Connect an Azure account
- 1 minute to read
- Print
- DarkLight
- PDF
Connect an Azure account
- 1 minute to read
- Print
- DarkLight
- PDF
Article summary
Did you find this summary helpful?
Thank you for your feedback
To manage users, accounts, credentials, and virtual machines, you must configure an Azure account to integrate with senhasegura.
Info
Cloud IAM requests only the necessary permissions to prevent excess privileges.
Configure Azure
- Log in to your Azure account: portal.azure.com.
- Locate the service Azure Active Directory.
- On the left menu, select Application register.
- Select New register.
- Fill in the Name, Support account type, and URI redirect fields.
- Click Register.
Create a Client secret value
- Select an application in Azure.
- On the left menu, select Certificates and secrets.
- Click New Client Secret.
- Enter a description and expiration.
- Copy the Value of the Secret.
Select API permissions
- In Azure, select:
- On the left menu, select API permissions;
- Select the Microsoft Graph;
- The requested permissions are:
- Directory Role:
- Global Administrator
- Tenant root group role
- Owner
- API permissions:
- Delegated:
Directory.AccessAsUser.All
- Application:
Application.ReadWrite.All
AppRoleAssignment.ReadWrite.All
Directory.Read.All
Directory.ReadWrite.All
Organization.ReadWrite.All
RoleManagement.ReadWrite.Directory
User.ManageIdentities.All
User.ReadWrite.All
- Delegated:
- Directory Role:
Add an account in Cloud IAM
To add an account, navigate to the menu Cloud IAM > Settings > Accounts and follow the steps:
- Click the Actions icon and select the option Add account.
- On the Settings tab, enter a Name.
- Choose Yes or No for Active.
- Choose the Azure.
- Go to the Azure tab.
- Enter the Directory(tenant) ID.
- Enter the Application (Client ID) and Client Secret Value.
- Choose an access group.
- Click Confirm.
Was this article helpful?