SysTrack Cloud Authentication - Microsoft Entra ID

SysTrack Cloud uses Azure Active Directory B2C to authenticate users:

https://azure.microsoft.com/en-gb/services/active-directory-b2c/

This allows you to apply security controls and policy-based multi-factor authentication to the service and it allows your users to authenticate.

Standard Azure Active Directory Application

Here are the details for the Azure Active Directory application:

This application allows users to sign-in to the SysTrack Cloud and allows the application to read the profile of signed-in users. It also allows the application to read basic company information of signed- in users.

The permission requested is the User.Read permission as detailed here:

https://docs.microsoft.com/en-us/graph/permissions-reference#delegated-permissions-50

It only reads the users First Name, Last Name and email address.

Check the Enterprise Application Through the Azure Gallery

  1. Select your Azure Active Directory and go to the Enterprise Applications node.

  2. Select New Application.

  3. Search for Lakeside SysTrack Cloud.

  4. Select SysTrack Cloud Edition for information about the application.

Administrator Approval

To use SysTrack Cloud the SysTrack Cloud Edition Enterprise Application must be accepted.

If a user registers for the SysTrack Cloud and they get the following error message:

SysTrack Cloud Edition needs permissions to access resources in your organization that only an admin can grant. Please ask an admin to grant permission to this app before you can use it.

It means that user's account does not have the ability to grant consent for third-party applications.

An Azure Active Directory admin must go to the following link and grant consent to SysTrack Cloud for the organization: Azure AD Admin Consent

Modify the Application

In the Azure portal, do the following:

  1. Select your Azure Active Directory and go to the Enterprise Applications node.

  2. Select SysTrack Cloud Edition.

  3. You can control who has access to SysTrack or enforce policies like Conditional Access.