Microsoft Entra ID

Microsoft Entra ID

The Microsoft Entra ID integration connects mTime with your Azure Active Directory tenant. It syncs employee data from Microsoft Graph API so your mTime employee list stays up to date with your directory.

Entra ID integration detail page
Entra ID integration detail page

What it syncs

The integration imports the following data from Entra ID into mTime:

  • Employees — Full name, preferred name, and email address
  • Active status — Whether the user account is enabled or disabled in Azure AD
Entra ID syncs employee records only. It does not import employments, organization units, or manager relationships.

How it works

Entra ID exposes user data through the Microsoft Graph API. mTime connects using an Azure AD app registration with the User.Read.All permission and fetches all users from your tenant. After the initial sync, only changes are applied — employees won’t be duplicated.

The sync runs automatically on a schedule. You can also trigger it manually from the integration detail page.

Attributes added by Entra ID

When the integration is active, it adds a read-only attribute to synced employees:

AttributeDescription
Entra ID User IDThe user’s unique identifier in Microsoft Entra ID

This appears in the “Integration attributes” section on each employee. See Custom attributes for more about how integration attributes work.

Getting started

Prerequisites

You need an Azure AD app registration with the following:

  • Application (client) ID — found on the app registration overview page
  • Client secret — created under “Certificates & secrets”
  • Tenant ID — found in Azure Portal under Entra ID > Overview
  • API permissionUser.Read.All (application type, with admin consent granted)

Setting up the integration

  1. Go to SettingsAdministrator settingsIntegrations
  2. Find Microsoft Entra ID in the list and click it
  3. Enter your Tenant ID and Client ID in the configuration section
  4. Enter your Client Secret in the credentials section
  5. Click Save — mTime will test the connection before saving

Once the credentials are validated, turn on the integration to start syncing.

Configuration options

OptionDescription
Tenant IDYour Azure AD tenant ID (found in Azure Portal > Entra ID > Overview)
Client IDApplication (client) ID from your app registration
Domain filterOnly sync users whose email ends with this domain (e.g. example.com). Leave empty to sync all users
Include disabled usersWhen turned on, also syncs users with disabled accounts (they are marked as inactive in mTime)

What to expect after the first sync

Once the integration has run for the first time:

  • Employees from your Azure AD are created in mTime — you can find them in OrganizationEmployees
  • Each synced employee gets the Entra ID User ID attribute
  • Disabled users are skipped by default (unless “Include disabled users” is turned on)
  • If a domain filter is configured, only users with matching email addresses are imported

Troubleshooting

IssueSolution
“Connection test failed”Verify your tenant ID, client ID, and client secret are correct. Make sure admin consent is granted for User.Read.All
No employees syncedCheck if a domain filter is set that doesn’t match your users’ email addresses
Missing employeesUsers without an email address or with disabled accounts are skipped by default. Turn on “Include disabled users” to import them
“Credentials not configured”Enter and save the client secret in the credentials section

Next steps

Once the integration is running, see Integrations for how to check sync status, trigger manual syncs, and troubleshoot issues.