Files
SecDep/assets/pages/azure/Azure_setup.md

42 lines
1.7 KiB
Markdown

# Azure Authentication ✔️
For the Azure Resource Manager the fastest way to get started is by having access to the azure-cli tool. We only need this once.
1. Execute `az login` and follow the instructions to log in using a browser.
![Azure Login 1](../../images/azure/azure-1.png)
![Azure Login 2](../../images/azure/azure-2.png)
![Azure Login 3](../../images/azure/azure-3.png)
2. From the output of the command, take note of the tentantId value.
![Azure tentantId](../../images/azure/azure-4.png)
3. After running `az account list` take note of the id value.
![Azure Account List](../../images/azure/azure-5.png)
4. Create a new application with `az ad app create --display-name "AppName"`
5. With `az ad app list --display-name AppName` take note of the appId
![Azure appId](../../images/azure/azure-6.png)
6. Create a new service principal with `az ad sp create --id appId`
7. Get an id value from `az ad sp list --display-name AppName` to create a new role with `az role assignment create --assignee "id we got just now" --role Owner --scope /subscriptions/sub id we got`
![Azure id](../../images/azure/azure-6.png)
8. Head over to https://portal.azure.com/#view/Microsoft_AAD_RegisteredApps/ApplicationMenuBlade/~/Credentials/appId/appId we got/defaultBlade/AppRoles and create a new client secret to be used in for the authentication.
The values we need translate to the following:
* AZURE_TENANT_ID -> tentantId
* AZURE_SUB_ID -> id from step 3
* AZURE_APP_ID -> appId
* AZURE_PASSWORD -> value of the secret we added
Note: Make sure your subscription is registered to use at least Microsoft.Compute and Microsoft.Network.
From the subscriptions page and resource providers tab.