Skip to content

Latest commit

 

History

History
376 lines (277 loc) · 16.6 KB

create-service-principal.md

File metadata and controls

376 lines (277 loc) · 16.6 KB

Create a Service Principal - Azure CLI

This topic shows you how to permit a service principal (such as an automated process, application, or service) to access other resources in your subscription.

A service principal contains the following credentials which will be mentioned in this page. Please store them in a secure location because they are sensitive credentials.

  • TENANT_ID
  • CLIENT_ID
  • CLIENT_SECRET

NOTE: A service principal have two types: password-based and certificate-based. This topic only covers the password-based service principal. You can refer to here to create a service principal with certificate.

Create a Service Principal using Azure CLI 2.0

The easiest way to create the Service Principal is with the Azure Cloud Shell in the Azure portal which provides a pre-installed, pre-configured Azure CLI 2.0. If you can't use Azure Cloud Shell, you may install Azure CLI 2.0 in the system of your preference.

You can then create the service principal by simply typing az ad sp create-for-rbac. You can get more information from the doc.

The default role is Contributor and the default scope is the current subscription. Please go to the section Assigning roles to your Service Principal.

The output, in JSON format, contains the appId, password and tenant parameters that correspond to CLIENT_ID, CLIENT_SECRET and TENANT_ID in the rest of this document. You can optionally use --output table or even --output tsv as an additional option to az.

Create a Service Principal using Azure CLI 1.0

1.1 Install Azure CLI 1.0

Install and configure Azure CLI following the documentation HERE.

The following commands in this topic are based on Azure CLI version 0.9.18.

NOTE:

  • It is suggested to run Azure CLI using Ubuntu Server 14.04 LTS or Windows 10.
  • If you are using Windows, it is suggested that you use command line but not PowerShell to run Azure CLI.
  • If you hit the error /usr/bin/env: node: No such file or directory when running azure commands, you need to run sudo ln -s /usr/bin/nodejs /usr/bin/node.

1.2 Configure Azure CLI 1.0

1.2.1 Set mode to Azure Resource Management

azure config mode arm

1.2.2 Login

#Enter your Microsoft account credentials when prompted.
azure login --environment $ENVIRONMENT

NOTE:

  • azure login requires a work or school account. Never login with your personal account. If you do not have a work or school account currently, you can easily create a work or school account with the guide.
  • $ENVIRONMENT can be AzureCloud, AzureChinaCloud, AzureUSGovernment and so on.
  • If you fail to login AzureChinaCloud with a CERT_UNTRUSTED error, please use the latest version of node (4.x) and mostly the issue should be resolved. azure-xplat-cli/2725

2 Create a Service Principal

Azure CPI provisions resources in Azure using the Azure Resource Manager (ARM) APIs. We use a Service Principal account to give Azure CPI the access to proper resources.

2.1 Via Script (RECOMMENDED)

  1. Download bash script or Powershell script according to your command line tool.

  2. Run the script to generate your Service Principal.

Sample output:

==============Created Serivce Principal==============
SUBSCRIPTION_ID: 12345678-1234-5678-1234-678912345678
TENANT_ID:       11111111-1234-5678-1234-678912345678
CLIEND_ID:       87654321-1234-5678-1234-678912345678
CLIENT_SECRET:   RANDOM-STRING

2.2 Manually

2.2.1 Set Default Subscription

  1. Check whether you have multiple subscriptions.
azure account list --json

Sample Output:

[
  {
    "id": "12345678-1234-5678-1234-678912345678",
    "name": "Sample Subscription",
    "user": {
      "name": "Sample Account",
      "type": "user"
    },
    "tenantId": "11111111-1234-5678-1234-678912345678",
    "state": "Enabled",
    "isDefault": true,
    "registeredProviders": [],
    "environmentName": "AzureCloud"
  },
  {
    "id": "87654321-1234-5678-1234-678912345678",
    "name": "Sample Subscription1",
    "user": {
      "name": "Sample Account1",
      "type": "user"
    },
    "tenantId": "22222222-1234-5678-1234-678912345678",
    "state": "Enabled",
    "isDefault": false,
    "registeredProviders": [],
    "environmentName": "AzureCloud"
  }
]

You can get the following values from the output:

  • SUBSCRIPTION-ID - the row id.
  • TENANT_ID - the row tenantId, please note it down for later use.

NOTE: If your TENANT_ID is not defined, one possibility is that you are using a personal account to log in to your Azure subscription. See 1.2 Configure Azure CLI on how to fix this.

  1. Ensure your default subscription is set to the one you want to create your service principal.
azure account set <SUBSCRIPTION-ID>

Example:

azure account set 87654321-1234-5678-1234-678912345678

Sample Output:

info:    Executing command account set
info:    Setting subscription to "Sample Subscription" with id "87654321-1234-5678-1234-678912345678".
info:    Changes saved
info:    account set command OK

2.2.2 Creating an Azure Active Directory (AAD) application

Create an AAD application with your information.

azure ad app create --name <name> --password <password> --home-page <home-page> --identifier-uris <identifier-uris>
  • name: The display name for the application
  • password: The value for the password credential associated with the application that will be valid for one year by default. This is your CLIENT_SECRET. Please note it down for later use.
  • home-page: The URL to the application homepage. You can use a faked URL here.
  • Identifier-uris: The comma-delimitied URIs that identify the application. You can use a faked URL here.

