Onboarding Azure accounts
Onboarding an Azure subscription allows PingOne Privilege to automatically discover its resources and manage them for just-in-time access. The process involves creating a connector application in Azure, assigning it the necessary permissions, and then adding the account to PingOne Privilege.
Step 1: Create the Connector App in Azure
First, create an Azure App Registration to act as a service principal.
-
In the Azure Portal, go to Azure Active Directory > App Registrations and select New registration.
-
Name the application (e.g.,
ProcyonConnectorApp) and click Register. -
From the application’s Overview page, copy and save the Application (client) ID and the Directory (tenant) ID. You will need these later.
-
Go to Certificates & secrets and select New client secret.
-
Provide a description, set an expiration period, and click Add.
-
Immediately copy and save the secret’s Value. This is the App Key you will need later.
The client secret value is only displayed once. If you lose it, you must create a new one.
Step 2: Assign Required Roles
For each Azure subscription you intend to manage, you must assign the ProcyonConnectorApp several roles.
-
In the Azure portal, navigate to the target Subscription and select Access control (IAM).
-
Select Add > Add role assignment.
-
On the Role tab, find and select the role. For privileged roles, you must first select the Privileged administrator roles tab.
-
On the Members tab, click + Select members, search for your
ProcyonConnectorApp, and select it. -
Click Review + assign to complete the assignment.
-
Repeat this process to assign the following roles:
-
Reader -
User Access Administrator(Privileged role) -
Azure Kubernetes Service Cluster Admin Role -
Azure Kubernetes Service RBAC Cluster Admin
-
Step 3: Grant API Permissions
Next, grant the ProcyonConnectorApp the necessary Microsoft Graph API permissions.
-
In the Azure portal, go to Azure Active Directory > App Registrations and select your
ProcyonConnectorApp. -
In the sidebar, select API permissions.
-
Click + Add a permission, select Microsoft Graph, and then choose Application permissions.
-
Search for and add the following permissions:
Application.ReadWrite.OwnedBy Directory.Read.All Domain.ReadWrite.All IdentityProvider.ReadWrite.All RoleManagement.ReadWrite.Directory User.ReadWrite.All -
After adding the permissions, click Grant admin consent for <Your Directory>.
-
Verify that all permissions have a green checkmark in the Status column.
Step 4: Add the Azure Account to PingOne Privilege
Finally, use the credentials from the ProcyonConnectorApp to add the account to PingOne Privilege.
-
In the PingOne Privilege admin console, go to Cloud > Clouds.
-
Click Add Account Wizard and select the Azure icon.
-
Enter a Name and Description for the account. Click Next.
-
(Optional) Adjust the SAML and guest user settings if needed. Click Next.
-
Enter the Tenant ID, App ID, and App Key that you recorded earlier. Click Next.
-
Verify the details and click Verify & Add Account.