Azure Installation

1. Create a Microsoft Azure Integration Card in CloudWisdom

  1. Log in to CloudWisdom.
  2. Select Integrations.
  3. Select the Microsoft Azure card. microsoft-azure
  4. In a separate, new tab, open the Azure portal.

2. Create an Active Directory Application in Azure

  1. Once in the Azure portal, select Azure Active Directory from the left side-menu. azure-active-directory
  2. Select App registrations from the Manage options. app-registrations
  3. Select + New Registration at the top. new-registration
  4. Provide a name for the application (e.g., CloudWisdom-Integration).
  5. Select Accounts in this organizational directory only (Default Directory only - Single tenant) for Supported Account Types.
  6. Find the Redirect URI (optional) section. Select Web and input https://us.cloudwisdom.virtana.com. redirect-uri-url
  7. Select Register at the bottom of the window.

3. Get the Application ID, Application Key, & Tenant ID from Azure

Once you have completed part 2, you are redirected to the CloudWisdom-Integration’s overview page.

  1. Copy the Application (client) ID and paste the ID into the Client ID field in CloudWisdom. Then Copy the Directory (tenant) ID and paste it into the Tenant ID field. ids
  2. Select Certificates & secrets. certs-secrets
  3. Select + New client secret
  4. Provide a description and select an Expiration for the key. add-desc-expiration
  5. Select Add. The Secret is now listed in the Client secrets section.
  6. Copy the secret’s Value and return to the tab with CloudWisdom open. Paste it into the Access Key field. Once it’s pasted, return to the Azure tab.
    • Note: the access key is only shown in the Azure portal for a few minutes. copy-secret-value
  7. Return to Azure and select Overview.

Return to the Azure tab once you have added the Directory (Tenant) ID to your CloudWisdom integration.

4. Set Delegated Permissions in Azure

  1. In Azure, navigate to the API Permissions section of your CloudWisdom-Integration. api-permissions
  2. Select + Add a permission. A side panel appears.
  3. Select the Azure Service Management card. azure-service-management
  4. Select Delegated Permissions.
    • Note: Granting delegated permissions authorizes the registered application (CloudWisdom) to make requests to the Azure API only. Details of what data can be read is configured in the next step.
  5. Enable the user_impersonation permission. user-impersonation
  6. Select Add permissions.

5. Collect Subscription ID and Set Role

To assign a role to the application, you’ll need the Owner or User Access Administrator role in Azure (the Contributor role will not work) or a custom role that grants write access for Microsoft.Authorization.

  1. Navigate to Home > Subscriptions in Azure.
  2. Select the Subscription Name your new app belongs to.
  3. Copy the Subscription ID and return to the tab with CloudWisdom open. Paste it into the appropriate field. Once it’s pasted, return to the Azure tab. copy-subscription-id
  4. Navigate to this subscription’s Access Control (IAM) tab. access-control-tab
  5. Select Add > Add role assignment. A side panel appears. add-role-assignment
  6. Complete the following fields:
    • Role: Reader
    • Assign access to: Azure AD user, group, or service principal
    • Select: Enter the name of the app you created in section 2 and select the app.
  7. Select Save.

You can verify the permissions by selecting Role Assignments and searching for the CloudWisdom application.

After permissions have been set, return to CloudWisdom to include or exclude as many Azure element types as you want. Azure VM and Azure Application Gateway are enabled by default.

Optionally, filter elements.

Use with Agents

If you install our Linux agent or Windows agent on an Azure VM, the VM’s power state (attribute hostRunning with a value of true or false) and tags are copied over to the corresponding Linux SERVER element / Windows WINSRV element. You can then use this information to create policies.