Configuring detection servers with MIP access credentials
For your MIP integration to work, you'll need to configure your detection servers with MIP access credentials in the Enforce Server administration console. You set up the credentials in Enabling MIP on the Azure Portal. You can add only one tenant to a Classification Credential Decryption. You can add multiple tenants to a Decryption Credential profiles. The example below shows how to add a Decryption Credential Profile; the process is the same for both types.
To configure detection servers with MIP access credentials
- Go toSystem > Settings > MIP Credential Profile.
- ClickAdd Profilein theMicrosoft Information Protection Decryption Credential Profilesection.
- Add aProfile Name(maximum of 100 characters).
- Add aTenant ID(maximum of 36 characters).
- Add anApplication IDfrom Microsoft Azure AD.
- Add anApplication Secret. You created this secret in Enabling MIP on the Azure portal.
- ClickSave.