Example:

azure ad app create --name "Service Principal for BOSH" --password "password" --home-page "http://BOSHAzureCPI" --identifier-uris "http://BOSHAzureCPI"

Sample Output:

info:    Executing command ad app create
+ Creating application Service Principal for BOSH
data:    AppId:                   246e4af7-75b5-494a-89b5-363addb9f0fa
data:    ObjectId:                208096bb-4899-49e2-83ea-1a270154f427
data:    DisplayName:             Service Principal for BOSH
data:    IdentifierUris:          0=http://BOSHAzureCPI
data:    ReplyUrls:
data:    AvailableToOtherTenants:  False
info:    ad app create command OK
  • AppId is your CLIENT_ID you need to create the service principal. Please note it down for later use.

2.2.3 Create a Service Principal

azure ad sp create --applicationId $CLIENT_ID

Example:

azure ad sp create --applicationId 246e4af7-75b5-494a-89b5-363addb9f0fa

Sample Output:

info:    Executing command ad sp create
+ Creating service principal for application 246e4af7-75b5-494a-89b5-363addb9f0fa
data:    Object Id:               fcf68d7a-262b-42c4-8ef8-6a4856611155
data:    Display Name:            Service Principal for BOSH
data:    Service Principal Names:
data:                             246e4af7-75b5-494a-89b5-363addb9f0fa
data:                             http://BOSHAzureCPI
info:    ad sp create command OK

You can get service-principal-name from any value of Service Principal Names to assign role to your service principal.

Assigning roles to your Service Principal

If you use az ad sp create-for-rbac to create a service principal, the default role has been assigned. You can skip this section if you don't want to customize the role assignment.

Please refer to RBAC: Built-in roles to learn Azure Role-Based Access Control. There are two options for Cloud Foundry scenarios:

  • Please assgin the role Virtual Machine Contributor and Network Contributor, if the service principal is only for deploying BOSH and Cloud Foundry on Azure.
  • Please assign the role Contributor to your service principal if you need to manage other more resources. For example:
  • Use terraform to bootstrap the environment
  • Use Azure Service Broker to manage Azure services

In this section, Virtual Machine Contributor and Network Contributor are assigned.

  • Virtual Machine Contributor can manage virtual machines but not the virtual network or storage account to which they are connected. However, it can list keys of the storage account.
  • Network Contributor can manage all network resources.

Using Azure CLI 2.0

You need to use the option --role and --scopes of the command az ad sp create-for-rbac.

Using Azure CLI 1.0

azure role assignment create --spn <service-principal-name> --roleName "Virtual Machine Contributor" --subscription <subscription-id>
azure role assignment create --spn <service-principal-name> --roleName "Network Contributor" --subscription <subscription-id>

Example:

azure role assignment create --spn "http://BOSHAzureCPI" --roleName "Virtual Machine Contributor" --subscription 87654321-1234-5678-1234-678912345678
azure role assignment create --spn "http://BOSHAzureCPI" --roleName "Network Contributor" --subscription 87654321-1234-5678-1234-678912345678

You can verify the assignment with the following command:

azure role assignment list --spn <service-principal-name>

Sample Output:

info:    Executing command role assignment list
+ Searching for role assignments
data:    RoleAssignmentId     : /subscriptions/87654321-1234-5678-1234-678912345678/providers/Microsoft.Authorization/roleAssignments/16645a17-3184-47c1-8e00-8eb1d0643d54
data:    RoleDefinitionName   : Network Contributor
data:    RoleDefinitionId     : 4d97b98b-1d4f-4787-a291-c67834d212e7
data:    Scope                : /subscriptions/87654321-1234-5678-1234-678912345678
data:    Display Name         : CloudFoundry
data:    SignInName           :
data:    ObjectId             : 039ccb8a-5b34-4020-bff9-ba38bef98f61
data:    ObjectType           : ServicePrincipal
data:
data:    RoleAssignmentId     : /subscriptions/87654321-1234-5678-1234-678912345678/providers/Microsoft.Authorization/roleAssignments/8af758ad-1377-4aa4-ae12-3c084ab2271f
data:    RoleDefinitionName   : Virtual Machine Contributor
data:    RoleDefinitionId     : 9980e02c-c2be-4d73-94e8-173b1dc7cf3c
data:    Scope                : /subscriptions/87654321-1234-5678-1234-678912345678
data:    Display Name         : CloudFoundry
data:    SignInName           :
data:    ObjectId             : 039ccb8a-5b34-4020-bff9-ba38bef98f61
data:    ObjectType           : ServicePrincipal
data:
info:    role assignment list command OK

