Setting up a Tenant ID, Client ID, and Client Secret for Azure Resource Manager provisioning
This topic describes the steps to set up an user account for Azure Resource Manager provisioning. To work with the Azure Resource Manager SDK, BMC Cloud Lifecycle Management must have a Tenant ID, Client ID, and Client Secret.
This topic covers the following information:
Before you can work with Azure Resource Manager SDK, you must complete the following required tasks in the given order:
|Get your user mapping information.
For instructions, see To add credentials to BMC Cloud Lifecycle Management – Administration console
Get your Azure subscription ID.
The subscription ID is a GUID that uniquely identifies your subscription to use Azure services.
|Ensure that you have the required permissions to create an application in Azure Active Directory (AAD).
For instructions, see Check Azure Active Directory permissions in the Microsoft documentation.
|Create an AAD application. In a text editor (such as Notepad), copy the name of the application and label it as Application Name.
For instructions, see Create an Azure Active Directory application in the Microsoft documentation.
Get the Application ID and generate an authentication key for this application.
In a text editor (such as Notepad), copy the name of the Application ID and label it as Client ID. Copy the authentication key string to the text editor, and label the string as Client Secret Key.
For instructions, see Get application ID and authentication key in the Microsoft documentation.
Get the Tenant ID, which is the ID of the AAD directory in which you created the application. In a text editor (such as Notepad), copy the ID and label it as Tenant ID.
A Tenant is representative of an organization within Azure Active Directory. It is a dedicated instance of the Azure AD service. An AAD tenant is required for defining an application and for assigning permissions so the application can make use of other Azure services' REST APIs.
For instructions, see Get tenant ID in the Microsoft documentation.
|Assign contributor role to the application.
For details, see Assign application to role in the Microsoft documentation.
To add credentials to BMC Cloud Lifecycle Management – Administration console
To add credentials to Administration console
- From the BMC Cloud Lifecycle Management Administration Console, open the Providers workspace, and select Custom provider type.
- Select the Azure provider you registered.
- Click the Mapping User Account button to open the Manage User Accounts dialog box.
In User Name, enter the name of a user that you want to add, and press Enter. You can enter any text string. The user name is a reference for your user mapping.
This name is not used to create the user. Tenant ID, Client ID, and other parameters are used instead.
In the table under the User Name field, enter the values for the following authentication parameters that you copied in a text editor in the Prerequisites section:
- Subscription ID
- Tenant ID
- Client ID
- Client Secret
- Base URL
- Azure Environment
- Click Save.
The user account is saved.