Configure Microsoft Azure

Arcserve RHA needs an Azure account information and RHA application registration information for the Full System scenario to work with Azure. Before adding an account in the RHA Manager, you need to register RHA in Microsoft Entra ID to get the Application ID and Client Key. You also need to extract the existing email address, subscription ID, and Tenant ID.

First, prepare the Azure cloud account, and then add the account in the RHA Manager.

To configure an Azure Cloud account, follow these steps:

  1. Perform the following steps to register the Microsoft Entra ID application:
    1. Log into the Azure portal.
    2. From the left pane, navigate to Microsoft Entra ID > Manage > App registrations.
    3. On the App registrations page, click New registration.
    4. On the Register an application page, do the following, and then click Register:
      • Name - Enter a name for the application.
      • Supported account types - Select a supported account type, which determines who can use the application.
      • Redirect URI (optional) - Select Web or Public client/native (mobile & desktop) for the type of application you are creating, and then enter the redirect URI for your application.
    5. In the search bar, type subscriptions, and then from the list, click Subscriptions.
    6. On the Subscriptions page, select the subscription for your application.
    7. Note: If the subscription list does not display the required subscription, select global filter. Make sure the subscription you want is selected for the portal.
    8. On your subscription page, go to Access control (IAM), click Add, and then select Add role assignment.
    9. On the Add role assignment page, do the following, and then click Review + assign:
      1. On the Role tab, select the role that you want to assign to the application, and then click Next.
      2. On the Members tab, do the following, and then click Next:
        1. Click Select members.
        2. The Select members dialog appears.
        3. Search for the application that you have registered in the search bar, select the application, and then click Select.
        4. (Optional) For Description, type a description as needed.
      3. On the Assignment type (Preview) tab, do the following, and then click Next:
        1. Select one of the following as assignment type.
          • Eligible: If you select this option, you need to perform one or more actions to use the role, such as perform a multifactor authentication check, provide a business justification, or request approval from designated approvers.
          • Active: If you select this option, you do not need to perform any action to use the role.
        2. For Assignment duration, select one of the following:
          • Permanent: If you select this option, user is always allowed to activate or use role.
          • Time bound: If you select this option, user is allowed to activate or use role only during a specified time. Set the Start date and time and End date and time to allow user to activate or use role.
      4. On the Review + assign tab, verify the information that you have provided, and then click Review + assign.

    The Microsoft Entra ID application is registered, and a role has been assigned to it successfully.

    Now, you can perform the next steps using the registered application to get the required IDs and Key.

  2. To get the Subscription ID, go to the Subscriptions page, and then copy the subscription ID.
  3. To get the Tenant ID and Application ID, follow these steps:
    1. Navigate to Microsoft Entra ID > App registrations > Owned applications, and then select your application.
    2. Copy the Tenant ID and Application ID, which are used while adding the account in the RHA Manager.
  4. To get the Client secret, follow these steps:
    1. On the App registrations page, select the application, navigate to Certificates & secrets on the left pane under Manage, and then click New client secret to add a client secret.
    2. On the Add a client secret page, enter the description, select the expiry interval, and then click Add.
    3. The client secret value is displayed.
    4. Important! Copy and save this value as you cannot retrieve it later.

    The Azure account is configured successfully.