Azure Credentials

This article will walk you - step by step - through the configuration of AWS credentials for Tuono. To enable Tuono on your Amazon AWS account.

Overview

To connect Tuono to your Azure account, you will create an Enterprise Application **registration, generate a Secret (password), and attach it to one of your Subscriptions**. By following the instructions below you will generate four identifiers needed to connect Tuono to your Azure account:

Identifier

Purpose

Client (Application)

This is also known as an Application ID. This is the identifier of the Tuono application within your Azure Active Directory. The application is a service principal, which is a fancy name for an account. In Azure, applications and users are treated similarly for access control purposes.

Secret

This is a password for the Tuono service to access the Tuono application within your Azure Active Directory.

Subscription

This is a unique identifier for a subscription in your Azure account. A subscription is a billable account. A set of credentials allows Tuono to access one subscription.

Tenant

This is a unique identifier for your Azure account

Additionally, you will need to select a credentialing style. Tuono can operate in three different modes for credentialing. You will need to choose the method you want to use, as that affects the remaining configuration steps.

Credentialing Mode

Description

Static

You provide Tuono with a Contributor role in a subscription. Tuono uses the secret you generated above to access your Azure Subscriptions. You manage the validity of the secret using the Azure Portal. All changes made to the subscription are attributed to the Tuono application.

Dynamic

You provide Tuono with an Owner role in a subscription and additional permissions in Azure Active Directory. This allows Tuono to dynamically create time-limited credentials for each job that provisions infrastructure. All changes made to the subscription are attributed to the Tuono application.

NOTE: Dynamic credentials require administrative consent to configure, as they require permissions in Azure Active Directory to create temporary service principals (accounts), one per job. Dynamic credentialing can add up to 3 minutes to each provisioning job.

Short-Term

You assign a Contributor role to one or more users in a subscription, and grant those users access to the Tuono application. Instead of using a secret, these users authenticate directly with Microsoft as needed (when adding credentials or using apply/destroy on an environment). All changes made to the subscription are attributed to the User.

Credential Configuration Steps

Last updated

Was this helpful?