Configure Azure Connectors
For supported software information, click here.
An Azure connector connects a system or service, such as Microsoft Information Protection (MIP), to Azure. After you create an Azure connector, you can create MIP labels and use them in DLP policies for actions such as set, remove, and match. Note that MIP is supported only on PDF, .docx, .xslx, and .pptx files. For more information about DLP, see Configure Data Loss Prevention in Concerto.
To create an Azure cloud connector, you must have the subscription ID, the tenant ID, the application/client ID, and the secret key for the user, which you can get from your Azure account.
Prerequisites
To sign in to the VOS application in the Azure Active Directory (AD), you need the following information from your Azure account:
- Application ID
- Client secret
- Subscription ID
- Tenant ID
To get these, see Get the Application ID, Tenant ID, and Client Secret.
Configure an Azure Connector
- Go to Configure > Security Service Edge > Profiles and Connectors > Azure Connector for MIP.

If there is no existing Azure connector, the following screen displays:
Otherwise, the following screen displays:

- Click Get Started or + Add.
- In the Azure Connector Configure window, enter information for the following fields. Note that you get the values for these fields from your Azure account. For more information, see Create an Azure AD Application.

Field Description Subscription ID Enter the Azure subscription ID. Client Enter the Azure application ID. Tenant ID Enter the Azure directory ID. Key Enter the Azure authentication key. - Click Next. In the following screen, enter a name for the Azure connector. You can also enter a description and one or more tags. A tag is an alphanumeric descriptor, with no white spaces or special characters, that you can use to search the connectors.

- Click Save.
Software Release Information
Releases 12.2.1 and later support all content described in this article.
