For Alert Logic to protect assets in Microsoft Azure, you must create an app registration with administrative permissions. Role-Based Access Control (RBAC) enables fine-grained access management for Azure accounts. When you assign a RBAC role to the app registration, you grant Alert Logic access to monitor your environments, and no further access.
This procedure requires administrative permissions in Azure, and the installation of one of the following command line interfaces:
To configure your RBAC role in Azure, you must:
- Log into the Azure portal.
- In the left menu, click Azure Active Directory.
- On the left panel, under Manage, click App registrations.
- Click New registration, and enter a name. Note the name of the registration, which you will need later when you create an Azure deployment.
- Click Register. Note the Application (client) ID, and the Directory (tenant) ID, which you will need later.
- On the left panel, under Manage, click Certificates & secrets, and then click +New client secret.
- Enter a description, and then on Expire, select Never.
- Click Add. Note the key value, which you will need later.
RBAC roles enable fine-grained access management for Azure. After you create an app registration, you must assign an RBAC role to that registration to grant Alert Logic permission to monitor your environments.
For more information about Azure RBAC or managing roles with command-line applications, see:
- Role based access control custom roles
- Manage Role-Based Access Control with the Azure command-line interface
- Manage Role-Based Access Control with Azure PowerShell
To create a custom RBAC role, you must first create a role document and then create a custom role in the Azure portal.
To create a custom RBAC role, you must:
Create a role document
- Create a new text file and copy the Alert Logic RBAC role into it. Note the directory where you save the file. You must know the path and file name for later in the procedure.
- Make the following changes to the file:
- In the "Name": "<role name>", line, change the "<role name>" entry to the name for the app registration you just created.
- In the "AssignableScopes":"/subscriptions/<subscription id>" line, change the <subscription ID> value to the Subscription ID found on your Azure portal Subscriptions blade.
- Save the text file as a JSON file.
Create a custom role in Azure
- Open either Azure CLI 2.0 or Azure PowerShell, and log in to your Azure account, and then specify the default subscription. Azure Azure CLI 2.0 commands
az account set --subscription <your subscription id>Azure Azure PowerShell commands
Get-AzureRmSubscription –SubscriptionName [your subscription name] | Select-AzureRmSubscription
- Create your custom role in Azure.
- In the Azure portal, under Subscriptions, select your subscription, and then click select Access control (IAM).
- Click Roles to verify that the RBAC role you created appears in the portal.
If the role does not appear, refresh the list of roles.
After you create the RBAC role, you must assign it to the Azure app you registered. In Azure, roles are assigned in the Access Control portion of the Subscriptions blade.
- In the Azure Navigation Menu, click Subscriptions.
- In the Subscriptions blade, select the subscription you want Alert Logic to protect, and then click Access Control (IAM). Note the subscription ID, which you will need when you create an Azure deployment.
- Click +Add, and then click Add role assignment.
- Select the RBAC role you created.
- From the list, click the app you registered earlier.
- Click SAVE.
Create a deployment in the Alert Logic console
The steps you must take to create a deployment vary based on your subscription level.
For Essentials subscriptions, see Microsoft Azure Deployment Configuration (Essentials Subscription)
For Professional subscriptions, see Microsoft Azure Deployment Configuration (Professional Subscription).