Set up an Azure AD application
Cloud Manager needs permissions to set up and manage Azure NetApp Files. You can grant the required permissions to an Azure account by creating and setting up an Azure Active Directory (AD) application and by obtaining the Azure credentials that Cloud Manager needs.
Create the AD application
Create an Azure AD application and service principal that Cloud Manager can use for role-based access control.
You must have the right permissions in Azure to create an Active Directory application and to assign the application to a role. For details, refer to Microsoft Azure Documentation: Required permissions.
-
From the Azure portal, open the Azure Active Directory service.
-
In the menu, click App registrations.
-
Create the application:
-
Click New registration.
-
Specify details about the application:
-
Name: Enter a name for the application.
-
Account type: Select an account type (any will work with Cloud Manager).
-
Redirect URI: You can leave this blank.
-
-
Click Register.
-
-
Copy the Application (client) ID and the Directory (tenant) ID.
When you create the Azure NetApp Files working environment in Cloud Manager, you need to provide the application (client) ID and the directory (tenant) ID for the application. Cloud Manager uses the IDs to programmatically sign in.
-
Create a client secret for the application so Cloud Manager can use it to authenticate with Azure AD:
-
Click Certificates & secrets > New client secret.
-
Provide a description of the secret and a duration.
-
Click Add.
-
Copy the value of the client secret.
-
Your AD application is now setup and you should have copied the application (client) ID, the directory (tenant) ID, and the value of the client secret. You need to enter this information in Cloud Manager when you add an Azure NetApp Files working environment.
Assign the app to a role
You must bind the service principal to your Azure subscription and assign it a custom role that has the required permissions.
-
Create a custom role in Azure.
The following steps describe how to create the role from the Azure portal.
-
Open the subscription and click Access control (IAM).
-
Click Add > Add custom role.
-
In the Basics tab, enter a name and description for the role.
-
Click JSON and click Edit which appears at the top right of the JSON format.
-
Add the following permission under actions:
"actions": [ "Microsoft.NetApp/*", ],
-
Click Save, click Next, and then click Create.
-
-
Now assign the application to the role that you just created:
-
From the Azure portal, open the Subscriptions service.
-
Select the subscription.
-
Click Access control (IAM) > Add > Add role assignment.
-
In the Role tab, select the custom role that you created and click Next.
-
In the Members tab, complete the following steps:
-
Keep User, group, or service principal selected.
-
Click Select members.
-
Search for the name of the application.
Here’s an example:
-
Select the application and click Select.
-
Click Next.
-
-
Click Review + assign.
The service principal for Cloud Manager now has the required Azure permissions for that subscription.
-