What enterprise applications does Portnox Cloud install and use in Azure?

If you integrate Portnox Cloud with Entra ID as an authentication repository, or with Microsoft Intune for risk profiling and endpoint management, you will notice that Portnox Cloud installs specific enterprise applications in your Azure tenant as part of the integration process. This topic contains information about the purpose of each of these applications.

Enterprise application Purpose
Portnox Cloud Native App Used for verifying user credentials during RADIUS 802.1X authentication and AgentP enrollment. Required for Cloud to be able to use Entra ID as the authentication repository.
Portnox Cloud Web App Used for reading data from the tenant during integration provisioning, AD synchronization, and more. Required for Cloud to be able to use Entra ID as the authentication repository.
Portnox Cloud Intune Used for exchanging risk assessment and endpoint management information between Cloud and Intune. Required for integration with Microsoft Intune.
Portnox Cloud SCEP Validation Used for issuing SCEP certificates from Intune to endpoints. Required if you want to request SCEP certificates from Intune.
Portnox Cloud AgentP Enrollment Used for enrolling AgentP via Entra ID in multi-user mode. Required for AgentP if it’s running in multi-user mode with Entra ID authentication.
Portnox Cloud WebSSO Used for authenticating in the Portnox Cloud portal and the self-onboarding portal with Entra ID single sign-on.
Portnox Cloud Azure AD Integration Used to create the Native App, the Web App, and the Intune enterprise applications. You can delete it after completing automatic integration with Entra ID and/or Intune.
Portnox Zero Trust Network Access EAM Used to enable the Portnox Zero Trust Network Access service with Entra ID.
Portnox  Zero Trust Network Access EAM Used to enable the Portnox Zero Trust Network Access service with Entra ID EAM.
Portnox Zero Trust Network Access Perpetual Policy Enforcement Used by the Portnox Zero Trust Network Access service to revoke application access to devices that are blocked, agentless, or have reached the Block level in a risk policy.