Configure Permissions for an Azure AD App Registration - splunk/splunk-add-on-microsoft-azure GitHub Wiki

After an Azure AD App registration has been created, it must be given appropriate permissions to access Azure resources. Some inputs will require granting permissions to specific APIs. Other inputs will require adding the Azure AD App registration to specific Identity and Access Management (IAM) roles.

Add permissions to access an API

Execute the following steps for the inputs in the add-on that require specific API permissions.

Refer to the Azure/O365 Splunk Add-on Required Permissions matrix for complete details on required API and role permissions.

  1. Login to the Azure Portal

  2. Type azure active directory in the search bar and click the Azure Active Directory service.

![width=500px](https://raw.githubusercontent.com/wiki/splunk/splunk-add-on-microsoft-azureimages/Search Azure AD.png)

  1. Select App registrations.

![width=500px](https://raw.githubusercontent.com/wiki/splunk/splunk-add-on-microsoft-azureimages/Azure AD app registration.png)

  1. Select your App registration

  2. Select API permissions > Add a permission

![width=500px](https://raw.githubusercontent.com/wiki/splunk/splunk-add-on-microsoft-azureimages/Azure AD app API permissions.jpg)

  1. Select the appropriate API.

For example, choose Microsoft Graph to gather Azure Active Directory Users data.

Refer to the Azure/O365 Splunk Add-on Required Permissions matrix to determine which API is needed for each input you want to use in the add-on.

![width=500px](https://raw.githubusercontent.com/wiki/splunk/splunk-add-on-microsoft-azureimages/Azure AD app API Graph.jpg)

  1. Choose Application or Deletegated permissions. Most inputs will require Application permissions.

We will choose Application for our Azure Active Directory Users data example.

  1. Select the necessary permission(s).

We will choose User.Read.All for our Azure Active Directory Users data example.

![width=500px](https://raw.githubusercontent.com/wiki/splunk/splunk-add-on-microsoft-azureimages/Azure AD app user.read.all.jpg)

  1. Repeat the above steps for each necessary API permission.

  2. Select the Add permissions button.

Grant API Consent

Some API permissions require an Azure administrator to consent to the requested permissions.

  1. From the API permissions section of your Azure AD App registration, click the button labeled Grant admin consent for .

Note: if this button is disabled, you may not have the necessary permissions to grant API consent. Contact your Azure admin to grant the API permissions.

![width=800px](https://raw.githubusercontent.com/wiki/splunk/splunk-add-on-microsoft-azureimages/Azure AD app consent needed.jpg)

  1. After granting permissions, the Status column should say "Granted for <your tenant".

![width=800px](https://raw.githubusercontent.com/wiki/splunk/splunk-add-on-microsoft-azureimages/Azure AD app consent granted.jpg)

Add an Azure AD App Registration to an IAM Role

Execute the following steps for the inputs in the add-on that require specific IAM roles.

Refer to the Azure/O365 Splunk Add-on Required Permissions matrix for complete details on required API and role permissions.

  1. Login to the Azure Portal

  2. Type subscriptions in the search bar and click the Subscriptions service.

![width=500px](https://raw.githubusercontent.com/wiki/splunk/splunk-add-on-microsoft-azureimages/Azure Subscriptions.png)

  1. Select your subscription, and then click Access control (IAM).

  2. Click the Add button, and then select the Add role assignment option.

![width=500px](https://raw.githubusercontent.com/wiki/splunk/splunk-add-on-microsoft-azureimages/Azure Subscription IAM.png)

  1. In the search box, type the name of the required role. Select the role in the table, and then click the Next button.

For example, choose Reader to gather Compute data.

![width=700px](https://raw.githubusercontent.com/wiki/splunk/splunk-add-on-microsoft-azureimages/Azure Subscription IAM Reader.jpg)

  1. Click the Select members button. Type the name of the Azure AD Application registration. Click the name of the application so that it shows up in the Selected members section. Then, click the Select button.

![width=700px](https://raw.githubusercontent.com/wiki/splunk/splunk-add-on-microsoft-azureimages/Azure Subscription IAM Select Members.jpg)

  1. Click the Review + assign button.

  2. Once the process finishes, click Role assignments and check that the application is in the role.

![width=500px](https://raw.githubusercontent.com/wiki/splunk/splunk-add-on-microsoft-azureimages/Azure Subscription IAM Role Assignments.jpg)

  1. Repeat the above steps for each necessary role.

Next Step

Connect to your Azure Account with Splunk Add-on for Microsoft Azure