# AQUILA - Setup Integration from Auth0 ## **Auth0 Integration Guide** Integrate **Auth0** to ingest identity-related logs such as login attempts, user authentications, MFA usage, and blocked requests to support identity threat detection and correlation. ### **Credentials & API Access Setup (Auth0)** Before setting up the integration, create a Machine-to-Machine application in Auth0 to collect logs via API. #### **Steps**: 1. **Log in** to the Auth0 Dashboard. 2. Go to **Applications → APIs**. 3. Create or select your **Management API** (typically named `Auth0 Management API`). 4. Under **Machine-to-Machine Applications**, authorize your log collector app. 5. Take note of the following credentials: - **Auth0 Domain** (e.g., `your-tenant.us.auth0.com`) - **Client ID** - **Client Secret** - **Audience**: usually `https://your-tenant.us.auth0.com/api/v2/`
Required DetailValue
Auth0 Domain`your-tenant.auth0.com`
Client IDFrom your M2M Application
Client SecretFrom your M2M Application
Audience`https://your-tenant.auth0.com/api/v2/`
Token URL`https://your-tenant.auth0.com/oauth/token`
### **Permissions Reference (Auth0 M2M App)** Ensure the app is granted the following scopes from the **Auth0 Management API**:
Data StreamScope Required
Login Activity`read:logs`, `read:users`
MFA Logs`read:logs`
Failed Logins`read:logs`
User Access Logs`read:users, `read:logs``
> 🔐 You can test token access using Postman or curl before ingesting. ### **Aquila Integration Configuration** #### **AQUILA – Microsoft 365 Integration** **1.** Log in to AQUILA click here - **[CyTech - AQUILA](https://cytechint.io/)**. Choose **Cyber Monitoring** and click the **small arrow icon** to redirect you to the Cyber Monitoring Dashboard. [![image.png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-07/scaled-1680-/pvtVUycKNLpiyZFP-image.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-07/pvtVUycKNLpiyZFP-image.png) 2\. In the dashboard, choose **Cyber Incident Management (SIEM and XDR)**. [![image.png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-05/scaled-1680-/i68EMO7YfIStKeyl-image.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-05/i68EMO7YfIStKeyl-image.png) 3\. Navigate through the leftmost top and click **Cyber Incident Monitoring**. [![image.png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-07/scaled-1680-/llqjBgJ5b1dlLdh8-image.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-07/llqjBgJ5b1dlLdh8-image.png) 4\. Navigate the "Cyber Monitoring" then hover the "Cyber Incident Management" till you see the settings. [![image.png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-07/scaled-1680-/z4rUEJDEBmsHf9kd-image.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-07/z4rUEJDEBmsHf9kd-image.png) 5\. Click the "Settings, and Navigate through **Settings>Log Source>Search Bar>Add to Agent**. [![image.png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-07/scaled-1680-/qMBu98h6WaqojM41-image.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-07/qMBu98h6WaqojM41-image.png) 6\. Choose your **Log Collector**. *(If you not yet installed your **Log Collector** please refer to this link -* [**Log Collector** **Installation.**](https://docs.cytechint.io/books/log-collector-installations)) [![image.png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-05/scaled-1680-/1VIERSAN80moG8fG-image.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-05/1VIERSAN80moG8fG-image.png) Step 7 and below is just a reference, this is still incomplete. Thorough investigation and research in progress to understand the flow and credentials required. 7\. In the integration settings follow the instructions given below. - Click the **drop arrow** to display the contents needed for the integration setup. - In the **Office 365 logs section** > **Disable** > **Collect Office 365 audit logs** [![image.png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-07/scaled-1680-/ykuDBJDprHeuotlo-image.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-07/ykuDBJDprHeuotlo-image.png) - Scroll down and go to **Microsoft Office 365 audit logs section**. - Input the credentials for **Directory(tenant) ID, Application(client) ID and the Client Secret Value**. - Finally, click **Next** to install the log source integration. [![image.png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-07/scaled-1680-/S6gIFsvuBjT6DxvM-image.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-07/S6gIFsvuBjT6DxvM-image.png) 8\. Wait for the **Successfull** window to display, this will confirm the successfull integration. [![image.png](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-05/scaled-1680-/CNFzJRIuFuvZIEdI-image.png)](https://cytechint-docs-bookstack.s3.amazonaws.com/uploads/images/gallery/2025-05/CNFzJRIuFuvZIEdI-image.png) *If you need further assistance, kindly contact our support at* ***support@cytechint.com*** *for prompt assistance and guidance.*