Setting up an Application and Tenant for Azure Resource Manager

An application is a specific cloud service associated with your Azure account, and the tenant is a client or organization that manages an instance of the cloud service. The application and tenant are associated with your subscription through Azure Active Directory, which provides identity and access management for the Azure cloud.

To create an Azure SQL app, you need to set up an application and tenant for the Azure Resource Manager.

To complete the setup of Azure, you will need the following Azure information:

  • Application name
  • Application ID
  • Subscription ID
  • Tenant ID (Directory ID)
  • Application key

Before You Begin

You must have the following information for your Azure account:

  • The Subscription ID for the Azure account
  • The user credentials that have Service Administrator capabilities, for logging in to your Azure account.


  1. Log on to the public Azure portal with service administrator credentials.
  2. From the All Services menu, select the App registrations tab, click New Application Registration, and then enter the following information:
    • Name: Name of the application to be created on Azure Active Directory.
    • Application type: Select Web app/API or Native.
    • Sign-on URL: http://app_name (URL including the application name you specify). For example: MyWebApp and https://MyWebtApp.
  3. Click Create.

    After you complete the creation, the application is listed on the App Registration tab. Note the Application ID.

  4. On the Settings blade, select the newly created application.
  5. On the Required Permission tab, perform the following actions to add required permissions:
    1. Select an API (for example, Windows Azure Service Management API).
    2. Select the option to provide delegated permissions to Access Azure Service Management as organization users.
    3. Click Done.
  6. Select the newly created application, and then click Settings.
  7. Click Keys, and then provide the key name and expiration date. Click Save.

    This action generates a unique secret key for the application.

    IMPORTANT: Save the key value. The key value is your application password. You cannot retrieve the key after you leave the Keys tab/blade.

  8. On the Subscriptions tab, select the subscription ID where you need to create the pseudo-client or app.

    Optional: Define a Custom Role

    You can use the predefined Contributor role or define a custom role to specify more limited permissions that can be used for backup and restore operations, either for a specific resource group or for the subscription as a whole.

  9. On the Access Control (IAM) tab, click Add to add a service principal user.
  10. On the Add Permissions blade, select the Contributor role or the custom role.

    Select Azure AD user, group, or application.

  11. in the Select box, type the application name , and then select the application.
  12. To obtain the Tenant ID from the public Azure cloud select Azure Active Directory > Properties > Directory ID.

    The Directory ID is also the Tenant ID.

Last modified: 8/14/2018 2:27:57 PM