Add Microsoft Azure Credential
In order to allow Devopness to manage Azure resources on your behalf, Service Principal credentials have to be provided.
If you don't have access to an Azure account, you can create an account for free following the cloud provider specific guide Azure Free Services
-
Log in to Azure Portal
-
In the search bar, enter
App registrationsand select it -
In the navigation bar, select
New registration -
Type the Name of the application
- Tip: you might want to name the application as
devopnessto make it easier to track its activities
- Tip: you might want to name the application as
-
Under Supported account types, select
Accounts in this organizational directory only -
Under Redirect URI, select platform
Web -
Click
Register -
Copy the
Application (client) IDas the value ofclient_id -
Copy the
Directory (tenant) IDas the value oftenant_id -
In the navigation panel search bar on the left side, enter
Certificates & secretsand select it -
In the Client secrets tab, click
New client secret -
Type the Description of the client secret
-
Choose one option for Expires time
-
Click
Add -
Copy the
Valueof the client secret as the value ofclient_secret -
In the search bar, enter
Subscriptionsand select it -
Click on the
Subscription namelink of one of the subscriptions in the list -
Copy the
Subscription IDas the value ofsubscription_id -
In the navigation panel on the left side, select
Access control (IAM) -
You can set permissions by using an Azure pre-defined role or creating a custom role with only the necessary permissions
- Using a pre-defined role:
note- In the navigation bar, click on
Addand selectAdd role assignment - In the Role - Privileged administrator roles tab, select
Contributorrole - Click
Next - In the Members tab, click
Select members - In the
Select memberssearch bar, type the name of application and select it - Click
Selectand clickReview + assign - Ensure the Role Contributor and expected application are selected
- Click
Review + assignagain
- Using a custom role:
note-
In the navigation bar, click on
Addand selectAdd custom role -
Type the Custom role name of the role
- Tip: you might want to name the role as
devopnessto make it easier to identify
- Tip: you might want to name the role as
-
Under Baseline permissions, select
Start from scratch -
Click
Next -
In the navigation bar, click on
Add permissions -
Add each of the following permissions to the role:
Permissions
-
Microsoft.Authorization/roleAssignments {read}
-
Microsoft.Authorization/roleDefinitions {read}
-
Microsoft.Compute/disks {write}
-
Microsoft.Compute/virtualMachines {deallocate/action, delete, read, restart/action, start/action, write}
-
Microsoft.Network/networkInterfaces {delete, join/action, read, write}
-
Microsoft.Network/networkSecurityGroups {delete, join/action, read, write}
-
Microsoft.Network/networkSecurityGroups/securityRules {delete, read, write}
-
Microsoft.Network/publicIPAddresses {delete, join/action, read, write}
-
Microsoft.Network/virtualNetworks {delete, read, write}
-
Microsoft.Network/virtualNetworks/subnets {delete, join/action, read, write}
-
Microsoft.Resources/subscriptions/resourceGroups {read, write}
-
-
After adding the permissions, click
Review + createin the navigation bar -
Click
Create -
In Access control (IAM) page, in the navigation bar, click on
Addand selectAdd role assignment -
In the Role - Job function roles tab, search and select
your custom role -
Click
Next -
In the Members tab, click
Select members -
In the
Select memberssearch bar, type the name of application and select it -
Click
Selectand clickReview + assign -
Ensure the expected role and application are selected
-
Click
Review + assignagain
-
To add the credential to Devopness see Add a Credential