable information, please always refer to the third‑party tool’s official documentation.
Before connecting Microsoft Azure, Microsoft Intune, or Microsoft 365 / Entra ID to Lansweeper, you need to set up your infrastructure to allow Cloud Discovery to access your Microsoft Cloud products.
Register a new application
Follow Microsoft’s documentation to Register an application in Microsoft Entra ID
After registration, save the following:
Application (client) ID
Directory (tenant) ID
You’ll need these values later in Lansweeper when creating the connection to your site.
Add Microsoft Graph API permissions
Follow Microsoft’s documentation to Add permissions to access Microsoft Graph.
Based on your discovery requirements, add the following permissions and grant Admin consent for each:
Data | Permission type | Permission name |
|---|
Microsoft 365 / Entra ID (Organization and Users) | Application | Organization.Read.All,
Directory.Read.All
|
Microsoft Intune | Application | DeviceManagementManagedDevices.Read.All
|
For Microsoft Azure , ensure the app has Reader access to each subscription you want to scan
Configure federated credentials
Federated credentials enable token exchange between FusionAuth and Azure, allowing Lansweeper Discovery to authenticate without stored secrets. For more information about federated credentials, see Configure an app to trust an external identity provider
In the Azure portal, go to your app registration and open Certificates & secrets > Federated credentials.
Select Add credential.
Under Federated credential scenario, choose Other issuer.
Configure the fields as follows:
Save the configuration when complete.
Assign permissions for Azure resources
To allow the app to read Azure resources under a specific subscription:
Follow Microsoft’s documentation to Assign Azure roles using the Azure portal.
Assign the Reader role to the app registration.
Repeat for all target subscriptions.
Create and configure an Azure key vault
You’ll use Azure Key Vault to store your Lansweeper Site ID securely and provide API-access tokens to Lansweeper.
Follow Microsoft’s documentation to Create an Azure Key Vault guide to create a Key Vault.
Under Access configuration, select Vault access policy.
Add an Access policy granting all secret permissions to your account.
Create a new secret:
Name: LansweeperSiteID
Value: Your Lansweeper Site ID (find it in your site under Configuration > Site settings)
Grant the Get permission on secrets to your app registration.
After saving, copy the Vault URI for later use in Lansweeper Site configuration.
For security, restrict access to the Key Vault by limiting inbound connections to Lansweeper IPs:
EU: 54.247.163.109, 54.247.185.164, 34.243.192.131
US: 3.143.85.134, 3.142.89.208, 3.133.69.44
Next steps
Now that you have prepared your Microsoft Cloud environment, you can create a Cloud Discovery action to connect with Lansweeper Sites.