Brivo Access
Administrators
Configuration
Account Settings
Enable Multi-factor Authentication
Managing Site Settings
Reset Multi-factor Authentication
Shared Access Setup & Group Sharing
Managing Account Settings
Setting up Multi-factor Authentication
Setting a custom Logo for BMP
Using your Multi-factor Authentication Recovery Code
Data Retention
Expire Unused Credential
What is Remote Access?
Configuring Personnel Control
Enabling COVID-19 Self Screening
Using Multi-factor Authentication
Schedules & Holidays
Notifications
Custom Fields
Commands
Credentials
Managing the Card Bank
Adding Cards - Swipe to Enroll
Issuing a Brivo Mobile Pass
Adding Cards - Bulk Upload
Managing Unknown Cards
How to use faceprint credentials
Creating a Brivo Door Station faceprint credential
Data Explorer
Introduction to Data Explorer
Using Data Explorer
Data Explorer Example: All Activity Bar Graph
Data Explorer Example: Creating a User & Group Count Visual
Data Explorer Example: Credential Audit by Type
Data Explorer Example: Device & Panel Relationships
Data Explorer Example: Expiring Credentials
Data Explorer Example: List of New Credentials Issued
Data Explorer Example: Recent Activity Data Table
Data Explorer Example: Recent Activity by Site
Data Explorer Example: Viewing Failed Access Events using Packed Bubbles
Data Explorer Example: Unique Users by Day
Creating a Deleted User Audit in Data Explorer
Creating a Credential Audit in Data Explorer
Devices
Applying a Schedule to an Elevators & Floors
Applying a Door Override
Applying a Schedule to a Door
Setting the Arming Mode of an Alula Panel
Using Device Status
Events
Global View
Integrations
Languages
Lockdown
Getting Started with Lockdown
Viewing Lockdown Scenarios
Creating a Lockdown Scenario
Creating a Wired Lockdown Configuration
Initiating a Lockdown
Clearing a Lockdown Scenario
Activating a Group-based Lockout
Excluding a Group from Lockdown
Occupancy Management
Reports
Running an Existing Report Configuration
Creating a New Report Configuration
Creating a New Report Schedule
Running an In/Out Report
Managing Report Jobs
Users & Groups
Suspending a User
Modifying Group Permissions
Exporting User Information
Issuing a PIN Code to a User
Creating a User in Access
Viewing User Recent Activity
Creating a Group
Issuing a Physical Credential
Using Badge Templates
Video
Brivo Access Release Notes
Brivo Access Firmware Release Notes
Brivo Mobile Pass
Brivo Mobile Pass Release Notes
Brivo Wallet Pass
Adding an Employee Badge to Apple Wallet
Adding an Employee Badge to Apple Watch
Employee Badge in Apple Wallet - FAQ
Brivo Mobile Pass FAQ
Favorite a door
Manually redeeming a Brivo Mobile Pass
Adding a widget on Android
Adding a widget on iOS
Opening a unit lock
Create a BMP Account
Linking a Brivo Smart Home Account
Enabling a Siri shortcut
Customize a door name
Inviting Guests
Controlling Thermostats
Redeeming your Brivo Mobile Pass
Brivo Hardware
Brivo Smart Home
Properties
Change the Digit Length for Randomly Generated Access Codes
Set Temperature for all Vacant Units
Set a Check Out Time
Manually Send a Pin Code Via Email
Set a Check In Time
Lock all Vacant Units
Change How Long Following Check-out that Codes are Unsynced
Changing a Property's Time Zone
Turn off all Lights in Vacant Units
Schedule Auto-Lockout Time for all Company Properties
Adding a Property
Create Scheduled Access for a Property
Schedule Guest Code Sync
Manually Send a Pin Code Via SMS
Change how long prior to Check-in that codes are synced
Schedule Guest Code Removal Sync
Scenes
Delete a Property Level Scene
Create a Property Level Scene
Activate a Property Level Scene
Edit a Property Level Scene
Users
Delete a Company Level User
Deleting a Property Level User
Adding a Company Level User
Edit a Property Level User
Adding a Property Level User
Creating an Access Schedule for a User
Edit a Company Level User
WiFi
Amazon Alexa
Adding the Brivo Smart Home Alexa Skill Using your Computer Browser
Adding the Brivo Smart Home Skill to Alexa Using your Mobile Device
Adding the Brivo Smart Home Skill Using Amazon Alexa
Integrations
Brivo Smart Home/Brivo Access Integration
Manually Refreshing Integrations
BookingSync Integration
CiiRUS Integration
FRS Integration
Guesty Integration
HSAPI Integration
Kigo Integration
LMPM Integration
Lodgix Integration
MRI Integration
MyVR Integration
Real Page Integration
Rent Manager Integration
Streamline Integration
Yardi Integration
Devices
Unpairing a Repeater
Installing a Gateway
Pairing a Honeywell T6 Thermostat
Gateway Install Tips
Unpairing a Lock
Pairing a Lock
Pairing a Repeater
Compatible Z-Wave Devices
Pairing an Outlet Module
Brivo Smart Home Release Notes
Brivo Visitor
Admins
Administrator Functions
Administrator Functions Overview
Location Name
Printer Configuration
Email Notifications
Host List
Auto Sign Out
Auto Refresh Host List
Accessing the Configuration Menu
Logging into Brivo Visitor
Configuring Brivo Access for use with Brivo Visitor
Configuring/Disabling Workflows
Reporting
Custom Questions
Document Agreement
Idle Screen Image
Visitors
Getting Started With Brivo Visitor
Brivo Visitor Release Notes
Identity and Access Management
- All Categories
- Identity and Access Management
- Identity Connector
- Azure
- Configure Identity Connector for Azure Active Directory
Configure Identity Connector for Azure Active Directory
Updated
by Alicia Allen
Overview
With Brivo's Identity Connector, customers can provision their Azure AD users and groups to Brivo Access, allowing them to manage onboarding and offboarding users in a single application.
Prerequisites
Before you begin, ensure that you have the following required elements:
- An active Azure Active Directory account
- An active Brivo Access account with an Identity Connector subscription
- An active Brivo Service administrator account (create a Brivo administrator with all user and group permissions solely for the integration)
Creating your secret token
- Log in to Brivo Access with your Brivo Service administrator account.
- In the Brivo Access interface, click on Configuration, then Applications Management on the left navigation bar. Click on the Azure AD tab and the Azure AD details page displays.

