Azure Service Principal

Microsoft Azure Service Principal is a proxy identity that is used by services, tools, and applications (user-generated) to automate processes by logging into Azure resources. In order to run an automated process it is very important to create a service principal in Azure.

In this article, we will discuss how to create Azure Service Principal with a step-by-step guide, and also read about Azure credential generation for privileged access to the app resources.

You can also check the official documentation by Microsoft.

How To Create Service Principal In Azure For DSV Base Secret? Easy Steps

Step 1: Login to your Azure Dashboard.

Step 2: On the left side, click on the Azure Active Directory.

Step 3: Once opened, now create a New registration on the App Registration page with the desired application name and click Register.

Step 4: Note down the Directory (tenant) ID & Application (client) ID. tenantId and clientId are the same DSV secret IDs respectively.

Step 5: Select Certifications & Secrets, then tap on New Client Secret enter the description about your application, and wait for it to expire. In the last tap Add to continue.

Step 6: Note down the clientSecret or newly generated secret that appeared on the DSV Secret.

Step 7: On the next page, click API permissions and add all the required permissions for your application. In the legacy Azure panel, click on Azure Active Directory Graph to add API permissions.

Step 8: Under the Delegated permissions setting button, expand the User bar and mark User.Read option to grant permissions.

Step 9: Now Click on the Application Permission. Under it expand the Application bar and select Application.ReadWrite.All permission and under Directory bar select Directory.ReadWrite.All option.

Step 10: At the bottom, click on Add Permissions to your application. But it will show an error as ‘The permission changes are not granted.’ In the API page Grant admin consent for Default Directory and hit Yes to save all the changes.

Step 11: Now open the Azure Portal Subscription dashboard and note down the Subscription ID in the subscriptionId field of the DSV Secret.

Step 12: Tap on the Subscription ID, under it click on Access control, and add a role for your application accordingly. Select the Owner role and Azure AD user, group, or service principal, and in a select tab, enter the Application (client) ID that you saved previously so that the application is available to selected members. Hit Save to save all the progress.

Note: All the values must be checked twice.



How To Create Azure Service Principal For DSV Dynamic Secret? Easy Sheet

Note: First 3 steps are the same as DSV Base Secret. Note down the Object ID and Application (client) ID for DSV Dynamic Secret. These values are appObjectId and appId respectively.

Step 2: Go to Subscription ID, click on Access control, and add a role. Select Role, Assign Access to, and Select so that members can access your application easily. Choose Role and Assign according to your wish and in the Select tab enter Application (client) ID which is your application name so that the selected member access it. Now hit save.

Conclusion

Azure Service Principal is easy to set up and very important for automating applications and services so that they can easily access the Azure resources and execute properly.

You can also check Azure Blob Storage Backup so that in case of any data loss you can restore it.

By Admin

Leave a Reply

Your email address will not be published. Required fields are marked *