Exciting news! We are redesigning the Arctic Wolf Help Documentation site to provide a better user experience. Our new site will launch on May 1, 2024.

Managed Security Awareness


Managed Security Awareness Portal User Guide

Updated Mar 18, 2024

Update your Entra ID client secret

If you use Microsoft Entra ID (formerly Azure AD)® and your client secret has exprired, you can create a new Client Secret value with a valid expiration date.

  1. Sign in to the MS 365 Admin Center (formerly Azure Admin Portal).

  2. In the navigation menu, in the Identity section, click Applications > App registrations.

  3. Select the Arctic Wolf Managed Awareness registration.

    One of these messages will appear:

    • A certificate or secret is expiring soon. Create a new one →
    • A certificate or secret has expired. Create a new one →
  4. Click Create a new one →.

  5. On the Client secrets tab, click + New client secret.

    Note: Do not remove the expired client secret at this time.

    The Add a client secret pane opens.

  6. In the Description field, enter a description for the Client Secret value. For example, Arctic Wolf Secret.

  7. In the Expires list, select 730 days (24 months).

    Note: Arctic Wolf recommends that you select 730 days (24 months), but your organization might require a different expiration date. Select the expiration date that your organization recommends.

  8. Click Add.

  9. In the Client secrets tab, verify that the new client secret appears.

  10. For the new client secret, copy the Value value, and then save it in a safe, encrypted location. You will provide it to Arctic Wolf later.

    Tip: Click Copy to clipboard to avoid leading or trailing spaces.

    Note: You must copy the client secret Value immediately after creation. The Value is not accessible after you leave this page.

  11. For the expired client secret, click .

  12. In the confirmation dialog, click Yes.

  13. In a new browser tab, open the MA Portal.

  14. Click > User Management.

  15. On the Saved Credentials page, click Reset Integration.

  16. In the confirmation dialog, click Yes.

  17. On the New Integration page, configure these settings:

    • Integration Type — Select an integration type.

      Tip: The integration type is based on the error you received. For example, Microsoft Entra ID (formerly Azure AD), Google Workspace®, or CSV file.

    • Integration Nickname — Enter the description you used in the Azure Admin Portal. For example, Arctic Wolf Secret.

    • Application ID — Paste your Application ID. To find this value, go to the MS 365 Admin Center (formerly Azure Admin Portal), and then, on the App Registration page, click for the Application (client) ID.

    • Directory ID — Paste your Directory ID. To find this value, go to the MS 365 Admin Center (formerly Azure Admin Portal), and then, on the App Registration page, click for the Directory (tenant) ID.

    • Client Secret Value — Paste your client secret Value.

    • Client Secret Value Expiration Date — Enter the expiration date that you selected for the client secret in the Azure Admin Portal.

  18. Click Test Connection to make sure the permissions and criteria for the configuration are correct.

  19. In the confirmation dialog, click Acknowledge.

  20. Click Save Credentials.

  21. Click Settings > User Management.

  22. Make sure the desired AD Group is selected and synchronized.