Onboard Azure Subscription (coming soon)
Overview & Objectives
Purpose:
This document describes how to onboard a single Azure subscription into ARMO Platform. After onboarding, ARMO will have visibility into the account’s resources, enable governance / compliance policies, and monitor for risks
Prerequisites
| Item | Requirement |
|---|---|
| ARMO Platform | You have an admin or Manager access to ARMO Platform |
| Azure Global Administrator | You have administrative or IAM privileges in the Azure subscription you intend to onboard. |
| Owner | Owner role in the target subscription(s). |
High level onboarding flow
The Azure onboarding process in ARMO establishes secure, read-only access so ARMO can continuously analyze your cloud configuration, compliance posture, and activity logs.
- Initiate Integration from the ARMO Platform
- Navigate to Settings → Accounts → Microsoft Azure.
- Choose A single subscription
- Create an Azure App Registration
- ARMO requires an Azure Active Directory (Entra ID) App Registration to authenticate securely.
- The registration defines ARMO as a trusted application with API access to Azure resources.
- Generate and Store Application Credentials
- Add a Client Secret under Certificates & Secrets.
- Copy the Client ID, Tenant ID, and Secret Value — these are required to authenticate ARMO’s connection.
- Assign the Reader Role to the Application
- In the target Azure Subscription, assign the ARMO application the Reader role under Access Control (IAM).
- This grants ARMO read-only access for discovery and compliance scanning.
- Provide Credentials to ARMO
- Return to the ARMO Platform and enter the following: Subscription ID, Directory ID, Application ID, Client Secret
- Verification and Discovery
- ARMO verifies connectivity and permissions.
- Once validated, ARMO begins discovering Azure resources (VMs, AKS clusters, storage accounts, etc.) across connected subscriptions.
- Continuous Scanning and Insights
- Within ~60 minutes, ARMO starts displaying:
- Compliance Findings (under Compliance → Cloud)
[ARMO Platform]
│
▼
[Start Onboarding Wizard]
│
▼
[Azure Portal]
├── Register ARMO App
├── Create Secret
└── Assign Reader Role
│
▼
[Return to ARMO → Enter Credentials]
│
▼
[Validation + Discovery]
│
▼
[Continuous Scanning & Compliance Insights]
Detailed Step-by-Step Onboarding
1. Get the subscription id
- Go to Azure portal and search for Subscriptions.
- Locate and copy your Subscription ID.


2. Go to ARMO Platform
- Click on Microsoft Azure card and click Next
- Enter the Microsoft subscription id
- Enter a display name


3. Register ARMO as an Azure Application
-
Navigate to Azure Portal → App registrations.
-
Click + New registration.

-
Enter the name: Armo-security-application
-
Select the supported account type:
- Accounts in this organizational directory only – for a single tenant setup.
- Accounts in any organizational directory (Any Microsoft Entra ID tenant) – for a multitenant setup.
-
Click Register.

-
Copy the following values
- Application (client) ID and paste in the ARMO connection wizard
- Directory (tenant) ID and paste in the ARMO connection wizard


4. Add a New Secret
-
Open the newly created application and go to Certificates & secrets.
-
Under Client secrets, click + New client secret.
-
Add a description (for example,
ArmoSecurity) and set expiration to 730 days (24 months). -
Click Add.
-
Copy the Secret Value and paste it in the ARMO connection wizard

5. Grant the Azure Application Reader Role Permissions
-
In the Azure Portal, go to Subscriptions.
-
Select the subscription you want ARMO to scan.
-
In the subscription menu, select Access control (IAM).

-
Click + Add → Add role assignment.
-
Choose the Reader role.
-
Under the Members tab:
- Select User, group, or service principal.
- Click + Select members, then search for the ARMO application you registered and select it.
-
Click Review + assign to finalize.
The ARMO Service Principal now has read-only access to your Azure subscription.
After Onboarding
Once your Azure environment is connected:
- ARMO automatically discovers Azure resources and begins scanning for compliance and configuration issues.
- Connected subscriptions appear under Settings → Accounts in the ARMO Platform.
- Compliance and vulnerability results typically appear within 60 minutes.
Updated about 3 hours ago
