Skip to main content

CIPP Integration Setup

How to connect CIPP to Junto for comprehensive Microsoft 365 tenant management.

Updated today

CIPP Setup

CIPP (CyberDrain Improved Partner Portal) is an open-source Microsoft 365 management platform for MSPs. Once connected, Junto can manage users, reset passwords, configure MFA, manage mailboxes, monitor security alerts, handle devices, and much more across your M365 tenants.

Prerequisites

  • A CIPP instance with API access

  • Azure AD app registration credentials (Application ID, Application Secret, and Tenant ID)

Step 1: Create Azure AD App Registration

See CIPP API Setup & Authentication for detailed instructions.

  1. In Azure Active Directory, create a new app registration for Junto.

  2. Under Certificates & secrets, create a new client secret.

  3. Copy the Application (client) ID, Directory (tenant) ID, and the client secret value.

Step 2: Configure in Junto

  1. In Junto, go to Settings > Integrations > CIPP.

  2. Click Add Configuration and fill in:

  3. Application ID -- The client ID from Step 1.

  4. Application Secret -- The client secret from Step 1. This is encrypted before storage.

  5. Tenant ID -- The Azure AD tenant ID from Step 1.

  6. Click Create. Junto validates the connection by listing your CIPP tenants.

Step 3: Map Companies to Tenants

  1. After connecting, Junto lists available tenants from your CIPP instance.

  2. Use the company mapping interface to link each Junto company to its M365 tenant.

  3. Auto-map is available with exact and fuzzy name matching. Exact matches are applied automatically; fuzzy matches are presented as suggestions for review.

  4. Save mappings.

What the AI Agent Can Do

User Management

Tool

Description

Risk Level

Approval

List Users

List all M365 users with UPN, display name, status, and licenses

Low

None

Get User Details

View detailed information about a specific user

Low

None

Add User

Create a new M365 user account

High

Always

Edit User

Update user properties (name, job title, department, phone, address)

Medium

Once

Disable User

Disable a user account

High

Always

Enable User

Re-enable a previously disabled user account

Medium

Once

Remove User

Delete an M365 user account

High

Always

Reset Password

Reset a user's password

High

Always

Offboard User

Full offboarding: disable sign-in, reset password, revoke sessions, remove groups and licenses

High

Always

Dismiss Risky User

Dismiss risk flag from Azure AD Identity Protection

Medium

Once

MFA & Authentication

Tool

Description

Risk Level

Approval

List MFA Status

View MFA registration status and Conditional Access coverage for all users

Low

None

Reset MFA

Re-require MFA registration for a user

High

Always

Set Per-User MFA

Set per-user MFA state (enabled, enforced, or disabled)

High

Always

Revoke Sessions

Revoke all active sign-in sessions for a user

High

Always

Mailbox & Exchange

Tool

Description

Risk Level

Approval

List Mailboxes

List all Exchange mailboxes for the tenant

Low

None

Get Mailbox Details

View detailed mailbox information

Low

None

Convert Mailbox

Convert between shared and regular mailbox types

Medium

Once

Enable Archive

Enable the online archive mailbox for a user

Medium

Once

Set Email Forwarding

Configure email forwarding for a mailbox

Medium

Once

Set Out of Office

Enable or disable out-of-office auto-reply with custom message

Medium

Once

List Mailbox Rules

List all inbox rules across the tenant

Low

None

Get Shared Mailbox Stats

View statistics for shared mailboxes (size, item count, last logon)

Low

None

Get Mailbox Client Access

View client access settings (OWA, ActiveSync, IMAP, POP)

Low

None

List Contacts

List Exchange mail contacts for the tenant

Low

None

Trace Messages

Trace email messages to track delivery status

Low

None

List Shared Mailboxes with Sign-In

Identify shared mailboxes with sign-in enabled (security risk)

