CoreView's Use of Administrative Credentials

Modified on Mon, 18 Jul 2022 at 12:13 PM

This article will cover how CoreView uses the administrative credentials provided during the set-up process.  

Overview 

During the sign-up process, you will be prompted to supply the User Principal Name of an Office 365 account that has been granted the Tenant Admin role in Office 365. This account is used temporarily by CoreView during the initial part of the sign-up process to connect with your Office 365 tenant and to initialize the creation of your CoreView Tenant.   

 

Note: The administrative credentials you provide during the sign-up are not stored or retained by CoreView.   

 

The administrative account used by the CoreView sign-up process does not need to be assigned an Office 365 license and can be a cloud-only account, such as ima_admin@acme.onmicrosoft.com.   

 

During the CoreView tenant creation, the sign-up process will create some Office 365 service accounts and it will assign them only the Global Reader permission. 

 

The number of service accounts created depends on the size of your Office 365 tenant, however those cannot be used to perform changes in any system. 

 

The service accounts created can be found on your Azure Active Directory tenant with the following naming convention: 

 

Graphical user interface, text, application 
Description automatically generated 

 

If needed, you could assign them a different name than the “Admin Read Only XY” for better recognition when searching. Please do not change their assigned User Principal Name.  

 

Furthermore, during the sign-up process please give consent to the following apps when prompted: 

 

Mandatory Apps: 

  • CoreView Portal: this app is created as soon as the first user logs in to the portal. It is required for the user to log in to CoreView web interface.  

    • Azure Active Directory Graph (1) 

    • Sign in and read user profile: allows users to sign into the app with their work or school accounts and allows the app to see basic user profile information. 

    • Microsoft Graph (1) 

    • Sign in and read user profile: allows users to sign into the app with their work or school accounts and allows the app to see basic user profile information. 


    CoreView Registration App: this is a temporary app used for service account creation and can be removed from tenants immediately after the signup process. 

  • Microsoft Graph (3) 

  • Sign in and read user profile – used to perform SSO from Azure AD to CoreView platform 

  • Read and write all users' full profiles – used to create Service Accounts on Azure AD 

  • Read and write all directory RBAC settings – used to assign Global Reader role to our Service Accounts 


  • CoreView API Integration: 

  • Microsoft Graph (33) 

  • Read all access reviews:allows the app to read access reviews on behalf of the signed-in user. 

  • Read all administrative units:allows the app to read administrative units and administrative unit membership without a signed-in user. 

  • Read all applications:allows the app to read applications and service principles on behalf of the signed-in user. 

  • Read all audit log data:allows the app to read and query your audit log activities, without a signed-in user. 

  • Read all call records:Allows the app to read call records for all calls and online meetings without a signed-in user.
    Read the names and descriptions of all channels: Read all channel names and channel descriptions, without a signed-in user.
    Read the members of all channels: Read the members of all channels, without a signed-in user.

  • Read Microsoft Intune apps: allows the app to read the properties, group assignments, and status of apps, app configurations, and app protection policies managed by Microsoft Intune, without a signed-in user. 

  • Read Microsoft Intune device configuration and policies:allows the app to read properties of Microsoft Intune-managed device configuration and device compliance policies and their assignment to groups, without a signed-in user. 

  • Read Microsoft Intune devices: allows the app to read the properties of devices managed by Microsoft Intune, without a signed-in user. 

  • Read Microsoft Intune RBAC settings:allows the app to read the properties relating to the Microsoft Intune Role-Based Access Control (RBAC) settings, without a signed-in user. 

  • Read Microsoft Intune configuration: allows the app to read Microsoft Intune service properties including device enrollment and third-party service connection configuration, without a signed-in user. 

  • Read directory data:allows the app to read data in your organization's directory, such as users, groups, and apps, without a signed-in user. 

  • View users' email address:allows the app to read your users' primary email addresses. 

  • Read all groups:allows the app to read group properties and memberships, and read the calendar and conversations for all groups, without a signed-in user. 

  • Read all group memberships:allows the app to read memberships and basic group properties for all groups without a signed-in user. 

  • Read all identity risk event information:allows the app to read the identity risk event information for your organization without a signed in user. 

