Azure credentials for Cloud Management The credentials required for the instance to access Azure accounts are referred to as service principals. A service principal is the automated process, application, or service that the Azure admin configured to access the subscription that the admin specifies. Provide the credentials for your Azure service principal to the instance so that it can discover the Azure subscriptions for your organization. See Getting Started with Azure and Cloud Management for a video that explains the Azure and Cloud Management integration. Collect the Azure Client ID and Tenant ID Specify the Azure Client ID and Tenant ID while configuring the instance. Before you begin Role required: sn_cmp.cloud_admin. Procedure Log in to the Azure portal, navigate to Active Directory, and then select the directory that you work in. Click the application that you are working on and then click Configure. Copy the Tenant ID and the Client ID and save them into a text file. In any of the URLs, the Tenant ID is the text that is in the form of a GUID. For example, https://login.windows.net/d85131e4-1763-42d6-b9c7-b6bad64b3a51. Create Azure credentials (service principals) for Cloud Management You create a special credential — a Service Principal — to integrate with Microsoft’s Azure cloud technology. Depending on how permissions are set up, the process might require the assistance of your organization’s Active Directory or Azure administrators. Before you begin Role required: sn_cmp.cloud_admin A service principal on the Azure portal. Make sure that your user settings in Azure allow users to register applications. Also make sure that the Directory role is not set to user when users cannot create applications. You can always contact your Azure administrator to create a service principle. The Azure client ID, tenant ID, and GUID (subscription ID) which you obtain from the Azure portal. Table 1. Azure values required to define a Service Principal Cloud Management setting Location of the Azure setting Tenant ID Azure Active Directory > Properties > Directory ID Client ID Azure Active Directory > App registrations > Registered App.Application ID Secret Key Azure Active Directory > App registrations > Registered App > Settings > Keys (hidden) Account ID Azure Active Directory > Subscriptions > Subscription ID About this taskSee Getting Started with Azure and Cloud Management for a video that explains the Azure and Cloud Management integration. Procedure Navigate to Discovery > Credentials, and then select Azure Service Principal. Fill in the form fields (see table). Figure 1. Azure credentials Field Value Name Enter the name of the service principal to register with the instance. Tenant ID and Client ID Paste the values that you obtained from the Azure portal: The Tenant ID is the Directory ID in Azure. The Client ID is the of the ID of the application that you registered in Azure. If you do not have an application, you must create one under App registrations in the Azure portal. Authentication Method Select Client secret.Note: Client assertion is not supported. Secret key Paste the secret key that was generated while creating the Azure Service Principal in the Azure portal.This field appears when Authentication method is Client secret. Right-click the form header and click Save. Go to Access control (IAM) in the Azure portal and assign a role to the Azure application that you registered. The role must grant access to the subscription and allow manipulation of it. For example: the contributor or owner role. This allows API calls using the Azure credential to manipulate items in the subscription. What to do next If the Microsoft Azure Management Application (DEPRECATED) [com.snc.azure] plugin is active on your instance, you can click Get Subscriptions to automatically populate your subscriptions in the related list. Create a Service Account .