This page describes how to connect Entra ID to Agentspace Enterprise.
After you set up your data source and import data the first time, the data store syncs data from that source at a frequency that you select during setup.
Before you begin
Before setting up your connection:
Set up access control for your data source. For information about setting up access control, see Use data source access control.
To obtain the client ID and client secret, do the following:
Create an Entra ID application:
- Sign in to Microsoft Entra administrator center and click Application.
- In the Application drop-down list, click App registrations.
- In the App registrations page, click New registration.
- Click Add new registration and do the following:
- Enter a name for the application.
- Under Supported account types, select Accounts in the organizational directory only.
- Under Redirect URI, add a web redirect URI pointing
to:
https://login.microsoftonline.com/common/oauth2/nativeclient
.
- Click Register.
Save credentials:
On your registered application window, save the following values for later use:
- Use the Application (client) ID to set the Client ID parameter.
- Use the Directory (tenant) ID to set the Azure Tenant parameter.
Create client secret:
- Navigate to Certificates & secrets and create a new client secret:
- Click New client secret and specify the required duration.
- Save the client secret and copy the key value for later use.
Configure Entra ID API permissions
- On your registered application window, click API permissions.
Under Configured permissions, select Microsoft Graph and configure the following permission:
If you want to ingest
profileCardAttributes
, then configure the following permissions:Grant admin consent for all the added permissions. An administrator's consent is required to use client credentials in the authentication flow.
Create a Entra ID connector
Console
To use the Google Cloud console to sync data from Entra ID to Agentspace Enterprise, follow these steps:
In the Google Cloud console, go to the Agentspace Enterprise page.
In the navigation menu, click Data stores.
Click
Create data store.On the Select a data source page, scroll or search for Entra ID to connect your third-party source.
Under Authentication settings, enter the client ID and client secret.
In Destinations, if VPC Service Controls is enabled, then select Private. Otherwise, select Public.
Click Continue.
Under Advanced options, enter the Azure tenant ID.
Click Continue.
Under Entities to sync, select User profiles.
Select a synchronization frequency.
Select Enable realtime sync for all entities if you want the data updated in near real-time.
Enter a string value in the Client state field. The client state is used to authenticate change notifications. For webhook authentication on the third-party app, the credentials passed during connector creation are re-used.
Click Continue.
In Configure your data connector, select a region for your data store.
Enter a name for your data connector.
Click Create. Agentspace Enterprise creates your data store and displays your data stores on the Data stores page.
To check the status of your ingestion, go to the Data stores page and click your connector name to see details about it on its Data page. The Connector state changes from Creating to Running when it starts synchronizing data. When ingestion is complete, the state changes to Active to indicate that the connection to your data source is set up and awaiting the next scheduled synchronization.
Depending on the size of your data, ingestion can take several minutes or several hours.
When the connector state changes to Active, navigate to the Entity tab.
Click userprofiles entity.
Check the number of ingested documents and ensure it matches the number of users in Entra ID.
If the Entra ID app has the required permissions to ingest custom attributes, it ingests up to 15 profile card attributes per record. By default, the custom attributes are not searchable.
To make the custom attributes searchable, do the following:
- In the userprofiles page, navigate to the Schema tab.
- Click Edit.
Deselect the attributes, such as address, from being retrievable, searchable, and indexable, then click Save.
The Edit button remains inactive for a few minutes before reactivating.
When the Edit button is in Active state, click Edit.
Select the retrievable, searchable, and indexable boxes for the required custom attributes.
Enable search.
Click Save.
Test the search engine
After configuring your search engine, test its capabilities. This ensures it returns accurate results based on user access.
Enable web app:
- Go to the app integration configurations and toggle to Enable the web app.
Test web app:
Click Open next to the web app link and sign in as a user.
Verify that search results are restricted to items accessible by the user.
Preview people search results
In the search app, navigate to Preview and start searching within the console when using Google IdP.
- Alternatively, navigate to the provided link and sign in with your IdP to start searching.
- The search results appear as people cards, displaying user details such as Name, Job title, Email, and Profile picture.
Click a people card to view a detailed profile page, which includes the following:
- Name
- Profile picture
- Job title
- Department
- Management chain
- Direct reports
If custom attributes (profile card properties) are ingested and made indexable, searchable, and retrievable:
- Searching by a custom attribute value returns only person profiles containing those attributes.
- Custom attributes appear in search results, but can only be accessed through the API, not the Agentspace Enterprise user interface.
Configure the workforce pool for non-Google IdP without SSO
If your employees use a non-Google IdP, lack SSO with Google, or are not Google Workspace customers, set up a workforce pool as described in Use data source access control to enable the employee search.
The workforce pool lets you to manage and authenticate users from external identity providers, such as Azure or Okta, within Google Cloud console.
To configure your workforce pool and enable the web app for seamless user access, do the following:
Create workforce pool at the organization level in Google Cloud by following the appropriate setup manual:
Configure the workforce pool in Agentspace > Settings for the region where you create your app.
Next steps
To attach your connector to an app, create an app and select your connector following the steps in Create a search app.
To preview how your search results appear after your app is set up, see Get search results. If you used third-party access control, see Preview results for apps with third-party access control.