Skip to main content
All CollectionsFor Administrators
Cloud Labs: Bring Your Own Azure Account (Detailed)
Cloud Labs: Bring Your Own Azure Account (Detailed)

This articles will cover a more in depth process of bringing your Azure account into Vocareum

K
Written by Kevin Wesley
Updated over 2 weeks ago

Our Azure quickstart guide can be found here.

Setting up a Microsoft Entra ID app

  1. Sign in to the Azure Portal

  2. From the Azure services select 'Microsoft Entra ID'

  3. Select '+ Add' and then 'App Registration'

  4. Give the app a name. Select a Supported account type to determine who can use the application. Under Redirect URI select 'Web' for the type of application you want to create. Enter the URI where the access token is sent. You cannot create credentials for a native application. Once you have enter your values select Register at the bottom.

  5. You will now be redirected to the Overview of the app you have just created

  6. Note down the 'Application (client) ID' and 'Tenant ID' to share with Vocareum. These credentials are required to pass with our authentication request for singing in programmatically.

  7. If you have not already, you will need to create a certificate for an authentication key or client secret key

    1. Navigate to the App Registrations page in the Microsoft Entra admin center and select your App

    2. Next click on 'Certificates & secrets'

    3. Select 'Client secrets' and '+ New client secret'

    4. Include a description of the secret and set the duration. Select 'Add' when ready.

    5. The Value and Secret ID will now be displayed under the Cient secrets. Copy this value because you won't be able to retrieve the key later. You will need to provide the key value with the app ID to sign in as the application. Store the key value where your application can retrieve it.

Management Groups

Management groups are containers that help you manage access, policy, and compliance across multiple subscriptions. Create these containers to build an effective and efficient hierarchy that can be used with Azure Policy and Azure Role Based Access Controls.

Create a Management Group

  1. Log in to the Azure Portal

  2. Navigate to Azure Service and Select 'more services'

  3. Under the categories select 'Management and governance' and then use the search filter to find 'Management groups'. Hovering over Management groups will display a '+' symbol. Select this symbol to create a group.

  4. Fill the required field. You can name your management group whatever you want. When ready select 'Save'

For Resource Level Labs

  1. You will have to create one management group inside the management group that you have created for your org. You can name this management group as per your choice.

  2. Now move your new or existing subscriptions from your tenant root management group to the new management group you have created.

For Subscription Level Labs

  1. You will have to create one management group inside the management group that you have created for your org. You can name this management group as per your choice.

  2. Next you will create subscriptions programmatically into this subscription level lab group. To create subscriptions assign the following role to your app in 'Cost Management + Billing'

  3. Search for 'Cost Management' from your Azure portal.

  4. Select 'Access Control' and click '+ add'.

  5. From the 'Add role assignment' menu choose the 'Billing account owner' role.

  6. Select your app from the search bar below and press 'Add' when you are finished.

Assigning A Role to Your App in a Management Group

  1. Navigate to Management Group and select Access Control from the left side menu

  2. Assign the Owner role to your to your app. This role grants full access to manage all resources, including the ability to assign roles in Azure RBAC and enable Vocareum to fetch invoice of subscriptions linked with Management group.

  3. When ready select 'Review + Assign'

Create a Custom Role within your management group

Next you will need to create a custom role inside your organization's management group so that we can assign this role to the user within your organization which will enable the user to access Azure services. Because of this role users will be able to access resources offered by the subscription linked with your organizations management group.

  1. Go to your organization's management group

  2. Click on Access Control (IAM)

  3. Select '+ Add' and then 'Custom Role'

  4. Add a name for your custom role and when ready select 'Review + create'

  5. Share the Role ID of this custom role with Vocareum by finding the custom role from 'Access Control IAM'. Then navigate to 'Details' and select 'View'.

  6. Select 'JSON' and in the value for 'id' in the second line you will find the role id at the end of the string

API Permissions

For the app to access the resources API we will have to give it some API permissions

Allocate Permissions to an App

  1. From the Azure portal select Microsoft Entra ID.

  2. Navigate to and open 'Manage' and select 'App Registrations'

  3. Select your app and navigate to 'API Permissions'

  4. Click 'Add a Permission' and in the API Permission panel that opens select My APIs and select the API you registered as part of the prerequisites

    1. Delegated permissions are selected by default. Delegated permissions are appropriate for client apps that access a web API as the signed in user, and whose access should be restricted to the permissions you select in the next step. Leave Delegated permission selected for this example.

    2. Application permissions are for service or daemon type applications that need to access a web API as themselves, without user interaction for sign in or consent. Unless you have defined application roles for your web API, this option is disabled.

  5. Under 'Select Permissions' expand the resource whose scopes you defined for your web API, and select what permissions the client app should have on behalf of the signed-in user.

    1. If you used the example scope names specified in the previous quickstart, you should see 'Employees.Read.All' and 'Employees.Write.All'. Select 'Employees.Read.All' or another permission you might have created when completing the prerequisites.

  6. Select 'Add Permissions' to complete the process. You should now see the selected permissions under 'Configured' permissions


    โ€‹

API Permission Details

More information about the permissions granted to the Vocareum app can be found here

Setup Tenant in Microsoft Entra admin center

  1. Open the Microsoft Entra admin center

  2. Under 'Identity' select 'Overview' and click 'Manage Tenants'

  3. Select '+ Create'

  4. Select '+ Setup Tenant', fill in the required details and save

  5. Select 'Subscription Details', 'Add Subscription', fill in the required details and save

  6. Select 'Role Config', '+ add Role Config', fill in the required details and save

After this Vocareum will set up the account on behalf of the client.

Did this answer your question?