Azure Connector Prerequisites

The process of integrating Azure services in Onepane requires the following steps:

  • Create an AD application for Onepane in Azure

  • Grant directed API permissions over Azure resources

  • Generate the Application Secret and place it in Onepane

Here's a step-by-step guide on how to create an Azure AD application with the necessary permissions for integrating with Azure resources and incident alerts to Onepane:

Step 1: Navigate to the Azure Active Directory (Microsoft Entra ID) on the Azure Portal

Click "Azure Active Directory" (Now re-named as "Microsoft Entra ID") from the left-hand navigation menu in the Azure Portal.

Step 2: Register an Application

  • In the Azure AD section, Click "App registrations" in the left-hand menu

  • To create a new registration, Click on the "+ New registration" button

Step 4: Configure Application Details

  1. Name: Enter a name for your application.

  2. Supported account types: Always choose the appropriate account types based on your integration needs. For now, select "Accounts in this organizational directory only."

  3. Redirect URI (optional): leave it empty

  4. Click the "Register" button to create the application.

Step 6: Configure API Permissions

  1. Open the AD Application after registration

  2. In the application's overview page, navigate to the "API permissions" tab.

  3. Click the "+ Add a permission" button.


  4. Add following permissions

Log analytics API - Data.Read
Microsoft Graph - User.Read
Microsoft Graph - Directory.Read.All
Microsoft Graph - APIConnectors.Read.All
Microsoft Graph - ExternalConnections.Read.All
Microsoft Graph - ExternalItem.Read.All
  • Click the "Add permissions" button to save your selections.

Step 7: Grant Admin Consent

  1. After adding the necessary permissions, you will need to obtain consent from an administrator to use these permissions.

  2. Click the "Grant admin consent for [your tenant name]" button on the AD application homepage. An administrator will need to sign in and approve these permissions.

Step 8: Create client credentials

  1. Go to Certificates and secrets

  2. Click the "New client secret" button and create a secret for the onepane app. Store these credentials for further use


Step 9: Grant Reader access to the subscription

  1. Open the Current subscription page

  2. In the subscription's overview page, navigate to the "Access control" tab. Click on '+ Add'. Select Add role assignment from it

  3. Give Reader access to the subscription for the ad application we created before

  4. Grant Resource Policy Contributor and Tag Contributor access to the previously created Azure AD application.

  • Policy Contributor: This role allows users to create, manage, and assign policies in Azure Policy. This can be helpful to enforce organizational standards, compliance, and governance by defining and applying policies across your resources.

  • Tag Contributor: With this role, users can manage resource tags, which are metadata labels used for organizing and categorizing resources. Tagging helps in resource management, cost tracking, and overall resource organization within Azure.

Step 10: Retrieve Application Details

  1. Go to the current application's overview page, note down the following information:

    • Application (client) ID: This is a unique identifier for your application.

    • Directory (tenant) ID: This is the ID of your Azure AD tenant.

    • Client secret (optional): The secret which we created in the last Step

  2. Goto subscriptions windows and get your subscription ID

    • Subscription ID: This is a unique identifier for your subscription.

Step 11: Store Application Information Securely

  1. Keep the application details, including the client's secret, in a secure location. These details will be used to authenticate and authorize your application to access Azure resources by onepane.

You've successfully created an Azure AD application with the necessary permissions for integrating with onepane. Now configure this at the Onepane console

Follow these steps: Azure Connector Configuration



Still need help?

Contact us

Add Integrations