Welcome to the Azure integration guide! In this guide, we will provide steps and requirements to connecting your Azure account for a savings test.
Step 1: Begin Azure Account Connection
- Navigate to Integrations and select Azure.
- Click the Connect button.
- Review the Summary section, which explains that Usage AI will integrate with your Azure account using a dedicated Service Principal with read-only permissions.
- Prerequisite: Ensure you have set up the Azure CLI environment by following the provided instructions.
- Access Requirement: You must have the User Access Administrator Role to proceed.
- If you have this role, check the box: "I have User Access Administrator Role."
- Enter a name for your Azure connection under Account Nickname.
- Select the product(s) you want to enable (e.g., Insured Commitments for Azure reservation and savings plans).
- Click Next to proceed.
Step 2: Create a Custom Role in Azure
- Access the Azure Portal
- Open the Azure Portal.
- Locate your Tenant Root Management Group ID and enter it in the provided field.
- Navigate to Tenant Root Group
- In the Azure Portal, go to Access Control (IAM) under the Tenant Root Group.
- Click on Add Custom Role.
- Paste the JSON Policy
- Copy the provided JSON permissions from the Create Custom Role section.
- Paste the JSON into the JSON editor within the Azure Portal.
- Save the changes, then click Review + Create.
- Once the role is successfully created, click Next to proceed.
Step 3: Invite External User (Usage)
- Invite Usage AI as an External User
- In the Users page of the Azure portal, click "+ New User" and select Invite External User.
- Enter azure-support@usage.ai as the email address.
- Click "Review + Invite" to proceed.
- Click Invite to send the invitation.
- Retrieve Object ID and Primary Domain
- Once the invitation is sent, go back to the Users page.
- Click on the Display Name of the invited guest user.
- Copy the Object ID and paste it into the corresponding input field.
- Open the Microsoft Entra ID page.
- Copy the Primary domain and paste it into the Primary domain input field.
- Once you’ve entered the Object ID and Primary Domain, click Next to continue.
Step 4: Create a Service Principal for Usage
- Open Azure CLI
- Run the following command in Azure CLI to create a service principal for Usage
- az ad sp create-for-rbac -n "usageai"
- Click Copy to easily copy the command.
- Retrieve JSON Output
- After executing the command, Azure CLI will generate a JSON output containing:
- Application ID
- Password
- Tenant ID
- After executing the command, Azure CLI will generate a JSON output containing:
- Enter the JSON Data
- Paste the JSON output into the provided field under Paste JSON, or manually enter the details under Enter Manually.
- Once the information is entered, click Next to proceed
Step 5: Assign Permissions
- Enter Your Management Group ID
- Locate your Management Group ID in the Azure Portal.
- Enter it in the Usage AI dashboard.
- Assign Permissions
- Follow the instructions on the dashboard to assign the necessary permissions to your Management Group.
Complete the Integration
Once permissions are successfully assigned, click Complete Integration to finalize the connection.