Azure Connection
Last updated
Was this helpful?
Last updated
Was this helpful?
Setting up an Azure Service Principal is required to allow GRAX to manage infrastructure in your Azure account. This involves a few more steps than the AWS setup, but those steps are outlined below for both the Azure Portal and the Azure CLI.
Navigate to the and login with a user that has the necessary permissions to create service principals.
Search for and open the App Registration
service.
Click New registration
.
Name the team 'GRAX' or something similar in accordance with your business' naming conventions and click Register
.
Copy the Application (client) ID
and Directory (tenant) ID
values from the Overview page to a safe location for later use.
Open the Service Principal you just created in the Azure Portal.
Click Certificates & secrets
.
Click New client secret
.
Name the secret 'GRAX' or something similar in accordance with your business' naming conventions.
Copy the Value
of the secret to a safe location for later use.
Navigate to the subscription you wish to deploy GRAX into.
Click Access control (IAM)
.
Click Add role assignment
.
Select the Owner
role under Privileged administrator roles
.
Click the Members
tab then search for and select the Service Principal you created earlier.
Use the Review + assign
tab to save the role assignment.
On the GRAX Platform team you'd like to use for creating a deployment, navigate to the Connections
tab and click Connect Azure
. Fill in the following values:
Tenant ID
: Use the Directory (tenant) ID
value from the App Registration.
Subscription ID
: Use the subscription ID of the Azure subscription you wish to deploy into.
Client ID
: Use the Application (client) ID
value from the App Registration.
Client Secret
: Use the Value
of the client secret you created.
Click Save
to save the connection.
az
)First, ensure that you are logged in:
Note: In the above JSON, id represents your Azure subscription id.
Next, set your active subscription:
Then, create a Service Principal to allow GRAX to manage infrastructure:
This returns the required authorization data for your Service Principal, as JSON.
Now you need to enter the following values into your Azure Connection details:
Fill the values as follows:
Tenant ID
: Use the "tenant"
value from the JSON.
Subscription ID
: This is your Azure subscription id.
Client ID
: Use the "appId"
value from the JSON.
Client Secret
: Use the "password"
value from the JSON.
Click Save
Click .