9.5 Registering a Azure Application to Represent PlateSpin Migrate

PlateSpin Migrate uses the Microsoft Azure API to automate workload migrations to Azure. You need to create an Azure application ID for PlateSpin Migrate to use when it uses the Azure API for replicating and migrating workloads to your Azure account.

To register PlateSpin Migrate as an application in Azure:

  1. Go to the appropriate Azure Portal and log in to your Azure account:

  2. In the left column of the Portal menu, click Azure Active Directory.

  3. In the directory menu under Manage, select App registrations, then click Add to open the Create pane.

  4. In the Create pane, configure the settings for the application:

    1. Specify friendly name for the application, such as PlateSpin Migrate

      The name must be unique in your Azure Active Directory. This is the name that appears in the Applications list.

    2. Select Native as the Application Type.

    3. Specify a valid URL as the Redirect URI.

      The redirect URI is not used in practice, so you can specify any valid URL that you control.

    4. Click Create.

  5. In the Applications list, select the application, then click Settings to view the Essentials information, including the Application ID.

  6. Copy the Application ID value to the clipboard and paste it in a text document where you can access it when you set up target containers for this account.

    An application ID is a value in the format of: abc12b34-c5df-6e78-f9a0-bc123456d789.

  7. Configure permissions for the registered application.

    1. At the bottom right of the Settings pane, click All Settings.

    2. In the Settings menu, under API Access, select Required Permissions.

    3. On the Grant Permissions pane, click Add.

    4. In the Add Permissions pane, click Select an API.

    5. In the right pane, select Windows Azure Service Management API, then click Select at the bottom of the pane.

      A green check mark appears next to Select an API.

    6. In the Add Permissions pane, click Select Permissions.

    7. In the right pane, select the check box next to Access Azure Service Management as organization users, then click Select at the bottom of the pane.

      A green check mark appears next to Select Permissions.

    8. At the bottom of the Add Permissions pane, click Done.

  8. [This step must be performed by an Azure global administrator account.] Using an Azure global administrator account, enable the Default Directory

    1. In the Portal menu, select Azure Active Directory, then click Enterprise Applications.

    2. Click the new application that you created in Step 4.

    3. Under Security, click Permissions.

      Initially, there are no permissions listed in the Admin Consent section for the application.

    4. Click Grant admin consent for Default Directory.

    5. A separate browser window opens and prompts you to sign in to administer the application. Sign in using an Azure global administrator account that has permissions to grant admin consent for the application.

    6. After authentication succeeds, the Permissions requested - Accept for your organization window prompts you to consent to the application permissions. Click Accept, then wait for the browser to refresh its content.

    7. After the permissions are successfuly granted, close the browser window.

  9. Verify the setup.

    1. In Portal menu, select Azure Active Directory, then click Enterprise Applications.

    2. Click the new application that you created in Step 4.

    3. Under Security, click Permissions.

    4. Verify that there are two new Permissions listed in the Admin Consent section.