- In the Access Password field, enter the Brivo Service administrator password and click Submit.

- The Tenant URL and Secret Token fields will populate.
- Copy the Secret Token.

- The secret token will be used in the next section. when configuring Azure with Brivo Access.
Creating your Azure Enterprise application
- Click on the Microsoft Entra ID link, then on the Enterprise Applications link, and finally click on the + New application link.

- In the Add from the gallery text box, typo Brivo. Brivo Onair Identity Connector will appear as an option. Click on the Brivo application. Finally, enter a name for the application and click Create.

Configuring Azure with Brivo Access
- In the Enterprise Applications tab, select the previously created application.
- Select Provisioning, then click Get Started, and set the mode to Automatic.

- Use the URL https://identity-connector-service.prod.brivo.com/api/ActiveDirectory/v2/ and enter the secret token copied in Step 4 above.

- Click on the Test Connection button. If any errors occur, please contact Brivo Technical Support.

- After a successful test of the connection, destroy any previously stored copies of the secret token to reduce cybersecuirty risks. Should you ever need to reenter a secret token, you may recreate a new one in Brivo Access.
- When finished, click Save.

- In the Provisioning section under Mappings, select Provision Azure Active Directory Users.

- Under Target Object Actions uncheck the Delete checkbox.

NOTE: Delete must be unchecked. Brivo's Identity Connector does not support deleting users. Keeping this box checked will result in errors in the logs.
- In the Attribute list, click on objectID. Set the Match objects using this attribute field to Yes. Click Ok.

- In the Attribute list, click on userPrincipleName. Set the Match objects using this attribute field to No. Click Ok.

NOTE: Confirm your Attribute list matches the image below.

- Save the Attribute Mapping changes.

- Under the Manage column, select Users and Groups when adding user(s) or group(s) to be automatically provisioned from Azure Active Directory to Brivo Access.

- Under Add Assignment, click on Users and Groups to select a group. Under Users and Groups, select from the available groups by clicking on the Select button. Once selected, click on the Assign button.

- Click the Provisioning tab, then Start Provisioning.

NOTE: New users and groups typically appear in Brivo Access within 15-30 minutes of configuration. New custom fields will be added to users as shown below upon successful first provisioning.