3. Azure Integration#
In order for TrustView to gain access to Microsoft Azure, some requirements are needed.
3.1. Create app registration#
Create an app registration that should be used for TrustView, to access Azure APIs:
Select
App registration
New registration
Select a name and select
Accounts in this organizational directory only (Single tenant)
Leave
Redirect URI
as blank, because it is not usedAfter creating the app, store the values of:
Application (client) ID - (client id)
andDirectory (tenant) ID - (tenant id)
You then need to create a client secret. This can be done by Choosing
Add a certificate or secret
and then chooseNew client secret
Store the
secret
value.The last thing needed is the
subscriptions id
which can be seen by choosingSubscriptions
underAzure services
.Store the
subscription id
.We now have
client id
,client secret
,tenant id
and thesubscription id
available and saved.In TrustView, choose
Azure integration
and type in the values and select a name and clickAdd
to finish the setup.The Azure integration is now configured in TrustView, however, the client need some permissions in order to be allowed to list apps and key vaults:
Under the client overview page in Azure, go to
App registrations
then selectAPI permissions
and clickAdd a permission
Select
Microsoft Graph
application permissions
Application.Read.All
Select the next permission under
Azure KeyVault
user_impersonation
select
Grant admin consent
The client should now be able to list all apps located under the Azure subscription. The App also need some permissions so that key vaults can be listed. The operation below should be performed for all the key vaults that the app needs to access:
In Azure portal, select the key vault, click on
Access control (IAM)
and selectRole assignments
.In the job function roles type:
Select
Key Vault Contributor
and click next.Click
Members
and search after the App registration created above, then click select and next. Lastly, clickReview + assign
. The app registration should now be added with the roleKey Vault Contributor
.The last thing needed is to add some access policies. Click
Access policies
and clickCreate
and then select the permissions as listed below:Click next, then search after the App registration, and then select and click
Next
and then finallyCreate
. Your App registration should now be able in TrustView, to list all keys, secrets and certificates created under that specific key vault.In the permissions above, also select (Key Management Operations)
Create
, (Cryptographic Operations)Sign
and (Certificate Management Operations)Create
andBackup
. These permissions are needed if you want to create an automation task in TrustView, to create and upload certificates to Azure. For listing only, they can be left out. But for listing theList
permission is required for all Management Operations.Repeat the above steps for all key vaults that TrustView should be able to read.