Setting up the Tidal Control Azure integration
This page will guide you through setting up the integration for Tidal Control with Azure and Entra ID. This allows our Tests functionality to automatically retrieve evidence from your Azure environment. There are two ways to set up the integration:
- With our Tidal Control Azure Application Integration (recommended)
- With a service principal
Regardless of the method you choose, you will need to provide access to the relevant Azure subscriptions. This is done by granting the necessary permissions to the integration in the Azure portal.
Application Integration
The following steps require that you have authorization to create new App Registrations in your Entra ID tenant. If you do not have the necessary permissions, please contact your Entra ID administrator.
- Navigate to the Tidal Portal (https://portal.tidalcontrol.com) and log in.
- Go to "Settings" and then "Integrations". This requires that you are a SUPER_USER within Tidal Control.
- Click on the plus icon next to "Microsoft Azure".
- Click "App Integration (recommended)" and "Click here to get started".
- You will be redirected the Azure portal. Click on "Sign in" and log in with your Azure account.
- Review the permissions requested by Tidal Control and click "Accept".
- Complete the integration setup by providing access to Azure "Subscriptions" (see below).
Service Principal
To set up the integration with a service principal, you need to create a new service principal in your Azure Entra ID. This service principal will be used to authenticate the integration with your Azure environment. The following steps require that you have authorization to create new App Registrations in your Entra ID tenant. If you do not have the necessary permissions, please contact your Entra ID administrator.
- Navigate to the Azure portal (https://portal.azure.com) and log in.
- Search and go to "Entra ID".
- Click on "App registrations" in the left-hand menu.
- Click on "New registration".
- Fill in the required fields:
- Name: Tidal Control - Integration
- Supported account types: Accounts in this organizational directory only (Single tenant)
- Click on "Save".
- Copy the "Application (client) ID" and "Directory (tenant) ID" from the overview page. You will need these values later.
- Click on "Certificates & secrets" in the left-hand menu.
- Click on "New client secret".
- Fill in the required fields:
- Description: Tidal Control - Integration
- Expires: Choose an expiration date (e.g. 12 months)
- Click on "Add".
- Copy the value of the client secret. You will need this value later. NB: Save the client secret in a secure location. You will not be able to retrieve it again.
- Click on "API permissions" in the left-hand menu.
- Click on "Add a permission".
- Click on "APIs my organization uses".
- Search for "Microsoft Graph" and click on it.
- Click on "Application permissions".
- Add the following permissions:
- Directory.Read.All
- User.Read.All
- Device.Read.All
- Application.Read.All
- DeviceManagementManagedDevices.Read.All
- GroupMember.Read.All
- Group.Read.All
- Organization.Read.All
- Policy.Read.All
- Click "Grant Admin Consent for {TENANT_NAME}".
- Navigate to the Tidal Portal (https://portal.tidalcontrol.com) and log in.
- Go to "Settings" and then "Integrations". This requires that you are a SUPER_USER within Tidal Control.
- Click on the plus icon next to "Microsoft Azure".
- Click "Service Principal".
- Fill in the required fields:
- Name: Any name you want to give the integration.
- Tenant ID: The Directory (tenant) ID from the overview page.
- Client ID: The Application (client) ID from the overview page.
- Client Secret: The client secret you created.
- Complete the integration setup by providing access to Azure "Subscriptions" (see below).
Provide access to Azure Subscriptions
To provide access to Azure Subscriptions, you need to grant the necessary permissions to the integration in the Azure portal. The following steps require that you have authorization to grant role permissions in your Azure Entra ID. If you do not have the necessary permissions, please contact your Entra ID administrator.
- Navigate to the Azure portal (https://portal.azure.com) and log in.
- Search and go to "Subscriptions".
- Click on the subscription you want to provide access to.
- Click on "Access control (IAM)" in the left-hand menu.
- Click on "Add role assignment".
- Select the role you want to assign to the integration. We recommend using the "Reader" role.
- Search for the Tidal integration you created and select it.
- Click on "Save".
- Repeat steps 3-8 for each subscription you want to provide access to.
- You have now successfully set up the Tidal Control Azure integration.