Info |
---|
This article explains how to set up a Cloudaware application in Microsoft Azure. Ensure you have the necessary permissions in the Azure portal. |
Table of Contents | ||
---|---|---|
|
Summary
To integrate Microsoft Azure with Cloudaware:
Create a new Azure application for Cloudaware.
Assign API permissions:
Azure Service Management
Delegated permissions:
user_impersonation
Microsoft Graph
Application permissions:
Directory.Read.All
Delegated permissions:
Directory.Read.All
Add role assignments:
Choose the scope
Assign roles underby assigning roles
Under
Tenant Root Group
for subscription auto-discoveryOr under Under a specific subscription
Roles:
Reader
Members: Application created in #1point 1
Upload a certificate from Cloudaware.
For detailed setup instructions, refer to the in-depth guidelines below.
...
Create Azure application for Cloudaware
Log in to the Azure portal. Select Microsoft Entra ID.
Under 'Manage', go to 'App registrations' → +New registration.
Set up the application as follows:
Name: cloudaware-api-access
Supported account types: Accounts in this organizational directory only (Default Directory only - Single tenant) OR Accounts in any organizational directory (Any Azure AD directory - Multitenant)
Redirect URI (optional): Web - https://cloudaware.com/
Click Register.
...
Ensure that all necessary permissions are assigned as below:
...
Click Grant admin consent for
<Directory Name>
to populate permissions.
...
Note |
---|
*To get the certificate from Cloudaware, refer to Setup Azure setup in Cloudaware → Add Azure Active Directory →Certificate. |
Click Add.
Once the certificate is uploaded, continue the configuration.
...
Go to 'Certificates & secrets' → the tab 'Client secrets' → +New client secret.
Set up the client secret:
Description: ca-api-key
EXPIRES: 730 days (24 months)
Click Add.Click Copy to clipboard to save the secret value.
Once the key is created and saved, continue the configuration.
! Next step - Azure setup in Cloudaware
...