Microsoft Entra ID (Azure Active Directory (AD)) is a cloud identity and access management solution for managing your employees' identities securely and effectively. Integrating your Beaconstac Cards account with Entra ID allows you to create digital business cards for your employees as soon as they enroll in your organization. For example, if you want to generate cards for ten employees who recently joined your organization, you can easily create and distribute cards for all the employees simultaneously.
Prerequisites
Beaconstac's Enterprise plan with admin privileges.
Microsoft Entra ID (Azure AD) active account with administrator privileges.
Integrate your Beaconstac account with Entra ID (Azure AD)
Get your Beaconstac account's API Key and Tenant URL
Sign in to your Beaconstac account.
Click Cards in the top-left.
If you are the account owner or admin of the master organization (super admin) and have multiple organizations, choose the organization that you want to integrate with Entra ID (Azure AD) from the top-right corner near bell icon.
Note: If you are an admin of any other organization, you can only integrate Entra ID (Azure AD) with that specific organization.
Click Integrations in the left menu, then click Active Directory.
Copy YOUR API KEY and Tenant URL.
Add your Beaconstac account to Entra ID (Azure AD)
Now, sign in to your Entra ID (Azure AD) account, then click Enterprise applications.
Click New application in the All applications tab.
Click Create your own application.
Name the app "Beaconstac", then select Integrate any other application you don't find in the gallery (Non-gallery).
Click Create.
Configure Entra ID (Azure AD) to integrate with Beaconstac
Click Provisioning under the Manage section in the left menu.
Click Get started.
Choose Automatic for the Provisioning Mode.
Paste the copied Tenant URL and YOUR API KEY in the Tenant URL and Secret Token fields, respectively.
Click Test Connection.
Wait until the connection is tested successfully, then click Save in the top-left corner.
Create and configure your Cards template
Go back to your Beaconstac account.
Click Cards in the top-left.
Click Integrations in the left menu, then click Active Directory.
Click Manage Configuration.
Under the Branding tab, add your logo by dragging or browsing the file.
Set the Font and Title Font Size that fits your brand and pick the colors that match your brand.
In the Layout tab, select a layout for your card.
In the Settings tab, you have the following options:
Directly download card on scan - Enable to directly download the card when the users scan the QR Code.
GPS location - Enable to track the location from where the scans are made.
Send email invites - Enable to send an invite to join your organization and password reset link to the newly onboarded users via email to make them join your organization and reset their Beaconstac account passwords.
Two-way contact sharing - Enable to collect the contact information of the people with whom the card is shared. You can choose the data you want to collect from the contacts. The Name, Email Address, and Company fields are mandatory.
Automatic domain-based user assignment - Enable to automatically assign users to their respective organization based on their domain.
Note: This feature can be enabled/disabled only by the organization’s owner or the admin of the master organization (super admin).Set up credentials - Enable to automatically import the newly onboarded users’s profile picture from Azure Active Directory to their cards. To obtain the credentials:
Sign in to your Azure Active Directory account.
Click Microsoft Entra ID.
Click App registrations in the left menu.
Click on the app “Beaconstac” from All Applications.
Copy the Application (client) ID and Directory (tenant) ID.
Click API permissions in the left menu.
Click + Add a permission, then click Microsoft Graph.
Click Application permissions, then search for User.Read.All and select it.
Click Add permissions.
Now, click Certificates & secrets, then click + New client secret.
Provide a description of the secret to be “Beaconstac profile picture” and choose the expiry date. Click Add.
Copy the Value.
Go back to Beaconstac, then paste the Application (client) ID, Directory (tenant) ID, and Value in the Client ID, Tenant ID, and Client secret fields, respectively.
In the QR Code template tab, you can either choose an existing template or create a new QR Code template by clicking Create a template.
Click Save.
Integrate Entra ID (Azure AD) with multiple organizations
Imagine you are the IT manager of a large IT company with three distinct departments. Each department is created as a separate Organization in Beaconstac for different purposes and requires Entra ID (Azure AD) integration. In this scenario, you can integrate each organization in Beaconstac with Entra ID (Azure AD) separately. Similar to how you integrate Entra ID (Azure AD) with a single organization, you would select the organization, create an enterprise application in Entra ID (Azure AD), and assign users. You can only create one enterprise application in Entra ID (Azure AD) for one organization. So, to integrate with other organizations, you can repeat this process for the other organizations as well.
To integrate Entra ID (Azure AD) with multiple organizations:
Sign in to Beaconstac as the account owner.
Click Cards in the top-left corner.
Choose the organization that you want to integrate with Entra ID (Azure AD) from the top-right corner near bell icon.
Note: While naming your app, give another name with respect to the organization for which you are integrating your Entra ID (Azure AD).
Test your Entra ID (Azure AD) integration
Go back to the Enterprise applications, then click "Beaconstac". Click Provisioning under the Manage section in the left menu.
Click Edit provisioning.
Expand the Mappings option, then disable Provision Azure Active Directory Groups. Click Save, then again click Save in the pop-up that appears.
Go back to Provisioning. Expand the Settings option, then choose the Scope of the provisioning either for all users and groups or only for the assigned users. We recommend selecting Sync-only assigned users and groups to implement the provisioning among a small pool of users to check whether the integration is successful. For testing purposes, you can assign it to one user alone and check whether a card is created for them in the Beaconstac dashboard QR codes view. To assign the app to a specific user:
Click Save in the top-left corner to save the settings you have done so far. Go back to the app's page by clicking Beaconstac | Provisioning, then click Users and groups under the Manage section in the left menu.
Click Add user/group, then click User. Select a user for whom you want to test the card creation.
Click Select, then click Assign.
Note: If you want to test whether the users are assigning properly, you can also enable provision on-demand for a small set of users by, clicking Provision on demand in the left menu, and assigning a user or a group.
5. Toggle the Provisioning Status to On, then click Save in the top-left corner.
Note: Please note that it will take about 40 minutes to create cards for the new employees who are being added to Entra ID (Azure AD). To know when your account has been last synced with Entra ID (Azure AD), go back to your Beaconstac Cards dashboard. Go to Integrations, then click Active Directory. You can view the time and date of the last sync.
Once done, all your employee cards will be listed on the Organization Cards page.
Delete users and their cards
When you delete a user from your Entra ID (Azure AD), they are automatically removed from Beaconstac account, and/or their card will also be deleted in the following cases:
When you add a user to Beaconstac via Entra ID (Azure AD), a user seat will be consumed, and their card will be created. If you remove that user from your Entra ID (Azure AD), their account and card will be deleted from Beaconstac, and the user seat will be freed.
When you add a user directly to your organization in Beaconstac by inviting them, a user seat will be consumed. If the same user also exists in Entra ID (Azure AD), when you sync, a card will be created for that user automatically. When you delete that user from your Entra ID (Azure AD), only their card will be deleted from your Beaconstac account. You need to manually remove that user from your organization in Beaconstac.
Please note that users with Viewers or Editors cannot delete the users or cards created via Entra ID (Azure AD) in your organization in Beaconstac.
Note: If you are trying to delete an admin or owner who has integrated Entra ID (Azure AD) with Beaconstac, please transfer their ownership to another user.