In the administrative ribbon called 'Azure services' open 'Azure Active Directory'.
Select ‘App registrations’ on the left navigation bar.
Register an entry for VSA and select the option “Accounts in any organization directory (Any Azure AD directory + Multitenant). Note: The name of the newly created entry will be required for later use.
After the registration has occurred , the page will display :
Application (client) ID
Directory (tenant) ID Note : Both of these ID will be required for later use within VSA.
Navigate to ‘Certificates & secrets’ on the left navigation bar and create a 'New client secret'.
Once the secret is created, it will be displayed within the Client secrets area under the ‘Value’ column. Note: The client secret value is irretrievable once lost. Please make sure this value is stored in a secure location as it will be required for later use.
Navigate back Home and into the Subscriptions and select the applicable subscription which contains your Azure Active Directory from the bottom grid. Once selected, navigate into ‘Access control (IAM) > ’Add role assignments’ and add a new role assignment using ‘Owner’ as role.
Under the ‘Members’ tab, choose ‘Select members’ and search for the previously created app registration, select it and complete the role assignment process.
If the previous steps were completed successfully, you should have:
Application (client) ID
Directory (tenant) ID
Application Secret
Open your VSA instance and navigate to Discovery > Discovery Services > Credentials > Azure and complete an Azure credentials submission.
The initial configuration of Azure within VSA is completed. The Azure devices will be Discovered shortly and appear in both Discovered Devices and Topology.