Registering PingFederate as an application in Azure Active Directory

Intune Integration Kit

  • Intune Integration Kit
  • Overview of the SSO flow
  • Setup
  • Registering PingFederate as an application in Azure Active Directory
  • Deploying and configuring the X.509 Certificate Integration Kit
  • Deploying the integration files
  • Configuring an adapter instance
  • Intune IdP Adapter settings reference
  • Adding Intune security posture results to your authentication policy
  • Creating certificate profiles in Intune
  • Testing the integration
  • Release notes
  • Changelog
  • Known issues and limitations
  • Download manifest
Page created: 20 May 2020 |
Page updated: 23 Aug 2022
| 1 min read

Microsoft Intune Other Documents Integrations Language English Integration Content Type Product documentation Audience Administrator

To allow PingFederate to access Intune through the Microsoft Graph API, add an application in Azure Active Directory with the necessary permissions.

  1. In Azure Active Directory, follow the steps in Register an application with the Microsoft identity platform in the Microsoft documentation.
  2. Add the DeviceManagementManagedDevices.Read.All application permission from the Microsoft Graft API to your application by following the steps in Add permissions to access web APIs.
  3. Note your Tenant ID, Application ID, and Application Secret. You will use these in Configuring an adapter instance.
Back to home page