Microsoft Entra ID

P0 is excited to announce the latest version of our Entra Integration, featuring two essential enhancements:

  • Just-in-Time Access for Roles: Enables users to request just-in-time access to Entra Directory Roles.

  • Security Perimeter: A dedicated compute resource running in your environment, acting as a secure buffer. Only the Security Perimeter is authorized to write to Entra role and group assignments, increasing resilience. This ensures that, even if P0 is compromised, malicious assignments cannot be written to your environment.

Note: The Security Perimeter requires a cloud computing environment.

The instructions in thus guide will install both the security perimeter itself and configure Just-in-time access through P0 This guide provides instructions for deploying with Microsoft Azure. For GCP or AWS integration, please contact [email protected].

Setting up Entra ID

  1. Navigate to Integrations on p0.app, then select Entra ID.

  1. Click IAM Management.

  1. Click Add tenant.

  1. Enter your Entra tenant ID and select either AzureCloud or AzureUSGovernment.

  1. Click Next.

  1. Choose either Console or Shell and complete the install instructions.

  1. Add the Client ID of the perimeter in the installer UI.

✅ Completion

After completing the steps above, your P0 Security Perimeter for Entra ID is ready to handle privileged access requests via the containerized Function App.

If you have further questions or require support for AWS or GCP integration, please contact [email protected].

Last updated