  • Read all identity risky user information:allows the app to read the identity risky user information for your organization without a signed-in user. 

  • Read all identity user flows:allows the app to read your organization's user flows, without a signed-in user. 

  • Read all user mailbox settings:allows the app to read the user's mailbox settings without a signed-in user. Does not include permission to send mail. 

  • Read all hidden memberships:allows the app to read the memberships of hidden groups and administrative units without a signed-in user. 

  • Read organization information:allows the app to read the organization and related resources, without a signed-in user. Related resources include things like subscribed SKUs and tenant branding information. 

  • Read all usage reports:allows an app to read all service usage reports without a signed-in user. Services that provide usage reports include Office 365 and Azure Active Directory. 

  • Read all directory RBAC settings:allows the app to read the role-based access control (RBAC) settings for your company's directory, without a signed-in user. This includes reading directory role templates, directory roles, and memberships. 

  • Read your organization's security actions:allows the app to read security actions, without a signed-in user. 

  • Read your organization’s security events:allows the app to read your organization’s security events without a signed-in user. 

  • Read service health: Allows the app to read your tenant's service health information, without a signed-in user. Health information may include service issues or service health overviews.
    Read service messages: Allows the app to read your tenant's service announcement messages, without a signed-in user. Messages may include information about new or changed features.
    Get a list of all teams: Get a list of all teams, without a signed-in user.

  • Read the members of all teams: Read the members of all teams, without a signed-in user.

  • Read all users' teamwork activity feed:allows the app to read all users' teamwork activity feed, without a signed-in user. 

  • Sign in and read user profile: Allows you to sign in to the app with your organizational account and let the app read your profile. It also allows the app to read basic company information.

    Read all users' full profiles:allows the app to read user profiles without a signed-in user. 
  • Office 365 Management APIs (3) 

  • Read activity data for your organization:allows the app to read activity data for your organization. 

  • Read DLP policy events including detected sensitive data:allows the app to read DLP policy events, including detected sensitive data, for your organization. 


Optional steps: 

  • CoreView SharePoint Integration – API permissions: this app is used to retrieve additional details and security information from SharePoint and OneDrive, in particular OneDrive owners. 

  • Azure Active Directory Graph (2) 

  • Sign in and read the user profile 

  • SharePoint (1) 

  • Have full control of all site collections 


  • CoreView Recipient Permissions role on Exchange: This is a custom role with Get-RecipientPermission permission, which is required to retrieve SendAs permission on mailboxes during the import process and it's not included in the Global Reader role. A PowerShell script is provided during the provisioning process and must be executed on your tenant using an Exchange PowerShell session, opened with an Exchange Admin to create a specific ReadOnly CoreView Roles adding this missing cmdlet. 

    

Important Notes: 

  • All app and service accounts operations (create, update, delete) are performed system to system without human intervention. 

  • MFA should be enabled on all our service accounts following instructions on our Knowledge Base for the data center chosen for your tenant: How to Configure Allowed IP Addresses for CoreView Service Accounts  

  • Customers can choose to remove a part of the consent, and CoreView will create ad-hoc scripts to meet the required list. Please be aware that this will impact the quantity and quality of data imported. 

    

Additional Notes: 

For more information on Microsoft rights please refer to: 

 

During the signup process, CoreView creates between 2 and 9 read-only accounts (depending on the size of your tenant) and they are exclusively used to gather data from the environment and are not enabled to perform management changes within your environment. The CoreView system users do not require Office 365 licensing and are used only during this import procedure. 

 

They are the members of a CoreView group with Global Reader only permissions on tenants and cannot be used to perform changes on the system. 

 

The CoreView Role has the following assigned roles on Office 365: 

  • Global Reader 

  • CoreView Recipient Permissions (optional) 

Data are stored in different locations depending on the Data Center selected during the registration process: 

  • Canada DC: Canada East - Virginia 
  • US DC: East US - Virginia 
  • Europe DC: North Europe - Ireland 
  • Government DC: US Gov Virginia - Virginia  

 

Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select atleast one of the reasons

Feedback sent

We appreciate your effort and will try to fix the article