Skip to content

Application Integration Requirements

Application Integration Requirements for Data Collector

Section titled “Application Integration Requirements for Data Collector”

Before integrating applications with the Data Collector for User Access Review (UAR) campaigns, it’s essential to gather comprehensive information about each application’s user authentication and access data capabilities. This information helps determine the best integration approach and ensures successful data collection.


To streamline the integration process, we’ve created a standardized template to collect key information about your applications. This information focuses specifically on user login information and access data extraction capabilities.

📥 Download Application Integration Template (CSV)

Use this CSV template to document details for each application you plan to integrate with the Data Collector.


For each application, please provide the following information:

  • The name of the application or system
  • Example: Salesforce, SAP ERP, Custom CRM
  • The platform or infrastructure where the application is hosted
  • Example: AWS, Azure, Google Cloud, On-Premise VMware, Physical Server
  • Specify whether the application is cloud-based or on-premise
  • Options: Cloud, On-Premise, Hybrid
  • Describe how user access information is currently extracted (if at all)
  • Examples:
    • Manual CSV export
    • Automated reports
    • SQL queries
    • Active Directory group membership exports
    • Entra ID (Azure AD) group queries via Microsoft Graph API
    • PowerShell scripts pulling AD/Entra group memberships
    • LDAP queries for user attributes and group memberships
    • Not currently extracted
  • Describe how users are granted access to this application
  • This is important because if access is managed through directory groups, we can extract user information directly from those groups
  • Examples:
    • Active Directory (AD) security groups
    • Entra ID (Azure AD) security groups
    • Application-specific user management (internal database)
    • LDAP groups
    • Hybrid (both AD/Entra groups and application-specific roles)
    • Single Sign-On (SSO) with group-based access control
    • Manual user provisioning
  • If using AD or Entra groups, please specify:
    • Group names or naming conventions used for this application
    • Whether group membership directly maps to application roles/permissions
  • Does the application provide an API for extracting user information?
  • Options: Yes, No, Unknown
  • If yes, specify the API type: REST, SOAP, GraphQL, Other
  • Can user data be extracted directly via SQL queries?
  • Options: Yes, No, Unknown
  • If yes, do you have the necessary database access credentials?
  • If SQL access is available, specify the database platform
  • Options: MS SQL Server, Oracle, MySQL, PostgreSQL, MongoDB, Other
  • Can users have multiple roles within this application?
  • Options: Yes, No, Unknown
  • This helps determine how the data should be structured for UAR campaigns
  • Are firewall rules or network access controls required to enable Data Collector connectivity?
  • Options: Yes, No, Unknown
  • If yes, specify the IP addresses/ranges or ports that need to be allowed
  • This helps identify network configuration changes needed before integration

  1. Download the CSV template using the link above
  2. Open in a spreadsheet application (Excel, Google Sheets, etc.)
  3. Fill in one row per application you plan to integrate
  4. Be as detailed as possible in the description fields
  5. Save the completed template for your records

Once you’ve completed the template:

  1. Review the information to ensure accuracy and completeness
  2. Share with your integration team or Glue support contact

Even if you’re unsure about certain details, document what you know. Unknown information can be investigated during the integration planning phase.

Consult with application administrators or vendors to obtain accurate technical information about data extraction capabilities.

Note any security constraints or compliance requirements that may impact how user data can be accessed or extracted.

Identify who has the necessary permissions to configure APIs, database access, or other extraction methods.

As your application landscape changes, update the template to reflect new applications or changes to existing ones.