Get required values + set up configuration to connect Azure cloud via public API

Log into your Azure Portal and navigate to the Microsoft Entra ID service (Formerly known as Azure Active Directory).

Select App registration

a computer screen with a bunch of numbers

Give the application a meaningful name, we need this name later.

Leave the "Supported account types" default: "Accounts in this organizational directory only".

Click "Register"

a computer screen with a picture of a person

You get redirected to the detail page of the newly created application. Here you can find and copy the Application (client) ID and the Directory (tenant) ID

a computer screen with a bunch of numbers

At the client credentials field, click "Add a certificate or secret"

a computer screen with a number of numbers

Click the "New client secret"-button, give a description for the secret and set the expiration date to 2 years (730 days / 24 months)

a computer screen with a picture of a person on it

Copy the Secret's Value

a television screen with a clock on it

Navigate to Subscriptions, Copy the Subscription ID of the relevant subscription.

a screen shot of a tv show with a computer

You now have all the required values to add the Azure Cloud via the Public API once the application setup is complete in Azure Portal.

Go to the subscription detail page. Now we need to make sure we grant access to the roles we need.

Click on "Access Control (IAM)".

a collage of different colored signs on a wall

Go to the Role assignments tab & Click on "Add", then "Add role assignment".

a collage of images showing a clock and a sign

In the "Role"-list, search and select "Security Reader" & Click "Next".

a computer screen with a picture of a person

Leave the "Assign access to"default value.

Click on "Select Members", search for the name of the app registration (e.g. "AikidoSecurity") you created and select it.

Click "Select"

Click "Review + assign" twice

a computer screen with a picture of a person

Repeat the role assignment process for the role "Log Analytics Reader".

Now the application has the required roles to do the security scanning. You can now add this cloud using the public API.

Last updated

Was this helpful?