For best results, Dispel recommends using a fully segmented Azure subscription that is designated exclusively for your Dispel deployment.
To properly deploy, Dispel will require 3 different kinds service principal accounts in your subscription. Those service principal accounts are:
Engine Contributor: Dispel requires a service principal account for our back-end engine with read-write (Contributor-role) permissions. This account will be used by our back-end engine to build/configure/destroy virtual machines for your deployment.
Health Monitor: Dispel requires a service principal account for automated health checking services with read-only (Reader-role) permissions. This account will only be used to monitor the health of the Dispel deployment, and generating automated alerts.
Support Principal: Dispel requires access to this subscription for our senior operations team members and the main operations engineer for the customer account (speak with your Dispel contact for details) with read-write (Contributor-role) permissions. These accounts will be used for maintenance and support of the deployment. These accounts may be time-bound to comply with your organization's requirements, with the appropriate modifications to our standard SLAs.
For each account, we will need
client-id
tenant-id
client-secret
so please keep those protected and handy.
Creating a Service Principal Account
Microsoft documentation for creating the service principal accounts can be found here: https://learn.microsoft.com/en-us/cli/azure/azure-cli-sp-tutorial-1?tabs=bash
The above guide will walk you through:
Prerequisites for creating service principal accounts
In a subscription, you must have
User Access Administrator
orRole Based Access Control Administrator
permissions, or higher, to create a service principal.
How to Create a service principal
Create a service principal with role and scope
For explicit documentation on managing service principal roles:
https://learn.microsoft.com/en-us/cli/azure/azure-cli-sp-tutorial-5
Moving forward to create password or certificate based credentials for the service principal account. Dispel will require a
client-secret
for our integration.
Adding the Dispel Team to your Subscription
For the accounts created for the Dispel Operations Team managing your account, the following guide will help you add them to your subscription and manage their roles and access.
Microsoft documentation for adding an external user to your Azure subscription:
https://learn.microsoft.com/en-us/azure/role-based-access-control/role-assignments-external-users
This guide covers:
Prerequisites for adding new members (external) to a subscription
When to add a user - for example in line with Dispel's deployment
The differences between guest and member users
Adding an external user to your directory
Assigning roles for those users
Common troubleshooting topics