Setup in your Azure
Last updated
Last updated
Here is a guide on how to connect your credentials to NetBook.
We wish to simplify the process so that you would need minimal intervention from your IT teams.
Sign in to your Azure Account through the Azure portal.
Select Azure Active Directory.
Select App registrations.
Select New registration.
Name the application. Select a supported account type, which determines who can use the application. You've created your Azure AD application and service principal.
You've created your Azure AD application and service principal.
Sign in to the Azure portal.
Select Azure Active Directory > App registrations, and then select your client application (not your web API).
Select API permissions > Add a permission > Microsoft APIs.
Select the Azure Service Management -> Check user_impersonation.
Select Add permissions to complete the process.
After adding permissions to your API, you should see the selected permissions under Configured permissions.
You might also notice the User.Read permission for the Microsoft Graph API. This permission is added automatically when you register an app in the Azure portal.
For Authentication, we need to create application secret.
Select Azure Active Directory.
From App registrations in Azure AD, select your application.
Select Certificates & secrets.
Select Client secrets -> New client secret.
Provide a description of the secret, and a duration. When done, select Add.
After saving the client secret, the value of the client secret is displayed. Copy this value because you won't be able to retrieve the key later. You will provide the key value with the application ID to sign in as the application. Store the key value where your application can retrieve it.
Sign in to the Azure portal.
Select Resource groups
3. Select Add.
4. Enter the following values:
Subscription: Select your Azure subscription.
Resource group: Enter a new resource group name.
Region: Select an Azure location, such as East US.
5. Select Review + Create
6. Select Create. It takes a few seconds to create a resource group.
7. Select Refresh from the top menu to refresh the resource group list, and then select the newly created resource group to open it. Or select Notification(the bell icon) from the top, and then select Go to resource group to open the newly created resource group.
In Azure RBAC, to grant access, you assign an Azure role.
In the list of Resource groups, open the new netbook resource group.
In the navigation menu, click Access control (IAM).
Click the Role assignments tab to see the current list of role assignments.
4. Click Add > Add role assignment.
If you don't have permissions to assign roles, the Add role assignment option will be disabled.
5. On the Role tab, select the Contributor role.
6. On the Members tab, select yourself or another user.
7. On the Review + assign tab, review the role assignment settings.
8. Click Review + assign to assign the role.
After a few moments, the user is assigned the Virtual Machine Contributor role at the example-group resource group scope.
If you have access to multiple tenants, use the Directory + subscription filter in the top menu to select the tenant containing your client app's registration.