Part 1 : Create . Create Application and get Application ID, Directory ID Create application in Azure Active Directory and you can then note the application ID. - Log on to the Microsoft Azure console
. Go to - and press Azure Active Directory
in - in the left navigation pane
, then - .
- Click App Registrations > New registration.
Click New registration and provide these - Provide the following details:
- Name: A name for the application (e.g. My_Azure_Connector)
- Supported account types: Select Accounts in any organizational directory
Click - Click Register. The newly created is displayed with its properties. Copy
the - the Application (client)ID
and - and Directory (tenant)IDand paste it into the connector details
on the New Connector page in AMP- .
Part 2: 2. Generate Authentication Key Provide permission to the new application to access the Windows Azure Service Management API and create a secret key. Provide Permission - Select the application that you created and go
to - to API permissions > Add a permission.
Select - Select Azure Service Management API
in - in Microsoft APIs for Request API permissions.
Select Part 3: - Select user impersonation
permission and click Add permissions.Click Add a permission. Select Microsoft Graph in Microsoft APIs for Request API permissions. Select Application permissions and expand User permissions and select User.Read.All permission and click Add permissions.A confirmation notification “Permissions have changed. Users and/or admins will have to consent even if they have already done so previously.” is displayed on success. - permission and click Add permissions.
Create a secret key - Select the application that you created and go
to - to Certificates and Secrets > New client secret.
- Add a description and expiry duration for the key (recommended: Never) and
click - click Add.
- The value of the key appears in the Value field.
Copy the key value at this time. You won’t be able to retrieve it later. Paste the key value into the Authentication Key field in AMP on the New Connector page.Part 4: as Authentication Key into the connector details. You need to provide the key value with the application ID to log on as the application. Store the key value where your application can retrieve it. 3.Acquire Subscription ID Grant permission for the application to access subscription that you want to configuresubscriptions. Assign a role to the new application. The role you assign will define the permissions for the new application to access subscriptions. - On the Azure portal, navigate
to - to Subscriptions.
- Select the subscription for which you want to grant permission to the application and note the subscription ID.
Assign two roles (Reader role and a custom role to the application).Assign Reader Role - To grant permission to the application you created,
choose - choose Access Control (IAM).
- Go
to - to Add > Add a role assignment. Pick
the role as Reader- a Reader role. A Reader can view everything but cannot make any changes to the resources of a subscription.
Select Azure AD user, group, or service principal in Assign Access to dropdown. Type the application name in Select drop-down and select the application you created. Click Save to finish assigning the role. You’ll see your application in the list of users assigned to a role for that scope. Assign Custom Role Before you assign the custom role, create the custom role (QRole). Learn more Go to Add > Add a role assignment. Pick the custom role you created (QRole). The custom role can view but cannot make any changes to the resources of a subscription Select - Note: You need to assign the Reader role if the same application is used in AssetView and CloudView module. If the application usage is limited to only AssetView module (and not in CloudView module), you need to have at least below permissions on the built-in or custom role assigned to the subscription. - "Microsoft.Compute/virtualMachines/read", - "Microsoft.Resources/subscriptions/resourceGroups/read", - "Microsoft.Network/networkInterfaces/read", - "Microsoft.Network/publicIPAddresses/read", - "Microsoft.Network/virtualNetworks/read", - "Microsoft.Network/networkSecurityGroups/read"
- Select Azure AD user, group, or
service principal in - application in Assign Access to dropdown.
- Type the application name in Select drop-down and select the application you created.
Click - Click Save
to - to finish assigning the role. You’ll see your application in the list of users assigned to a role for that scope.
- Copy
the - the subscription ID
you - you noted and paste it into the connector details in AMP on the New Connector page and click
Add - Create Connector.
|