Entra ID Requirements and Considerations

Before you register an Entra ID source on Cohesity DataProtect as a Service, ensure the following requirements are met:

  1. Register a new application in your Microsoft Entra ID tenant.

  2. Create a new client secret for this application. The application ID and secret key are required when you register your Entra ID source in DataProtect as a Service. The client secret key value will only be visible when you create it; ensure to save it for later use.

  3. Add the following Microsoft Graph Application Permissions for the application created in step 1:

    • Directory.ReadWrite.All

    • Application.ReadWrite.All

    • AdministrativeUnit.ReadWrite.All

    • AppRoleAssignment.ReadWrite.All

    • RoleManagement.ReadWrite.Directory

    • Device.ReadWrite.All

    • Group.ReadWrite.All

    • OrgContact.Read.All

    • User.ReadWrite.All

    • User.DeleteRestore.All

Supported Object Types

Cohesity supports the protection of the following Microsoft Entra ID Object types:

  • User

  • Group

  • Devices

  • Administrative Unit

  • Application

  • ServicePrincipal

  • AppRoleAssignment

  • OrgContact

Entra ID Considerations

Before you register your Azure sources as a data source with Cohesity DataProtect as a Service, ensure that you have understood the considerations.

  • Application and Service Principal Deletion Behavior

    In Microsoft Entra ID, deleting an Application object automatically deletes its associated Service Principal (SP) object. To recover both, you must explicitly select both the Application and the SP object for recovery in the Cohesity interface.

  • Service Principal ID History

    • Application objects support the appId-based extension attribute, which tracks ID history.

    • Service Principal objects do not support this attribute. If an SP object is permanently deleted, it will be recreated during recovery with a new ID, but its ID history will not be maintained.

    • After recovery, correlating the restored SP object with the original is not possible.

    • Running recovery for the same SP object again will fail with the following error:

      "The associated AppId <appId> has a valid ServicePrincipal already created in Azure, so we cannot create another SP."
  • Limited Backup Support for Certain Application Properties

    Some properties of Application objects cannot be backed up, including web/homePageUrl and info/logoUrl.

  • Password Management for User Objects

    • If a User object is permanently deleted, the password is reset when the object is recreated during recovery.

    • For objects that are not permanently deleted and only require property recovery, the new password will not be applied.

  • Recovery Status Reporting

    • Cohesity does not display partial status for recovery operations. If any objects from the recovery list are successfully restored, the operation status will display as "Success."

    • If no objects are successfully restored, the operation status will display as "Failure."

    • The pulse logs capture up to 100 recovery failures for detailed troubleshooting.

  • No Rollback for Canceled or Failed Restores

    • If a restore operation is canceled or encounters a failure mid-operation, already restored objects will not be rolled back. For example:

      • Selecting 100 objects for recovery, and canceling the operation after 50 objects are restored, will not roll back those 50 objects.

      • If the network connection is lost during recovery, the operation will fail, but any objects restored before the failure will remain.

  • Multi-Tenant Application Scenarios

    Consider a multi-tenant application scenario:

    • Application App1 is created under Tenant A as a multi-tenant application.

    • Tenant B creates a Service Principal SP1 for App1.

    • If App1 is permanently deleted in Tenant A and then recreated, restoring SP1 in Tenant B will fail. This is because the recreated App1 will have a new appId, which cannot be found by the original SP1.

  • Running Multiple Browsing Sessions Impacts Backup and Recovery

    The platform does not close browsing sessions automatically. Running browsing sessions consumes resources. Hence, having multiple browsing sessions running will impact the backup and recovery performance. Ensure to close the browsing session by clicking the Tear Down button after the recovery is complete.

  • User Accounts in Microsoft Entra ID

    • Cohesity supports protecting B2E and B2B Microsoft Entra ID accounts.

      You must manually resend the invitation when recovering a B2B/guest user who was pre-eminently deleted. This ensures that the user can re-access the tenant.

  • Entra ID supports only Azure data plane.