By default, the scope of the role is set to the subscription. And it can also be assigned to one specific resource group or multiple resource groups if you want.

azure role assignment create --spn <service-principal-name> --roleName "Virtual Machine Contributor" --resource-group <resource-group-name>
azure role assignment create --spn <service-principal-name> --roleName "Network Contributor" --resource-group <resource-group-name>

For example:

If you want to assign Virtual Machine Contributor role to only one resource group and Network Contributor role to two resource groups, you can use the following commands.

azure role assignment create --spn "http://BOSHAzureCPI" --roleName "Virtual Machine Contributor" --resource-group MyFirstRG
azure role assignment create --spn "http://BOSHAzureCPI" --roleName "Network Contributor" --resource-group MyFirstRG
azure role assignment create --spn "http://BOSHAzureCPI" --roleName "Network Contributor" --resource-group MySecondRG

The output of listing the roles:

$ azure role assignment list --spn "http://BOSHAzureCPI"
info:    Executing command role assignment list
+ Searching for role assignments
data:    RoleAssignmentId     : /subscriptions/87654321-1234-5678-1234-678912345678/resourcegroups/MyFirstRG/providers/Microsoft.Authorization/roleAssignments/62db1b5a-e425-4c5d-8546-9290adb76221
data:    RoleDefinitionName   : Network Contributor
data:    RoleDefinitionId     : 4d97b98b-1d4f-4787-a291-c67834d212e7
data:    Scope                : /subscriptions/87654321-1234-5678-1234-678912345678/resourcegroups/MyFirstRG
data:    Display Name         : Service Principal for BOSH
data:    SignInName           :
data:    ObjectId             : 87654321-1234-5678-1234-123456781234
data:    ObjectType           : ServicePrincipal
data:
data:    RoleAssignmentId     : /subscriptions/87654321-1234-5678-1234-678912345678/resourcegroups/MyFirstRG/providers/Microsoft.Authorization/roleAssignments/ab9d2a39-251c-4d4b-9eb4-70ad2ed0e432
data:    RoleDefinitionName   : Virtual Machine Contributor
data:    RoleDefinitionId     : 9980e02c-c2be-4d73-94e8-173b1dc7cf3c
data:    Scope                : /subscriptions/87654321-1234-5678-1234-678912345678/resourcegroups/MyFirstRG
data:    Display Name         : Service Principal for BOSH
data:    SignInName           :
data:    ObjectId             : 87654321-1234-5678-1234-123456781234
data:    ObjectType           : ServicePrincipal
data:
data:    RoleAssignmentId     : /subscriptions/87654321-1234-5678-1234-678912345678/resourcegroups/MySecondRG/providers/Microsoft.Authorization/roleAssignments/eeafda2b-ae46-478b-9c40-924edb670dd3
data:    RoleDefinitionName   : Network Contributor
data:    RoleDefinitionId     : 4d97b98b-1d4f-4787-a291-c67834d212e7
data:    Scope                : /subscriptions/87654321-1234-5678-1234-678912345678/resourcegroups/MySecondRG
data:    Display Name         : Service Principal for BOSH
data:    SignInName           :
data:    ObjectId             : 87654321-1234-5678-1234-123456781234
data:    ObjectType           : ServicePrincipal
data:
info:    role assignment list command OK

Verify Your Service Principal

Your service principal is created as follows:

  • TENANT_ID
  • CLIENT_ID
  • CLIENT_SECRET

Please verify it with the following steps:

  1. Use Azure CLI to login with your service principal.

    You can find the TENANT_ID, CLIENT_ID, and CLIENT_SECRET properties in the ~/bosh.yml file. If you cannot login, then the service principal is invalid.

    • Azure CLI 2.0

      az cloud set --name $ENVIRONMENT
      az login --service-principal --username $CLIENT_ID --password $CLIENT_SECRET --tenant $TENANT_ID
      

      Example:

      az cloud set --name AzureCloud
      az login --service-principal --username 246e4af7-75b5-494a-89b5-363addb9f0fa --password "password" --tenant 22222222-1234-5678-1234-678912345678
      
    • Azure CLI 1.0

      azure login --service-principal --username $CLIENT_ID --password $CLIENT_SECRET --tenant $TENANT_ID --environment $ENVIRONMENT
      

      Example:

      azure login --service-principal --username 246e4af7-75b5-494a-89b5-363addb9f0fa --password "password" --tenant 22222222-1234-5678-1234-678912345678 --environment AzureCloud
      
  2. Verify that the subscription which the service principal belongs to is the same subscription that is used to create your resource group. (This may happen when you have multiple subscriptions.)

  3. Verify that your service principal has been assigned the correct roles according to your usage. For example, verify whether you can use the service principal to create the service which you want.

  4. Recreate a service principal on your tenant if the service principal is invalid.

NOTE: In some cases, if the service principal is invalid, then the deployment of BOSH will fail. Errors in ~/run.log will show get_token - http error like this reported issue.