Setting up Assets - Azure Integration

On this page

Still need help?

The Atlassian Community is here for you.

Ask the community

Here's some info on setting up Assets integration with Azure.

What you need to get it up and running

Assets - Azure Integration requires both Jira (Core, Software or Service Management) and Assets to function.

Download and install Assets - Azure Integration

The latest version of Assets - Azure Integration can be downloaded from Atlassian Marketplace.

Setting up Assets

You need to set up Assets to import data from Azure. 

1. Getting your Directory Id

1.1) On the dashboard, in the left navigation menu, select All services > Azure Active Directory.

1.2) Scroll down to Manage and open the Properties

1.3) Note the Directory Id for usage in the import configuration.

2. Getting you Subscription Id

2.1) On the dashboard, in the left navigation menu, select All services > Subscriptions.

2.2) Note the Subscription Id for usage in the import configuration.

3. Creating Access Application

You need to create an Application that will be used for the API-Gateway.

3.1) On the dashboard, in the left navigation menu, select All services > Azure Active Directory.

3.2) Go to App registrations. Select New registration.

3.3) Enter an application name of your choice. For example, "asset-azure-integration"

3.4) Create the App registration

4. Creating Application Secret Key

4.1) Go to the settings of the previous created application.

4.2) Select Certificates & secrets

4.3) Click New client secret

4.4) Enter a Description for the Key (e.g. AppKey), choose a duration and click Save.

4.5) Note the generated Key-Value for using it in the import configuration.

5. Assign Application Role assignment

6.1) On the dashboard, in the left navigation menu, select All services > Subscriptions.

Select/Open your subscription

6.2) Select Access control (IAM)

6.3) Select Role assignments

6.4) Click Add

6.5) Choose Role = Reader and search at the select for the Application name that you have created in step 3

6. Check Required Permissions

6.1) Go to the settings of the previous created application.

6.2) Select API permissions.

6.3) make sure that the delegated permission User.Read exists. (default)


The following steps are required if you like to fetch Azure Graph Data

6.4) On the dashboard, in the left navigation menu, select All services > Azure Active Directory.

6.5) Go to App registrations. Select the App registration that you have created in step 2

6.6) Click API permissions and Add a permission

6.7) Select "Microsoft Graph"

6.8) Select "Application permissions"

6.9) Select and add User and check "User.Read.All"

6.10) Repeat from step 6.7 for:

  • "Group.Read.All"
  • "Device.ReadWrite.All"
  • "DeviceManagementManagedDevices.Read.All"

6.11) Select "Azure Active Directory Graph"

6.12) Select "Application permissions"

6.13) Select and add Application and check "Application.ReadWrite.All"

6.14) Click "Grant admin consent for <Your Subscription>".  


Last modified on Oct 27, 2022

Was this helpful?

Yes
No
Provide feedback about this article
Powered by Confluence and Scroll Viewport.