Loading...

Setting Up Managed Identities for Azure Resources

Managed identities is a more secure authentication method for Azure cloud services that allows only authorized managed-identity-enabled virtual machines to access your Azure subscription. Also, the process of creating an Azure client is simpler because you need only the Subscription ID, not the Tenant ID, the Application ID, or the Application Password.

Note: You can convert clients that were created using the traditional method to managed-identity-enabled clients.

Before You Begin

Verify that your environment meets the following requirements:

  • User: You must have Service Administrator role privileges.
  • Hardware: The VSA proxies that you want to enable managed identities for must be virtual machines in the Azure cloud. You can associate These virtual machines with different subscriptions. However, you (as the Admin) must have access to all of the subscriptions for these VSA proxies.
  • Operating system: You can use Windows and Linux machines as Azure proxies.

Collect the following information for your Azure account:

  • The Subscription ID
  • User credentials that have Service Administrator capabilities.

Procedure

  1. Go to the Microsoft Azure portal (http://portal.azure.com).
  2. In the left navigation pane, click Virtual machines.
  3. From the list of virtual machines, search for the virtual machine that has the virtual server agent (VSA) installed.
  4. When you find the virtual machine that you want to enable with a managed identity, record the Subscription and Resource Group.
  5. Click the virtual machine name.

    The Virtual machine blade appears.

  6. Click the Identity tab.

    The Identity pane appears with the System assigned tab active.

  7. To register the virtual machine with Azure Active Directory, which enables managed identity authentication for the VM, click On, and then click Save.
  8. Optional: Repeat steps 2-7 to enable managed identity for additional virtual machines.
  9. In the left navigation pane, click Subscriptions.
  10. For each subscription, from the list of subscriptions, click the subscription for the managed identity-enabled virtual machines.

    The Subscriptions blade appears.

  11. On the Access control (IAM) tab, click Add.

    The Permissions pane appears.

  12. Complete the following:
    1. Role:
      1. If you do not want to restrict access, select Contributor.
      2. If you do want to restrict access, assign a customized role (CVBackupRole.json).
      3. If you are configuring a Linux proxy, you must also select the Storage Blob Data Contributor role.
    2. Subscription: Select the subscription for the managed identity-enabled virtual machines.
    3. Select: Select the managed identity-enabled virtual machines that you want to assign the specified role.
  13. Verify that all the managed identity-enabled virtual machines are selected members of the subscription.
  14. Click Save.

    A confirmation message appears, indicating that the selected virtual machines are assigned as Contributors or the customized role that you assigned.

What to Do Next

Create a Microsoft Azure Client.

Last modified: 10/9/2019 6:51:45 PM