Prisma AIRS
Configure Azure Entra ID and AI Red Teaming OAuth 2.0 Integration
Table of Contents
Expand All
|
Collapse All
Prisma AIRS Docs
Configure Azure Entra ID and AI Red Teaming OAuth 2.0 Integration
Integrate Azure Entra ID with the AI Red Teaming using the OAuth 2.0 client
credentials authentication.
| Where Can I Use This? | What Do I Need? |
|---|---|
|
|
Use this wokflow to register AI Red Teaming in Microsoft Entra ID and
authenticate using OAuth 2.0.
- Register an app in Microsoft Entra ID.
- Log in to the Microsoft Entra admin center (entra.microsoft.com).Navigate to Entra IDApp registrationsNew registration.Enter a name (for example, airt-red-teaming).In the Supported account types, select Accounts in this organizational directory only (single-tenant).Skip Redirect URI because it is not needed for client credentials.Select Register.Record the following from the Overview page:
- Application (client) ID—for example, 00001111-aaaa-2222-bbbb-3333cccc4444
- Directory (tenant) ID—for example, aaaabbbb-0000-cccc-1111-dddd2222eeee
Create a client secret.- In your app registration, navigate to Certificates & secretsClient secretsNew client secret.Add a description and expiry.Copy the secret Value immediately.The secret value is only shown once.Add application API permissions.Delegated scopes (user.read, email, openid, profile, offline_access) with grant_type=refresh_token will not work with AI Red Teaming. You must use Application permissions with grant_type=client_credentials and scope=<api>/.default.
- Go to API permissionsAdd a permission.Select the API your target uses (for example, Microsoft Graph or your own custom API).Select Application permissions (not Delegated permissions).Select the required permissions.Select Grant admin consent for <tenant>.This requires an administrator role.Verify the configuration with cURL.curl -X POST \ 'https://login.microsoftonline.com/<TENANT_ID>/oauth2/v2.0/token' \ -H 'Content-Type: application/x-www-form-urlencoded' \ -d 'grant_type=client_credentials&client_id=<CLIENT_ID>&client_secret=<CLIENT_SECRET>&scope=<SCOPE>'Replace the following values:
- <TENANT_ID>: Directory (tenant) ID from Step 1.
- <CLIENT_ID>: Application (client) ID from Step 1.
- <CLIENT_SECRET>: Client secret value from Step 2.
- <SCOPE>: API resource URI with /.default suffix. Scope format depends on what API your target protects (for example, api://<CLIENT_ID>/.default or https://graph.microsoft.com/.default). Check your Entra ID app's Expose an API blade for the correct Application ID URI.
Expected response:{ "token_type": "Bearer", "expires_in": 3599, "access_token": "eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiIs..." }Configure the authentication in the AI Red Teaming.Set the following on your target, replacing the placeholder values with your specific tenant ID, client ID, client secret, and scope:auth_type: OAUTH2 auth_config: { "oauth2_token_url": "https://login.microsoftonline.com/<TENANT_ID>/oauth2/v2.0/token", "oauth2_expiry_minutes": 60, "oauth2_headers": { "Content-Type": "application/x-www-form-urlencoded" }, "oauth2_body_params": { "grant_type": "client_credentials", "client_id": "<CLIENT_ID>", "client_secret": "<CLIENT_SECRET>", "scope": "<SCOPE>" }, "oauth2_token_response_key": "access_token", "oauth2_inject_header": { "Authorization": "Bearer {TOKEN}" } }