For Customers who need to manage data and resources for Azure Enterprise Agreement (EA) accounts.:
- Log in to your Azure management portal (https://portal.azure.com/) as a Global Administrator user.
- From the left navbar, click Azure Active Directory
(or type “Azure Active Directory” in the search bar)
3. In the Manage section, Select Properties from the list
4. Copy the Directory ID or Tenant ID and save it in a local document.
(you will need this information in the next steps)
Create your application:
1. In the Manage section of the Azure Active Directory, click App registrations
2. Click + New registration
3. In the Name, type a name for your application. (for example: SunSpots-App)
4. Under Supported account types, leave the default setting: accounts in this organizational directory only
5. Under Redirect URI (optional), leave the default drop-down option, Web, and in the blank text field, type https://localhost
6. Click Register.
7. Copy the Application (client) ID
8. In the Manage section of the application blade, click Certificates & secrets
9. Under Client secrets, click + New client secret.
10. Type a Description for the client secret, select expires Never, and click Add to generate a secret password for the application.
11. Copy the Client Secret Value Key and Expires Date and save it
(NOTE: you will not be able to view it again)
Add Permissions to use the application
- search for Azure Active Directory and choose under Manage section App registrations and Click on the application you just created in the previous steps.
- From the Manage section of the application blade, select API Permissions.
- Click + Add a permission.
4. From the Select an API blade, select Microsoft Graph from the list.
5. Select application permissions.
6. Add two permission levels for the application:
Type Directory and select the permission Directory.Read.All from the list.
Type Reports and select the permission Reports.Read.All from the list.
7. Click Add permissions.
8. To confirm the new permission, in the Grant consent section click on Grant admin consent for your company (the permissions will apply to the whole Azure tenant)
9. Click Yes to confirm granting the required permissions.
Verify your App Permissions
3. In the Manage section of the Azure Active Directory blade, click App registrations.
4. Under All applications, click on the application you created
5. On the right of Managed application in local directory, click Manage application in local directory.
6. From the Security section of the Enterprise Application blade, select Permissions.
7. Verify that the two permissions (Read directory data + Read all usage reports) for the Microsoft Graph API are listed:
Create C-Connector in SUNSPOTS.cloud
- Go to https://app.sunspots.cloudand Sign UP toSunSpots.cloud
- Enter your user details for the SunSpots.cloud system, you need to use a valid Work Email address for the registration confirmation
- After receiving the confirmation email, please confirm the registration by clicking Confirm Email or follow the hyperlink:
5. From the C-Connectorpage, click + Add Connection
6. In the Create/Edit Your Connector Profile wizard, in the Cloud Account Type select the Microsoft Azure icon
7. Enter aC-Connector Profile Nameand Description(choose any name and description).
8. Choose the appropriate AzureAccount Type.
- If you chose the Enterprise Agreement – EA account type, you will be required to provide the following details from your company EA Portal (azure.com)
- Company Name
- Enrollment ID
- API Key – can be found under Reports -> Download Usage -> API Access Key
9. At the bottom click Continue, the Azure Service Principal will open:
- Paste the information values you copied previously from the Azure portal during the application creation process and click Continue.
- Directory ID
- Application ID
- Client secret
10. Confirm the provided information in the summary screen and click on Start pulling data.
11. An email notification will be sent as soon as all the data is pulled successfully. The consumption information will appear in the Dashboard of the system: