app/repository/providers/azure/info.json
{
"icon": "icon-azure",
"label": "Azure",
"method": ["Subscription Secret Key"],
"dc": "Azure",
"data": [
{
"label": "Subscription",
"service": "sub_azure",
"template": {
"intro": "Please add your Client Id, Secret, Tenant id and subscription Id.",
"dc": [
true,
false
],
"conn": [
{
"comp": "bs-input",
"validate": "required",
"metas": {
"class": "mt20",
"name": "client",
"label": "Client ID*"
}
},
{
"comp": "bs-input",
"validate": "required",
"metas": {
"name": "secret",
"label": "Secret Key*"
}
},
{
"comp": "bs-input",
"validate": "required",
"metas": {
"class": "mt20",
"name": "tenant",
"label": "Tenant ID*"
}
},
{
"comp": "bs-input",
"validate": "required",
"metas": {
"name": "sub",
"label": "Subscription Id*"
}
}
],
"extra": [
{
"comp": "accordion",
"validate": "",
"panel": [
{
"header": "Create and get Client ID",
"body": "Create application in Azure Active Directory and you can then note the application ID. <ol><li>Sign in to your Azure Account through the Azure portal.</li><li>Select Azure Active Directory.</li><li>Select App registrations.</li><li>Get Client ID and Tenant ID.</li></ol>"
},
{
"header": "Generate Authentication Key",
"body": "<b>Provide Permission</b>, select the application created and<ol><li>Go to Settings > Required permissions.</li><li>Click Add > Select an API > Windows Azure Service Management API and click Select.</li><li>Select required Delegated Permissions, click Select and then click Done.</li><li>Create a secret key</li><li>Select the application and go to Settings > Keys.</li><li>Add a description and expiry duration for the key and click Save.</li><li>The value of the key appears in the Value field.</li></ol>"
},
{
"header": "Get tenant ID",
"body": "When programmatically signing in, you need to pass the tenant ID with your authentication request. <ol><li>Select Azure Active Directory.</li><li>Select Properties.</li><li>Copy the Directory ID to get your tenant ID.</li></ol>"
},
{
"header": "Acquire Subscription ID",
"body": "Grant permission for the application to access subscription that you want to configure.<ol><li>Assign a role to the new application.</li><li>On the Azure portal, navigate to Subscriptions.</li><li>Select the subscription for which you want to grant permission to the application and note the subscription ID. </li><li>To grant permission to the application you created, choose Access Control (IAM).</li><li>Go to Add > Select a role. Pick the role as Reader. A Reader can view everything, but cannot make any changes to the resources of a subscription.</li><li>Select Azure AD user, group, or application in Assign Access to dropdown.</li><li>Type the application name in Select drop-down and select the application you created.</li><li>Click Save</li></ol>"
}
],
"metas": {
"name": "aws-p"
}
},
{
"comp": "p",
"validate": "",
"html": "More details about the setup <a href='http://docs.maestroserver.io/en/latest/userguide/cloud_inventory/autodiscovery/azure.html' target='_blank'>Maestro Azure</a>. </br>Can see more on <a href='https://docs.microsoft.com/en-us/azure/active-directory/develop/howto-create-service-principal-portal' target='_blank'>Portal Azure - Services</a>",
"metas": {
"name": "aws-p"
}
}
]
}
}
]
}