Skip to content

CIPP Setup

CIPP (CyberDrain Improved Partner Portal) is an open-source Microsoft 365 management platform for MSPs. Once connected, Junto can manage users, reset passwords, configure MFA, manage mailboxes, monitor security alerts, handle devices, and much more across your M365 tenants.

Prerequisites

  • A CIPP instance with API access
  • Azure AD app registration credentials (Application ID, Application Secret, and Tenant ID)

Step 1: Create Azure AD App Registration

See CIPP API Setup & Authentication for detailed instructions.

  1. In Azure Active Directory, create a new app registration for Junto.
  2. Under Certificates & secrets, create a new client secret.
  3. Copy the Application (client) ID, Directory (tenant) ID, and the client secret value.

Step 2: Configure in Junto

  1. In Junto, go to Settings > Integrations > CIPP.
  2. Click Add Configuration and fill in:
    • Application ID -- The client ID from Step 1.
    • Application Secret -- The client secret from Step 1. This is encrypted before storage.
    • Tenant ID -- The Azure AD tenant ID from Step 1.
  3. Click Create. Junto validates the connection by listing your CIPP tenants.

Step 3: Map Companies to Tenants

  1. After connecting, Junto lists available tenants from your CIPP instance.
  2. Use the company mapping interface to link each Junto company to its M365 tenant.
  3. Auto-map is available with exact and fuzzy name matching. Exact matches are applied automatically; fuzzy matches are presented as suggestions for review.
  4. Save mappings.

What the AI Agent Can Do

User Management

ToolDescriptionRisk LevelApproval
List UsersList all M365 users with UPN, display name, status, and licensesLowNone
Get User DetailsView detailed information about a specific userLowNone
Add UserCreate a new M365 user accountHighAlways
Edit UserUpdate user properties (name, job title, department, phone, address)MediumOnce
Disable UserDisable a user accountHighAlways
Enable UserRe-enable a previously disabled user accountMediumOnce
Remove UserDelete an M365 user accountHighAlways
Reset PasswordReset a user's passwordHighAlways
Offboard UserFull offboarding: disable sign-in, reset password, revoke sessions, remove groups and licensesHighAlways
Dismiss Risky UserDismiss risk flag from Azure AD Identity ProtectionMediumOnce

MFA & Authentication

ToolDescriptionRisk LevelApproval
List MFA StatusView MFA registration status and Conditional Access coverage for all usersLowNone
Reset MFARe-require MFA registration for a userHighAlways
Set Per-User MFASet per-user MFA state (enabled, enforced, or disabled)HighAlways
Revoke SessionsRevoke all active sign-in sessions for a userHighAlways

Mailbox & Exchange

ToolDescriptionRisk LevelApproval
List MailboxesList all Exchange mailboxes for the tenantLowNone
Get Mailbox DetailsView detailed mailbox informationLowNone
Convert MailboxConvert between shared and regular mailbox typesMediumOnce
Enable ArchiveEnable the online archive mailbox for a userMediumOnce
Set Email ForwardingConfigure email forwarding for a mailboxMediumOnce
Set Out of OfficeEnable or disable out-of-office auto-reply with custom messageMediumOnce
List Mailbox RulesList all inbox rules across the tenantLowNone
Get Shared Mailbox StatsView statistics for shared mailboxes (size, item count, last logon)LowNone
Get Mailbox Client AccessView client access settings (OWA, ActiveSync, IMAP, POP)LowNone
List ContactsList Exchange mail contacts for the tenantLowNone
Trace MessagesTrace email messages to track delivery statusLowNone
List Shared Mailboxes with Sign-InIdentify shared mailboxes with sign-in enabled (security risk)LowNone
List Deleted ItemsList recently deleted M365 objects that can be restoredLowNone

Email Security

ToolDescriptionRisk LevelApproval
List Blocked SendersView tenant allow/block list entriesLowNone
Block SenderAdd a sender or domain to the tenant block listMediumOnce
Unblock SenderRemove a sender or domain from the block listMediumOnce

Security Monitoring

ToolDescriptionRisk LevelApproval
List Security AlertsView Microsoft Defender security alertsLowNone
Update Security AlertUpdate the status or assignment of a security alertMediumOnce
List Security IncidentsView Microsoft Defender security incidentsLowNone
Update Security IncidentUpdate the status or assignment of a security incidentMediumOnce
List Audit LogsView M365 audit logs (admin and user activity)LowNone
List Defender StatusView Defender protection status per deviceLowNone

Sign-In & Activity Monitoring

ToolDescriptionRisk LevelApproval
List Sign-InsView recent sign-in events with optional filtering for failed sign-insLowNone
Get AD Connect StatusCheck Azure AD Connect synchronization statusLowNone
List Inactive AccountsList accounts inactive for 6+ monthsLowNone

Device Management

ToolDescriptionRisk LevelApproval
List DevicesList Intune-managed devices with name, OS, compliance, and user infoLowNone
Get BitLocker KeyRetrieve the BitLocker recovery key for a deviceHighAlways
Sync DeviceTrigger an Intune sync to pull latest policiesMediumOnce
Reboot DeviceRemotely reboot a managed deviceMediumOnce
Retire DeviceRetire a device from Intune management (removes company data)HighAlways
Wipe DeviceFactory reset a device (erases all data -- cannot be undone)HighAlways
List Autopilot DevicesList Windows Autopilot enrolled devicesLowNone

Groups & Teams

ToolDescriptionRisk LevelApproval
List GroupsList all M365 groups (security, distribution, M365, mail-enabled)LowNone
Get Group MembersList all members of a groupLowNone
Get Group OwnersList all owners of a groupLowNone
Add GroupCreate a new M365 groupMediumOnce
Edit GroupUpdate group properties (name, description, visibility)MediumOnce
Edit Group MembersAdd or remove members and ownersMediumOnce
Delete GroupDelete an M365 group (permanently removes group and content)HighAlways
Hide Group from GALHide or unhide a group from the Global Address ListMediumOnce

Licensing & Tenant Admin

ToolDescriptionRisk LevelApproval
List LicensesView all M365 license subscriptions with usage countsLowNone
List TenantsList all managed tenants from CIPPLowNone
List DomainsList all domains registered in the M365 tenantLowNone
List RolesList Azure AD directory rolesLowNone
List Conditional Access PoliciesView all Conditional Access policiesLowNone
Add CA ExclusionAdd a user exclusion to a Conditional Access policyHighAlways
List Named LocationsView named locations used in Conditional Access policiesLowNone
List OAuth AppsList OAuth/enterprise applications registered in the tenantLowNone
List Service HealthCheck M365 service health and availability statusLowNone

Teams & SharePoint

ToolDescriptionRisk LevelApproval
List TeamsList all Microsoft TeamsLowNone
List Teams ActivityView Teams user activity (meetings, calls, chat counts)LowNone
List SharePoint SitesList SharePoint sites or OneDrive accounts with usage statisticsLowNone
Provision OneDrivePre-provision OneDrive for a user before their first loginMediumOnce

High-impact actions like user deletion, device wipes, and password resets always require explicit technician approval.

Troubleshooting

  • Connection fails -- Verify your Application ID, Application Secret, and Tenant ID. Ensure the Azure AD app registration has the required permissions.
  • No tenants listed -- Confirm your CIPP instance is configured with access to the expected M365 tenants.
  • User not found -- Check that the company mapping is correct for the target tenant.
  • Permission denied on action -- Some actions require specific Azure AD permissions. Verify the app registration has the necessary API permissions granted.
  • Device wipe or retire fails -- Ensure the device is enrolled in Intune and the app registration has device management permissions.