Prerequisites
- Azure subscription with permissions to create App Registrations in Entra ID and assign IAM roles
- Access to the Draftt dashboard (Integrations > Azure)
Setup
Draftt supports connecting at the Subscription or Management Group scope. Management Group scope covers all subscriptions underneath it.Register an App in Entra ID
In the Azure portal, go to Entra ID > App registrations > New registration.
- Name:
Draftt(or any identifiable name) - Supported account types: Single tenant
- Redirect URI: Leave blank
Generate a client secret
In your new App Registration, go to Certificates & secrets > New client secret.
- Description:
Draftt access - Expires: Choose an appropriate expiration period
Get your Subscription or Management Group ID
- For Subscription scope: Go to Subscriptions in the Azure portal and copy the Subscription ID
- For Management Group scope: Go to Management groups and copy the Management Group ID
Assign the Reader role
Navigate to the subscription or management group, then go to Access control (IAM) > Add role assignment.
- Role:
Reader - Assign access to: Application
- Select: The App Registration you created (
Draftt)
Assign the Key Vault Reader role (optional)
If you want Draftt to govern Key Vault resources, assign an additional role:
- Role:
Key Vault Reader - Assign access to: Application
- Select: The App Registration you created (
Draftt)
What Draftt Reads
Draftt’s App Registration is read-only. It cannot create, modify, or delete any resources in your Azure environment. The Reader role provides access to resource metadata across compute (Virtual Machines, App Service, AKS, Container Instances), storage (Storage Accounts, Blob, Files), databases (SQL Database, Cosmos DB, Cache for Redis, MySQL, PostgreSQL), networking (Virtual Network, Load Balancer, Application Gateway, Firewall), and security (Key Vault, Entra ID, Defender for Cloud).Verifying Your Connection
After setup, return to Integrations > Azure in Draftt. Each connected subscription or management group shows a status:- Healthy - All required access is in place. Draftt is collecting data as expected.
- Unhealthy - Something is wrong with the App Registration or role assignments. Check the client secret expiration and IAM role bindings.