|
Obtaining the Client secret value for the Application
For the eG agent to obtain metrics from the target Microsoft Azure component, it is necessary to provide the client secret associated with the registered Application. For this:
Login to Microsoft Azure portal using https://portal.azure.com with valid credentials.
When the portal opens, Click on the Azure Active Directory in the Azure services page.
When the Default directory page appears, click on the App Registrations option in its left pane.
App registrations page will then appear.
To register a new application, click the New registration option indicated in the App registrations page. The Register an application page will then appear.
In the Register an application page, specify the following:
The name of the application in the Name text box,
Select the type of the account from the Supported account types section.
| Supported account types |
Description |
| Accounts in this organizational directory only |
Select this option if you want all user and guest accounts in your directory to use the application or API. Use this option if your target audience is internal to your organization. |
| Accounts in any organizational directory |
Select this option if you want all users with a work or school account from Microsoft to use this application or API. This includes schools and businesses that use Office 365.Use this option if your target audience is business or educational customers and to enable multitenancy. |
| Accounts in any organizational directory and personal Microsoft accounts |
Select this option if you want all users with a work or school, or personal Microsoft account to use your application or API. It includes schools and businesses that use Office 365 as well as personal accounts that are used to sign in to services like Xbox and Skype. Use this option to target the widest set of Microsoft identities and to enable multitenancy. |
| Personal Microsoft Accounts only |
Select this option if you want the application or API to be used by only those users with personal accounts that are used to sign in to services like Xbox and Skype. |
Then, enter the redirect URl (or reply URL) for your application in the Redirect URI text box. Typically, you need to provide the base URL of your app. For example, http://localhost:31544 might be the URL for a web app running on your local machine. Users would use this URL to sign in to a web client application. For public client applications, provide the URL used by Azure AD to return token responses. Enter a value specific to your application, such as https://DocApp.com//auth.
Clicking the Register button in Register an application page will create the Application. Then, Monitor App page will appear click on the Certificates & secrets option in the left pane of the page. This will invoke Certificates & secrets page.
Clicking on the New client secret button in the right panel of Certificates & secrets page will invoke Add a client secret page. Specify the description of the client secret in the Description text box and choose an expiry period from the Expires section.
Clicking the Add button in Add a client secret page will display a client secret value in the Value column of Client secrets section in the Certificates & secrets page.
Note that the Value will disappear once you leave this page, so make sure that you copy the new client secret value in the clipboard by clicking the copy icon. Otherwise, you may need to generate a new client secret value. The client secret value has to be specified against the CLIENT PASSWORD field in the test configuration page.
|