(Azure) Access Control (IAM) Policy Management
Last updated
Was this helpful?
Last updated
Was this helpful?
SpaceONE highly recommends to set appropriate permissions to Resource groups for each purpose.
Please, Set service account, To Create API for each use case:
Collector requires appropriate authorities to collect cloud resources. We strongly recommend to limit collector's service account its permission to read only access.
Otherwise, you can add more restrictions per resource groups or actions. One of the useful example is to restrict its rights within resource groups.
Prerequisite
This user guide tutorial assumes that a subscription id
is already created.
There are two options for giving permission to Azure resources which SpaceONE is going to collect.
Grant Reader role
to resource group where resources are located. If you give a role to resource group, SpaceONE can only collect resources located in this resource group.
Grant Reader role
to subscription where resources are located. If you give a role to the subscription, SpaceONE can collect resources in all resource groups in this subscription.
If you want to know more about Azure's access control policies, visit the link below.
Grant Roles to resource groups
STEP 1. Log in Azure Portal > Resource groups
Select the resource group for which the collector will collect resources.
STEP 2. Click Access control (IAM)
Navigation tab, and click +Add
button.
STEP 3: Assign the Reader role
to the account. The account should have an access permission in this resource group.
Please, follow the steps on troubleshooting guide below if you face any of error messages above.
The client client_id
with object id object_id
does not have authorization to perform action Microsoft.Resources/subscriptions/resourcegroups/read over scope subscription_id
or the scope is invalid. If access was recently granted, please refresh your credentials
STEP 1: Log in Azure Portal and Drive to > Subscriptions
STEP 2: Click the subscription name where resources are located.
STEP 3: Click +Add role assignment
button.
STEP 4: Add role assignment for followings as below
Role
Reader
Assign access to
User, group, or service principal
Select
App that has registered on Active directory
at > Azure ActiveDirectory > Registered App