PingOne Privilege

Onboarding Azure accounts

When an Azure subscription is added to PingOne Privilege, its resources are automatically discovered and can be managed for just-in-time developer access.

At a high level, onboarding Azure involves four major steps:

Creating the PingOne Privilege connector app

First, create an Azure App Registration to act as a service principal, allowing PingOne Privilege to manage access.

  1. In the Azure Portal, go to Azure Active Directory > App Registrations. Select New registration.

  2. In the Name field, enter ProcyonConnectorApp and select Register.

    azure 01
  3. Go to the application’s Overview page.

  4. Copy and save the Application (client) ID and the Directory (tenant) ID.

    azure 02
  5. In the Azure portal, go to Certificates & secrets and select New client secret.

    azure 03
  6. Provide a description, set an expiration period, and select Add.

  7. Copy and save the secret’s Value immediately. This is the App Key that you’ll need later.

    The client secret value is only displayed once. You must record it at this step. If you lose it, you will need to create a new secret.

    azure 04

Assigning required roles to the connector app

For each Azure subscription you intend to manage, you must assign the ProcyonConnectorApp several roles to allow for resource discovery and access provisioning.

To assign a role:

  1. In the Azure portal, go to Subscriptions and select the target subscription.

  2. Select Access control (IAM).

  3. Select Add > Add role assignment.

    azure 05
  4. On the Role tab, search for and select the target role (for example, Reader).

    For the User Access Administrator role, first select the Privileged administrator roles tab, then search for the role.

    azure 06
  5. Select Next.

  6. On the Members tab, select + Select members.

    azure 07
  7. Search for the ProcyonConnectorApp by name and select it from the results. Select Select.

    azure 08
  8. Select Review + assign to complete the role assignment.

    azure 09
  9. Repeat the following procedure for each required role:

    • Reader

    • User Access Administrator (This is a privileged role and requires an extra step during selection)

    • Azure Kubernetes Service Cluster Admin Role

    • Azure Kubernetes Service RBAC Cluster Admin

Granting API permissions

Next, grant the ProcyonConnectorApp the necessary Microsoft Graph API permissions.

  1. In the Azure portal, go to Azure Active Directory > Enterprise Applications and select the ProcyonConnectorApp.

    azure 11
  2. In the sidebar, select Permissions, then select App registration.

    azure 12
  3. Select + Add a permission, then select Microsoft Graph.

    azure 13
    azure 14
  4. Select Application permissions.

    azure 15
  5. Search for and add the following Application permissions:

    Application.ReadWrite.OwnedBy
    Directory.ReadWrite.All
    Domain.ReadWrite.All
    IdentityProvider.ReadWrite.All
    RoleManagement.ReadWrite.Directory
    User.ReadWrite.All
    azure 16
  6. After adding the permissions, they require administrative approval. Select Grant admin consent for <Your Directory>.

    azure 17
    azure 18
  7. Verify that all permissions have a green checkmark in the Status column.

    azure 19

Adding the Azure account to PingOne Privilege

Finally, use the credentials from the ProcyonConnectorApp to add the account to PingOne Privilege.

  1. In the PingOne Privilege admin console, go to Cloud > Clouds

  2. Click Add Account Wizard.

  3. Select the Azure icon from the provider list at the bottom of the modal.

  4. Enter a Name and Description for the account and click Next.

  5. (Optional) De-select the Allow Procyon to Configure SAML ID or Allow Procyon to delete guest users options. Click Next.

  6. Enter the Tenant ID, App ID, and App Key that you recorded during Azure setup. Click Next.

  7. Select Verify & Add Account.

  8. Confirm your settings are correct in the summary. Click Verify & Add.

All subscriptions and resources associated with the configured service principal are now visible in the PingOne Privilege platform.