Skip to main content

Microsoft Azure Compute

Microsoft Azure Compute is a suite of cloud computing services that provide a wide range of infrastructure and tools for running various types of applications and services. You can bring virtual machine data from Azure Compute into Brinqa to gain a comprehensive view of your hosts, allowing you to identify and address potential vulnerabilities on those assets, thus strengthening your overall cybersecurity posture.

This document details the information you must provide for the connector to authenticate with Azure Compute and how to obtain that information from Microsoft. See create a data integration for step-by-step instructions on setting up the integration.

Required connection settings

When setting up a data integration, select Azure Compute from the Connector drop-down. If you cannot find the connector in the drop-down, make sure that you have installed it first. You must provide the following information to authenticate Azure Compute with Brinqa:

  • Client ID and Client secret: The client ID and client secret associated with the service principal, which must have permissions to log in to the Microsoft Azure Active Directory (Active AD) and return data from the Azure Compute API.

  • Tenant ID: The unique identifier for the Active AD tenant associated with the service principal.

  • Subscription ID: The unique identifier for your Microsoft Azure subscription, which represents a billing and resource usage entity within Azure. The Subscription ID is required to grant the Azure Compute connector access to resources within your specific subscription, such as Virtual Machines.

Register a Microsoft Azure Application

You must create a new application for the Azure Compute connector to authenticate with Azure AD and access the Azure Compute API. To register an application in your Azure AD tenant, follow these steps:

  1. Log in to your Microsoft Azure Portal as an administrator.

  2. Navigate to and click Microsoft Entra ID.

  3. On the left-hand side of the page, click App registrations, and then click New registration.

  4. Give your new application a name, select the supported account types, and provide an optional Redirect URI. If you do not have a redirect URI, you can leave the field as is.

    Microsoft azure new application page

  5. Click Register.

note

For additional details about registering an application in Azure AD and creating a service principal, see Microsoft documentation.

Obtain Microsoft Azure credentials

After you have created your new Microsoft Azure application, your client and tenant ID display. Copy the Application (client) ID and Directory (tenant) ID as shown below:

Azure Compute Client and Tenant IDs

To obtain your client secret and subscription ID, follow these steps:

  1. Click Certificates & secrets and then click New client secret.

  2. Provide a description, set an expiry date, and then click Add.

    The new client secret displays. You cannot view the client secret again. There is both a Value and Secret ID. The Value field is needed for authentication. Copy the Value field and save it to a secure location.

    Azure Compute new client secret

  3. Search for "Subscriptions" in the search box at the top of the page and click Subscriptions.

    The subscription ID of your new application displays. Copy this subscription ID. In addition to the Client ID, Tenant ID, and Client secret, the Subscription ID is also needed for authentication.

Assign permissions

After you have created your new Microsoft Azure application and obtained the authentication credentials, you must assign the required permissions for the application to access your data. To do so, follow these steps:

  1. Navigate to the applicable Azure subscription.

  2. Click Access control (IAM), click Add, and then click Add role assignment from the drop-down.

    Azure role assignment

  3. In the Job function roles tab, select the Virtual Machine Contributor role.

  4. Click Next.

  5. In the Members tab, click the User, group, or service principal option.

  6. Click Select members, search for and click the application you registered earlier, and then click Select.

  7. Navigate to the Review + assign tab and click Review + assign.

note

If you do not have permissions to assign roles, contact your Azure administrator. For additional information, see Microsoft documentation.

(Optional) Create a management group for multiple subscriptions

If you have multiple Azure subscriptions, you can organize them into a single management group to uniformly set access controls. To do so, follow these steps:

  1. Log in to your Microsoft Azure Portal as an administrator.

  2. Search for "Management groups" in the search box and click Management groups.

  3. Click Create, provide a management group ID and display name, and then click Submit.

  4. On the Management groups page, click the name of the new management group.

  5. Click Add subscription, select the Azure subscriptions you want to add to the management group, and then click Save.

  6. Click Access control (IAM), click Add, and then click Add role assignment from the drop-down.

  7. Search for and select the role you want to assign to the management group.

  8. Click Next.

  9. In the Members tab, click the User, group, or service principal option.

  10. Click Select members, search for and click the application you registered earlier, or any relevant members who require this role, and then click Select.

  11. Navigate to the Review + assign tab and click Review + assign.

note

If you do not have permissions to create management groups, contact your Azure administrator. For additional information, see Microsoft documentation.

Types of data to retrieve

The Azure Compute connector can retrieve the following types of data from the Azure Compute API:

Table 1: Data retrieved from Azure Compute API

Connector ObjectRequiredMaps to Data Model
Virtual MachineYesHost
info

The Azure compute connector does not currently support operation options for the types of data it retrieves.

For detailed steps on how to view the data retrieved from Azure Compute in the Brinqa Platform, see How to view your data.

Microsoft Azure Compute SDKs

The Microsoft Azure Compute connector uses the Microsoft Azure Compute SDK. Specifically, it uses the following classes:

Table 2: Microsoft Azure Compute SDK Classes

Azure SDK ClassDescription
com.azure.core.http.rest.PagedIterableManages iterable responses for Azure service requests.
com.azure.core.management.exception.ManagementExceptionHandles exceptions specific to Azure resource management operations.
com.azure.resourcemanager.compute.models.InstanceViewStatusProvides status details for compute instances.
com.azure.resourcemanager.compute.models.VirtualMachineAgentInstanceViewContains information about the Azure VM Agent instance view.
com.azure.resourcemanager.compute.models.VirtualMachineInstanceViewProvides instance view details for Azure virtual machines.
com.azure.resourcemanager.network.models.NetworkInterfaceManages Azure network interface components.

Changelog

The Microsoft Azure Compute connector has undergone the following changes:

3.2.1

  • The "VM stopped" status now translates to "Active".

3.1.6

  • Updated dependencies.

3.1.4