Skip to main content
Connecting your email provider is the first step to unlocking SaaS Management in Primo. It enables automatic user provisioning, SaaS discovery, and — when combined with offboarding — automated access revocation. Primo supports two email providers:

Google Workspace

Connect your Google Workspace organization to enable SaaS discovery, identity sync, and automated provisioning.

Microsoft Entra ID

Connect your Microsoft Entra ID (formerly Azure AD) tenant to enable identity sync and automated provisioning.

Google Workspace

What connecting Google Workspace enables

  • SaaS Discovery — automatically detect all apps accessed using Google sign-in across your organization.
  • Identity sync — import your users and groups from Google Workspace.
  • Automated provisioning — create, update, and suspend Google Workspace accounts as part of onboarding/offboarding workflows.
  • Data transfer at offboarding — transfer Drive files and email ownership when an employee leaves.

Connect Google Workspace

1

Go to Integrations in Primo

Navigate to Settings > Integrations and select Google Workspace.
2

Authenticate with a Google Workspace Super Admin account

You must authenticate as a Super Administrator to grant the required permissions.
3

Authorize the required scopes

Primo requests read access to users, groups, and org units — and write access for provisioning and offboarding actions.
4

Launch the initial sync

Once connected, Primo imports your users and groups. SaaS Mapping begins automatically.

What Primo accesses in Google Workspace

DataPurpose
Users (name, email, status)Identity sync and provisioning
Groups and org unitsApply provisioning rules
OAuth app accessSaaS Discovery mapping
Drive (at offboarding only)File ownership transfer

Microsoft Entra ID

What connecting Entra ID enables

  • Identity sync — import users and groups from your Entra tenant.
  • Automated provisioning — create, update, and disable Entra accounts as part of onboarding/offboarding.
  • Mac login via Entra — allow employees to log in to their Mac with their Entra credentials (see Entra Platform SSO).
SaaS Discovery via Entra is not yet available. Use the Chrome Extension for broader SaaS coverage. See Activate SaaS Discovery.

Connect Microsoft Entra ID

1

Go to Integrations in Primo

Navigate to Settings > Integrations and select Microsoft Entra ID.
2

Sign in as an Entra Global Administrator

You need Global Admin or a delegated admin role with the required API permissions.
3

Grant the required Microsoft Graph permissions

Primo requests permissions to read and write users, groups, and directory data.
4

Launch the initial sync

Once authorized, Primo imports your users and groups from the Entra tenant.

What Primo accesses in Entra ID

DataPurpose
Users (name, email, status, attributes)Identity sync and provisioning
GroupsApply provisioning rules
Application assignmentsSaaS visibility