Your Dynatrace environment can integrate with Microsoft Entra ID (formerly Azure Active Directory) in automation workflows. Azure Connector enables you to use prebuilt actions in Workflows to automate importing teams from Entra ID (based on various triggers) for defining entity ownership and other use cases in Dynatrace. Azure Connector connects to the Azure Cloud via the Microsoft Graph API.
Install Azure Connector
Allow outbound connections
Grant permissions to Workflows
Set up Microsoft Azure for integration with Dynatrace
Authorize connection to Microsoft Azure
Install Azure Connector from Dynatrace Hub to use actions from this app in Workflows.
To install Azure Connector, you need the app-engine:apps:install
permission.
After you install Azure Connector, you need to perform some initial steps to set up the connection between the Azure Cloud and your Dynatrace environment.
login.microsoftonline.com
and graph.microsoft.com
domain names.This way, you can granularly control the web services to which your Dynatrace environment can connect.
Workflows requires some permissions to run actions on your behalf. Actions that come bundled with Azure Connector require other permissions.
To fine-tune permissions granted to Workflows
app-settings:objects:read
For more on general Workflows user permissions, see User permissions for workflows.
Configure your Microsoft Azure tenant to establish a connection with your Dynatrace environment.
Open portal.azure.com
to access your Microsoft Azure tenant.
Navigate to App registrations to set up a new application.
For the necessary setup steps, see Register a client application in Azure Active Directory in Microsoft Azure documentation.
Grant your newly created Azure application the Group.Read.All
permission.
For more information, see API Permissions and Introduction to permissions and consent in Microsoft Azure documentation.
After registering the app, create a new client secret. For details, see Certificates & secrets in Microsoft Azure documentation.
Azure Connector requires a client secret from Microsoft Azure for authorization.
portal.azure.com
.
Client secret
To add connection settings, you need the following permissions.
ALLOW settings:objects:read, settings:objects:write, settings:schemas:read WHERE settings:schemaId = "app:dynatrace.azure.connector:microsoft-entra-identity-developer-connection"
For details, see Permissions and access.
Be aware that connections are shared and can be used by all users with app-settings
read permissions.
The get_groups
action available in Workflows after you install Azure Connector provides a way to get structured user group information from Microsoft Entra ID.
Go to Workflows and select Workflow in the upper-right corner of the page.
In the side panel, select the trigger best suited to your needs.
On the trigger node, select to browse available actions.
In the Choose action side panel, search for Azure Connector and select Get groups.
In the action Input, you can target specific groups in $filter if you wish to filter your results. Likewise, in $select, specify which fields you wish to get from Entra ID. The syntax is based on Entra ID API documentation.
Important for importing Entra ID groups as ownership teams:
id
and displayName
in $select
; these fields are mapped to the imported ownership team's Team identifier and Team name, respectively.mailNickname
parameter in get_groups
. This field has unique values in Entra ID and is set as a unique, human-readable Supplementary Identifier for your imported ownership team within Dynatrace.id
parameter, is set as the unique Team identifier as well as the External ID of the imported ownership team.mail
parameter is set as the Email of the imported ownership team.Optionally, insert the Import teams action (provided by the Ownership app ) to store Entra ID group information as ownership teams within Dynatrade Settings. You can then assign these imported teams as owners to any monitored entity in Dynatrace.
To test your workflow, select Run.
The result of get_groups
is a JSON array with each record consisting of a single user group. If $count is set to true
when configuring the action, the Results panel shows a count of imported groups.
The directory_id
displayed in the results is the Azure tenant ID.
The log of a successful run is shown below.
[INFO] Successfully retrieved connection settings.[INFO] Successfully fetched authentication token.[INFO] Calling Entra-ID groups endpoint with the following query params: $filter=startswith(displayName, 'team-deco')&$select=id,displayName,description,mail,mailNickname&$count=true&$top=999[INFO] Successfully fetched Groups from Entra-ID.