Find out Which Integration Type Best Suits Your Business
HYPR offers multiple ways to integrate with Microsoft Entra ID (formerly Azure AD). Each integration type serves different use cases and requirements.
HYPR Login Experience in CC
Use case
Integrating HYPR with Entra ID lets you access your organization's Entra ID-protected applications (such as Office 365) using HYPR's passwordless authentication instead of the standard username + password login. This integration leverages federation and requires at least a Microsoft Entra ID P1 subscription.
What will be the end result of completing this guide?
After completing this integration, enrolled users will no longer need to provide a password to login to Entra. After providing their username on the Entra sign in screen, they'll be redirected to the HYPR passwordless authorization flow. Essentially, HYPR intercepts the default Entra login process and replaces the password step with a more secure passwordless access. Non-enrolled users will be prompted to enter their Entra password after they click Sign In on the HYPR login screen.
Configuring the solution
The configuration involves setting up both the Entra ID side and the HYPR side of the integration:
Entra ID Setup:
- Register the HYPR Entra ID Application with name "HYPRAuthApp"
- Grant required API permissions (Directory.AccessAsUser.All)
- Set application-level scope with User.Read scope
- Create a client secret for authentication
- Create a service account on the onmicrosoft.com domain with required roles (Application administrator, Directory writers, Domain Name Administrators, Conditional Access administrator)
- Create a custom domain if needed
HYPR Control Center Setup:
- Add new Microsoft Entra ID integration
- Select "HYPR Login Experience" option
- Provide application name, domain name, tenant ID, client ID, client secret, and service account credentials
- Optionally enable HYPR Conditional Access Policy Template
Validating and testing the solution
To validate the integration:
- Verify the integration appears in the HYPR Control Center Integrations list
- Test self-enrollment by clicking "Enroll Myself" if your Entra username matches your HYPR Control Center username
- Register a device through the HYPR Device Manager
- Verify enrolled users appear in the integration's user management list
- Test the login flow by accessing an Entra ID-protected application
- Monitor the integration's Audit Trail for user activity
Deployment strategy and risk mitigation
For production deployment:
- Start with a pilot group of users to test the integration
- Communicate the new login process to end users before enabling the integration
- Ensure all required Entra ID licenses (P1) are assigned to test accounts
- Monitor the "Users Not Yet Enrolled" group in Entra ID for new users
- Have a rollback plan in case issues arise during deployment
- Consider implementing the Conditional Access Policy Template to control enrollment
HYPR Enterprise Passkey
Use case
HYPR Enterprise Passkey (a.k.a. the FIDO2 Mobile Authenticator pattern) enables your HYPR Mobile App-enabled device to act as a FIDO2 security key when authenticating through Microsoft Entra. This integration is currently in beta and supports various workstation setups including non-domain-joined, on-premises Active Directory, Entra Domain-joined, and Hybrid Entra Domain-joined environments.
What will be the end result of completing this guide?
After completing this integration, users who have been successfully enrolled via HYPR Passwordless will have their Enterprise Passkey automatically enrolled into Entra ID. When signing in to Entra ID on the browser, after entering their username users can authenticate with HYPR Enterprise Passkey by selecting security key. When logging into Windows, users will tap on their computer account on their HYPR Mobile application to sign in. The integration leverages Entra ID FIDO2 Provisioning API for seamless enrollment.
Configuring the solution
The configuration involves multiple steps:
Entra ID Setup:
- Register the HYPR Entra ID Application with required API permissions (Directory.AccessAsUser.All, UserAuthenticationMethod.ReadWrite.All)
- Create client secret or certificate for authentication
- Enable Security Keys in the Entra tenant with proper FIDO2 settings
- Enable Security Keys in Intune for Windows workstation support
HYPR Control Center Setup:
- Add new Microsoft Entra ID integration
- Select "Native Microsoft Entra Login Experience" for FIDO2 Mobile Authenticator
- Provide application name, tenant ID, client ID, and credentials
- Enable the integration after successful setup
- Configure and download the desktop client for Windows workstations
Workstation Requirements:
- Windows OS (macOS not yet supported)
- Entra domain-joined or hybrid-joined VMs or physical machines
- HYPR Passwordless client installed
- Proper patch levels and AES256_HMAC_SHA1 enabled for hybrid environments
Validating and testing the solution
To validate the integration:
- Verify the integration is enabled in HYPR Control Center
- Check that HYPR groups are created in Entra (Eligible for Pairing, Client Paired with HYPR, Client Paired with Entra)
- Test pairing a HYPR Enterprise Passkey on a supported workstation
- Verify users can authenticate to Entra ID using the security key option
- Test Windows login using the HYPR Mobile app
- Monitor user management states (Paired with HYPR, Paired with Entra)
Deployment strategy and risk mitigation
For production deployment:
- Ensure workstation OS patch level requirements are met
- Verify domain controller patch levels for hybrid environments
- Test with a pilot group of users across different workstation configurations
- Communicate the new authentication method to end users
- Have a rollback plan for workstation configurations
- Monitor known issues and FAQs from Microsoft regarding FIDO2 security keys
- Consider administrative account limitations and additional configuration requirements
External Authentication
Use case
Integrating HYPR with Entra ID via External Authentication Methods (EAM) lets you access your organization's Entra ID-based applications (such as Office 365) using HYPR passwordless authentication as a phishing resistant multi-factor authentication method. This integration is currently in beta and is part of Microsoft's EAM public preview launched in May 2024.
What will be the end result of completing this guide?
After completing this integration, users who have been successfully enrolled via the HYPR Device Manager can fulfill multi-factor authentication requirements through HYPR. After providing their username on the Entra ID sign in screen and authenticating with their password, they'll be redirected to the HYPR passwordless authorization flow. Then they can use their registered HYPR authenticator to complete the login process and get back to Entra ID. This provides an additional layer of security while maintaining the familiar Entra ID login experience.
Configuring the solution
The configuration involves setup on both sides:
Entra ID Setup:
- Register the HYPR Entra ID Application with required API permissions (openid, Policy.ReadWrite.AuthenticationMethod, profile, User.ReadWrite.All, Directory.ReadWrite.All)
- Create client secret or certificate for authentication
- Configure application authentication with web redirect URI
- Create External Authentication Method with proper discovery endpoint
- Enable MFA for the target user group
- Set Conditional Access Policies requiring multifactor authentication
HYPR Control Center Setup:
- Add new Microsoft Entra ID integration
- Select "Microsoft Entra ID External Authentication Method"
- Provide application name, tenant ID, client ID, and credentials
- Complete the integration setup
Final Entra ID Configuration:
- Configure application authentication with HYPR redirect URL
- Create External Authentication Method with HYPR discovery endpoint
- Enable MFA for the HYPR EAM group
- Set Conditional Access Policies targeting the group
Validating and testing the solution
To validate the integration:
- Verify the integration appears in HYPR Control Center
- Test self-enrollment if username matches HYPR Control Center username
- Register a device through HYPR Device Manager
- Verify enrolled users appear in the integration's user management list
- Test the MFA flow by accessing an Entra ID-protected application
- Verify users are redirected to HYPR for second-factor authentication
- Monitor the integration's Audit Trail for authentication events
Deployment strategy and risk mitigation
For production deployment:
- Start with a pilot group of users to test the MFA flow
- Communicate the new MFA process to end users
- Ensure all required Entra ID licenses (P1) are assigned
- Test Conditional Access Policies in report-only mode first
- Monitor the "Users Not Yet Enrolled" group in Entra ID
- Have a rollback plan for MFA policies
- Consider user communication plan for the new authentication flow