Automated Checks for the Dark Web Credentials

Modified on Fri, 25 Apr at 2:24 PM

The Automated Credential Checks feature simplifies how your organization identifies compromised user credentials detected in data breach events. Once configured, ShadowMap will seamlessly:


  • Automate verification by checking breached passwords against live user accounts in your Azure AD.
  • Streamline workflows by eliminating manual checks and reducing time-to-report.
  • Improve accuracy through consistent, repeatable credential validation.
  • Enhance security by surfacing valid compromised credentials faster, enabling quicker remediation.


Implementing this integration ensures that your security team can focus on remediation and risk reduction, rather than time-consuming manual verification.


1. Register an Azure AD Application

  1. Sign in to  Azure portal as a Global Administrator.
  2. Navigate to Azure Active Directory > App registrations > New registration.

  3. Enter the following:

    • Name: ShadowMap Credential Check

    • Supported account types: Choose Accounts in this organizational directory only.

    • Redirect URI: Leave blank (not required for backend credential checks).

  4. Click Register.


2. Grant API Permissions

  1. In the new app registration, go to API permissions.

  2. Click Add a permission > Microsoft Graph > Application permissions.

  3. Search for and add the following permissions:

    • User.Read.All

    • Directory.Read.All

  4. Click Grant admin consent for your tenant.


3. Create a Client Secret

  1. Go to Certificates & secrets.

  2. Under Client secrets, click New client secret.

  3. Provide a description (e.g., ShadowMap Credential Secret) and set an expiration.

  4. Click Add and copy the Value. This is your Client Secret.


4. Configure Automated Credential Checks in ShadowMap

  1. Log in to the ShadowMap portal as an administrator.

  2. Navigate to Settings > Workflow & Integrations > Automated Credential Checks.

  3. Enter your Azure AD OAuth details:

    • Tenant ID: <Directory (Tenant) ID>

    • Client ID: <Application (Client) ID>

    • Client Secret: <Client Secret>

    • API Scopes: https://graph.microsoft.com/.default

  4. Click Save to enable the integration.





Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article