Low

None

List Deleted Items

List recently deleted M365 objects that can be restored

Low

None

Email Security

Tool

Description

Risk Level

Approval

List Blocked Senders

View tenant allow/block list entries

Low

None

Block Sender

Add a sender or domain to the tenant block list

Medium

Once

Unblock Sender

Remove a sender or domain from the block list

Medium

Once

Security Monitoring

Tool

Description

Risk Level

Approval

List Security Alerts

View Microsoft Defender security alerts

Low

None

Update Security Alert

Update the status or assignment of a security alert

Medium

Once

List Security Incidents

View Microsoft Defender security incidents

Low

None

Update Security Incident

Update the status or assignment of a security incident

Medium

Once

List Audit Logs

View M365 audit logs (admin and user activity)

Low

None

List Defender Status

View Defender protection status per device

Low

None

Sign-In & Activity Monitoring

Tool

Description

Risk Level

Approval

List Sign-Ins

View recent sign-in events with optional filtering for failed sign-ins

Low

None

Get AD Connect Status

Check Azure AD Connect synchronization status

Low

None

List Inactive Accounts

List accounts inactive for 6+ months

Low

None

Device Management

Tool

Description

Risk Level

Approval

List Devices

List Intune-managed devices with name, OS, compliance, and user info

Low

None

Get BitLocker Key

Retrieve the BitLocker recovery key for a device

High

Always

Sync Device

Trigger an Intune sync to pull latest policies

Medium

Once

Reboot Device

Remotely reboot a managed device

Medium

Once

Retire Device

Retire a device from Intune management (removes company data)

High

Always

Wipe Device

Factory reset a device (erases all data -- cannot be undone)

High

Always

List Autopilot Devices

List Windows Autopilot enrolled devices

Low

None

Groups & Teams

Tool

Description

Risk Level

Approval

List Groups

List all M365 groups (security, distribution, M365, mail-enabled)

Low

None

Get Group Members

List all members of a group

Low

None

Get Group Owners

List all owners of a group

Low

None

Add Group

Create a new M365 group

Medium

Once

Edit Group

Update group properties (name, description, visibility)

Medium

Once

Edit Group Members

Add or remove members and owners

Medium

Once

Delete Group

Delete an M365 group (permanently removes group and content)

High

Always

Hide Group from GAL

Hide or unhide a group from the Global Address List

Medium

Once

Licensing & Tenant Admin

Tool

Description

Risk Level

Approval

List Licenses

View all M365 license subscriptions with usage counts

Low

None

List Tenants

List all managed tenants from CIPP

Low

None

List Domains

List all domains registered in the M365 tenant

Low

None

List Roles

List Azure AD directory roles

Low

None

List Conditional Access Policies

View all Conditional Access policies

Low

None

Add CA Exclusion

Add a user exclusion to a Conditional Access policy

High

Always

List Named Locations

View named locations used in Conditional Access policies

Low

None

List OAuth Apps

List OAuth/enterprise applications registered in the tenant

Low

None

List Service Health

Check M365 service health and availability status

Low

None

Teams & SharePoint

Tool

Description

Risk Level

Approval

List Teams

List all Microsoft Teams

Low

None

List Teams Activity

View Teams user activity (meetings, calls, chat counts)

Low

None

List SharePoint Sites

List SharePoint sites or OneDrive accounts with usage statistics

Low

None

Provision OneDrive

Pre-provision OneDrive for a user before their first login

Medium

Once

High-impact actions like user deletion, device wipes, and password resets always require explicit technician approval.

Troubleshooting

  • Connection fails -- Verify your Application ID, Application Secret, and Tenant ID. Ensure the Azure AD app registration has the required permissions.

  • No tenants listed -- Confirm your CIPP instance is configured with access to the expected M365 tenants.

  • User not found -- Check that the company mapping is correct for the target tenant.

  • Permission denied on action -- Some actions require specific Azure AD permissions. Verify the app registration has the necessary API permissions granted.

  • Device wipe or retire fails -- Ensure the device is enrolled in Intune and the app registration has device management permissions.

Did this answer your question?