Setting up Assets - Azure Integration
Here's some info on setting up Assets integration with Azure.
What you need to get it up and running
Assets - Azure Integration requires both Jira (Core, Software or Service Management) and Assets to function.
Download and install Assets - Azure Integration
The latest version of Assets - Azure Integration can be downloaded from Atlassian Marketplace.
Setting up Assets
You need to set up Assets to import data from Azure.
1. Getting your Directory Id
1.1) On the dashboard, in the left navigation menu, select All services > Microsoft Entra ID.
1.2) Go to Microsoft Entra ID > Properties.
1.3) Go to the Tenant ID section and find your tenant ID in the box. Use this as a Directory ID in the import configuration.
2. Getting you Subscription Id
2.1) On the dashboard, in the left navigation menu, select All services > Subscriptions.
2.2) Note the Subscription Id for usage in the import configuration.
3. Creating Access Application
You need to create an Application that will be used for the API-Gateway.
3.1) On the dashboard, in the left navigation menu, select All services > Microsoft Entra ID.
3.2) Go to App registrations. Select New registration.
3.3) Enter an application name of your choice. For example, "asset-azure-integration"
3.4) Create the App registration
4. Creating Application Secret Key
4.1) Go to the settings of the previous created application.
4.2) Select Certificates & secrets
4.3) Click New client secret
4.4) Enter a Description for the Key (e.g. AppKey), choose a duration and click Save.
4.5) Note the generated Key-Value for using it in the import configuration.
5. Assign Application Role assignment
6.1) On the dashboard, in the left navigation menu, select All services > Subscriptions.
Select/Open your subscription
6.2) Select Access control (IAM)
6.3) Select Role assignments
6.4) Click Add
6.5) Choose Role = Reader and search at the select for the Application name that you have created in step 3
6. Check Required Permissions
6.1) Go to the settings of the previous created application.
6.2) Select API permissions.
6.3) make sure that the delegated permission User.Read exists. (default)
The following steps are required if you like to fetch Azure Graph Data
6.4) On the dashboard, in the left navigation menu, select All services > Microsoft Entra ID.
6.5) Go to App registrations. Select the App registration that you have created in step 2
6.6) Click API permissions and Add a permission
6.7) Select "Microsoft Graph"
6.8) Select "Application permissions"
6.9) Select and add User and check "User.Read.All"
6.10) Repeat from step 6.7 for:
- "Group.Read.All"
- "Device.ReadWrite.All"
- "DeviceManagementManagedDevices.Read.All"
6.11) Select "Microsoft Entra ID Graph"
6.12) Select "Application permissions"
6.13) Select and add Application and check "Application.ReadWrite.All"
6.14) Click "Grant admin consent for <Your Subscription>".