Configuring detection servers with MIP access credentials

For your MIP integration to work, you'll need to configure your detection servers with MIP access credentials in the Enforce Server administration console.  You set up the credentials in Enabling MIP on the Azure Portal. You can add only one tenant to a Classification Credential Decryption.  You can add multiple tenants to a Decryption Credential profiles. The example below shows how to add a Decryption Credential Profile; the process is the same for both types.
To configure detection servers with MIP access credentials
  1. Go to
    System > Settings > MIP Credential Profile
    .
  2. Click
    Add Profile
    in the
    Microsoft Information Protection Decryption Credential Profile
    section.
  3. Add a
    Profile Name
    (maximum of 100 characters).
  4. Add a
    Tenant ID
    (maximum of 36 characters).
  5. Add an
    Application ID
    from Microsoft Azure AD.
  6. Add an
    Application Secret
    .  You created this secret in Enabling MIP on the Azure portal.
  7. Click
    Save
    .