Step 2: Create the Entra ID app registration
To scan an Azure subscription, Snyk takes the permissions of a service principal with a Reader role that allows Snyk to scan the configuration of your subscription resources.
Additionally, Snyk has a security feature that locks the federated credential for a subscription and tenant to the Organization that onboards it. This ensures that nobody can guess the credential's name and onboard it into a separate Organization to see those resources.
Create the infrastructure with Terraform or the Azure CLI
You can create the app registration, federated identity credential, and service principal using one of the following tools, according to the type of file you downloaded from Snyk:
Create Azure app registration infrastructure using Terraform
In your terminal, navigate to the directory containing the Terraform file you downloaded (named
snyk-permissions-azure.tf
if downloaded from the Snyk Web UI).Using the Terraform CLI, initialize the Terraform Project:
Review and apply the Terraform plan:
Enter
yes
when Terraform asks if you want to perform the actions.
Terraform then provisions the infrastructure. When it is finished, you will see the following output:
Copy the application ID for use in the next step.
Create Azure app registration infrastructure using the Azure CLI
In your terminal or in the Cloud Shell, navigate to the directory containing your
.sh
file.Make the Bash script executable using the
chmod
command:
Run the script:
The Azure CLI then creates the AD app registration, federated identity credential, and service principal. When it is finished, you will see JSON output with information about the created infrastructure.
Copy the application ID, the last item in the output:
Copy this application ID for use in the next step.
What's next?
The next step is to create and scan the Cloud Environment. See Step 3: Create and scan a Cloud Environment for Azure (Web UI) or Step 3: Create and scan a Cloud Environment for Azure (API).
Last updated
Was this helpful?