How to configure Azure for Metallic backup
Before You Begin
This procedure enables our software to perform backups on Azure environment. After execution, please provide the following information to SoftwareOne:
Application name
Application ID
Subscription ID
Tenant ID (Directory ID)
Application key
Required information for procedure execution
The subscription ID for the Azure account
User credentials with Service Administrator capabilities, for logging in to your Azure account
Procedure
Express Role configuration
Log on to the public Azure portal with service administrator credentials.
From the All services menu, select the App registrations tab, and then click on New registration.
Specify the following:
Name: The name of the application to be created on Azure Active Directory (ex. BackupSimpleApp).
Account type: Select one from the following:
Accounts in this organizational directory only
Accounts in any organizational directory
Accounts in any organizational directory and personal Microsoft accounts (we recommend this option as it allows us to backup multiple subscriptions).
Redirect URI: (Optional) https://app_name (the URL, including the application name that you specify).
For example, enter MyWebApp and https://MyWebApp.
Click Register.
The application will be listed on the App Registration tab. Record the Application ID.
Go to the API permissions blade.
Click Add a permission to add the required API permissions:
Select the Microsoft API: Azure Service Management.
Select the option to provide delegated permissions to Access Azure Service Management as organization users.
Click Add permissions.
Go to the Certificates & secrets blade.
Click on New client secret, and then enter the key description and expiration date (we recommend minimum of two years).
Click Add.
A unique secret key is generated for the application.
Important: Save the key value. The key value will be your application password. You will not be able to retrieve the key after you leave the Certificate & secrets tab/blade.
From the All services menu, click the Subscriptions tab, and then select the subscription ID that the virtualization client needs to be created for.
On the Access Control (IAM) tab, click Add, and then select Add role assignment.
The Add role assignment pane appears.
Specify the following:
From the Role list, select the Contributor role or the custom role that you created.
From the Assign access to list, select User, group, or service principal.
In the Select box, enter the application name, and then select the application that you created in the preceding step.
Click Review and Assign.
To obtain the Tenant ID from the public Azure cloud, select Azure Active Directory > Properties > Directory ID.
The Directory ID is also the Tenant ID.