Adding Microsoft Azure Accounts
To create a new Microsoft Azure account:
- Log in to Veeam Service Provider Console.
For details, see Accessing Veeam Service Provider Console.
- At the top right corner of the Veeam Service Provider Console window, click Configuration.
- In the configuration menu on the left, click Plugin Library.
- Click the Veeam Backup for Public Clouds plugin tile.
- In the menu on the left, click Accounts and navigate to Public Cloud.
- At the top of the list, click New > Microsoft Azure.
Veeam Service Provider Console will open the New Azure Account wizard.
- On the Account Info step of the wizard, specify account settings:
- In the Site field, select Veeam Cloud Connect site on which you want to register the account.
- In the Name field, specify account name.
- In the Description field, specify account description.
- On the Account Type step of the wizard, select the Microsoft Azure environment where the account will reside and specify whether you want to create a new service account or use an existing account.
- [If you selected to create a new service account] On the Microsoft Azure step of the wizard, log in to your Microsoft Azure account:
- Click Copy code to copy an authentication code.
- Click the Microsoft authentication portal link.
A web browser window will open.
- On the Microsoft Azure device authentication page, paste the code that you have copied and sign in to Microsoft Azure.
Make sure to sign in with the user account that has the User Access Administrator or the Owner role. For details, see Microsoft Docs.
- Return to the wizard and click Next.
- [If you selected to use an existing service account] On the Service Account step of the wizard, specify account credentials:
- In the Application ID field, enter the application identifier. You can find the identifier in the application settings of your Azure Active Directory. For more information, see Microsoft Docs.
The specified Azure AD application must have either a custom role or the Contributor and Key Vault Crypto Officer Azure built-in roles assigned. If the AD application has a custom role assigned, make sure the role is granted the permissions required to perform backup and restore operations. For details on how to create Azure custom roles, see Microsoft Docs.
- In the Client (application) secret field, provide the secret string. For details on obtaining the secret string, see Microsoft Docs.
- In the Tenant ID field, enter a tenant ID of the Azure AD application.
You can find the tenant ID in the application settings of your Azure Active Directory. For details, see Microsoft Docs.
- On the Summary step of the wizard, review the account settings and click Finish.