Getting StartedAzure Management Groups

Azure Management Groups Onboarding

This guide walks you through onboarding Azure Management Groups to ASecureCloud, enabling you to manage multiple Azure subscriptions efficiently under a single tenant configuration.

Prerequisites

Before you begin, ensure you have:

  • Access to your Azure Entra ID (formerly Azure AD) tenant
  • Your Azure Tenant ID
  • Appropriate permissions to create App Registrations and assign roles in Azure
  • Access to one of the following tools (for service principal creation):
    • Terraform (recommended)
    • PowerShell
    • Or ability to perform Manual Steps in the Azure Portal

Step 1: Navigate to Cloud Settings

  1. Log in to ASecureCloud
  2. Navigate to Cloud Settings
  3. Click “New Azure Account” to begin the onboarding wizard

Step 2: Configure Azure Tenant Setup

The first step of the wizard configures your Azure tenant connection.

Azure Tenant Setup

Configuration Fields

FieldDescription
Select ScopeChoose “Azure & Entra Id” to enable both Azure resource and Entra ID assessments
Enter Tenant IDYour Azure Entra ID tenant ID (e.g., b76e0406-40e4-4c78-b9be-xxxxxxxxxxxx)
Endpoint TypeSelect “Public” for standard Azure cloud, or choose the appropriate sovereign cloud
Enter Tenant DescriptionA friendly name for this tenant (e.g., ACME PROD Tenant)

Automated Assessments (Optional)

Toggle “Enable Automated Assessments” to schedule recurring security assessments:

  • Frequency: Weekly, Monthly, etc.
  • Day: Select the day of the week for assessments to run

Click “Next: Subscription Onboarding Method” to continue.

Step 3: Select Subscription Onboarding Method

Choose how ASecureCloud will discover subscriptions within your tenant.

Subscription Onboarding Method

Select “Fetch Automatically with Management Group Id” from the dropdown. This option allows ASecureCloud to automatically discover all subscriptions under a specified Management Group.

Click “Next: Enter Management Group ID” to continue.

Step 4: Enter Management Group ID

Provide the Management Group ID that contains the subscriptions you want to assess. This is typically your root management group or a specific group containing production workloads.

Tip: You can find your Management Group ID in the Azure Portal under Management Groups. The root management group ID is often your tenant ID.

Step 5: Create Service Principal

ASecureCloud requires a service principal with Reader permissions on your Management Group to discover and assess resources.

Select Onboarding Method & Verify Connection

Choose one of the following methods to create the service principal:

Terraform provides an automated, repeatable way to create the service principal and assign permissions.

  1. Click “Terraform” to select this method
  2. Download or copy the provided Terraform configuration
  3. Run the Terraform configuration in your environment:
# Initialize Terraform
terraform init
 
# Review the plan
terraform plan
 
# Apply the configuration
terraform apply
  1. After successful deployment, the output will display the required credentials:

Terraform Output

Note: To reveal the client secret, run: terraform output -raw client_secret

Option B: PowerShell

Use the provided PowerShell script for environments where Terraform is not available.

  1. Click “Powershell” to select this method
  2. Copy the generated PowerShell script
  3. Run the script in Azure Cloud Shell or a local PowerShell session with Azure modules installed
  4. Note the output containing the Client ID and Client Secret

Option C: Manual Steps

For environments with strict automation restrictions, you can create the service principal manually.

  1. Click “Manual Steps” to view the detailed instructions
  2. Follow the step-by-step guide to:
    • Create an App Registration in Azure Entra ID
    • Generate a Client Secret
    • Assign the Reader role on the Management Group

Step 6: Enter Credentials and Verify Connection

Once you have created the service principal, enter the credentials in ASecureCloud:

FieldDescription
Enter Tenant IDYour Azure tenant ID (auto-populated from Step 2)
Enter Client IDThe Application (client) ID from the service principal
Enter Client SecretThe secret value generated for the service principal

Click “Test Connection” to verify that ASecureCloud can authenticate with your Azure tenant.

Connection Successful

A green “Connection Successful” message confirms that the credentials are valid and ASecureCloud can access your Azure environment.

Troubleshooting: If the connection fails, verify that:

  • The Client ID and Client Secret are entered correctly
  • The service principal has Reader permissions on the Management Group
  • The App Registration has not expired or been deleted

Click “Next: Select Subscriptions” to continue.

Step 7: Select Subscriptions

ASecureCloud will display all subscriptions discovered under the specified Management Group.

Select Subscriptions

  1. Review the list of discovered subscriptions showing ID and Description
  2. Use “Select All” to include all subscriptions, or individually check the subscriptions you want to assess
  3. Optionally, edit the Description field for each subscription to provide a friendly name
  4. The counter at the bottom shows how many subscriptions are selected (e.g., “Selected 3 of 3 available selections”)

Tip: You can select all subscriptions initially and refine the scope later from Cloud Settings.

Step 8: Save and Launch Assessment

  1. Review your configuration summary
  2. Click “Save” to complete the onboarding process
  3. Optionally, click “Launch Assessment” to immediately start a security assessment

Your Azure Management Group is now onboarded to ASecureCloud. Assessments will run according to your configured schedule, and results will appear on your Dashboard.

Managing Your Azure Tenant

Editing Tenant Settings

To modify your Azure tenant configuration:

  1. Navigate to Cloud Settings
  2. Find your Azure tenant in the list
  3. Click the ”…” (actions) menu and select “Edit”
  4. Update settings as needed and click “Save”

Adding or Removing Subscriptions

To change which subscriptions are included in assessments:

  1. Open the tenant settings as described above
  2. Navigate to the subscription selection screen
  3. Select or deselect subscriptions as needed
  4. Save your changes

Rotating Credentials

If you need to rotate the service principal credentials:

  1. Generate a new Client Secret in Azure Entra ID
  2. Update the credentials in ASecureCloud via Cloud Settings
  3. Test the connection to verify the new credentials work
  4. Delete the old Client Secret in Azure

Security Best Practice: Rotate service principal secrets regularly according to your organization’s security policy.

Troubleshooting

Service Principal Permissions

If assessments fail with permission errors, verify the service principal has:

  • Reader role assigned at the Management Group level
  • Inherited permissions to all subscriptions in scope

Missing Subscriptions

If some subscriptions are not discovered:

  1. Verify the subscriptions are under the specified Management Group
  2. Confirm the service principal has Reader access to those subscriptions
  3. Check that the subscriptions are not disabled or in a deleted state

Connection Timeout

If connection tests timeout:

  1. Verify your network allows outbound HTTPS connections
  2. Check that the Azure Entra ID tenant is accessible
  3. Confirm the endpoint type (Public vs. sovereign cloud) is correct

Next Steps

After successfully onboarding your Azure Management Group: