Follow these steps to enable the Azure tenant tasks to access Microsoft Azure using a service principal with client secret.


For more information see 

https://learn.microsoft.com/entra/identity-platform/howto-create-service-principal-portal


  • Logon to the Azure Portal as a user account with the sufficient permissions.

  • Go to Microsoft Entra ID > App Registrations > New Registration.

  • Enter an appropriate name for the application - for example "XIA Configuration Server".

  • For supported account types select
    Accounts in this organizational directory only

  • Do not specify a Redirect URI.

  • Click Register.

  • Make a note of the following values

    Application (client) ID
    Directory (tenant) ID

  • Go to Certificates & secrets > Client secrets.

  • Click New Client Secret.

  • Enter a description and appropriate expiry, and click Add.

  • Copy and record the client secret value. This value is only available at this point.


  • Go to Azure Active Directory > Roles and Administrators > Global reader.



  • Click Add assignments and search for and select the service principal and click Add.


  • Go to Subscriptions and for each subscription select Access Control (IAM).

  • Click Add > Add role assignment and select the Reader role and click Next.

  • Add the service principal to the role.