Azure Storage Account - User Guide

In this article, you will understand step by step how to easily integrate with Azure Storage Account

The Azure storage account integration allows Scytale to monitor your containers in the blob storage services and also check their encryption status. Encryption is an important key aspect in order to ensure that access to these containers is protected.

In addition, the integration will collect the following:

  • Workbooks that contain the metrics used to monitor storage; and
  • The configuration of the alert rules was created to monitor the storage.
The above two points are very important information that needs to be collected in order to ensure that controls supporting the availability of the product are in place.

Step 1: Register an application

  • Log in to the Azure portal and then navigate to Azure Active Directory.
  • On the left menu, click on App registrations
  • On the screen that loads, click on New registration and fill in the following details:
    • Name - you can choose a name.
    • Supported account types - the first option must be selected - "Accounts in this organizational directory only (Default Directory only - Single tenant)".
    • Redirect URI - select Web from the drop-down menu, and in the text box paste the following:
    • Click on Register.


  • In the overview tab of the application, refer to the information under "Essentials" and copy:
    • (A) - Application (Client) ID; and
    • (B) - Directory (tenant) ID (You'll need this to connect the integration in step 3).

Step 2: Create a new client secret for the app

  • Go to App registrations.

  • Go to "Certificates & secrets"

  • Click on New client secret

    • Description - scytale-key

    • Expires - we recommend selecting 24 months. (We cannot collect data after the key expires.)

    • Click on Add

  • Click on the copy sign on the (C) - "Value" column. (You'll need this to connect the integration in step 3)

Step 3: Create a custom role in the subscriptions

  • Go to subscriptions. 
  • Copy the relevant subscription ID (you'll need to paste it into the scytale integration connection).

  • Click on the relevant subscription. 
  • Navigate in the subscription menu to 'Access control (IAM)'.
  • Select +Add and select the 'Add custom role' option. 

  • Under the basic tab, choose a name for the 'Custom role name.'
  • Click on 'Next'.

  • Go to the JSON tab and click on 'Edit'.
  • Add the following permissions list to the Custom Role JSON under "actions" section (see the attached screenshot below).
    • "Microsoft.Storage/storageAccounts/read",
    • "Microsoft.Storage/storageAccounts/blobServices/containers/read",
    • "Microsoft.Insights/Workbooks/Read",
    • "Microsoft.Insights/MetricAlerts/Read",
    • "Microsoft.Storage/storageAccounts/fileServices/read"
  • Click on 'Save',  then 'Review + create', and then 'Create'.

Step 4: Create a role assignment

  • Return to the subscription menu and click on 'Access control (IAM)'.
  • Select +Add and select the 'Add role assignment' option. 

  • In the role tab, search for the custom role you created in step 3.
  • Click on the role and then select 'Next'

  • In the members tab, on the Members section, click on '+select members'. 
  • Search the application name you created in step 1 and click on it. 
  • Click on 'Select'. 
  • Click on 'Review + assign'.

Step 5:
Log in to the Scytale web app

  • Click on the "Integrations" menu screen to the left.
  • Click on the Connect button under the Azure Storage Account icon.
  • Now, paste the following details into the connection screen:
    • Application ID -  (from step 1 above)
    • Secret Value - (from step 2 above)
    • Directory ID - (from step 1 above)
    • Subscription ID - (from step 3 above)
  • Connection Name - is used to differentiate between your connections.
    For instance, if you manage multiple accounts or would like to connect multiple times to the integration. It's automatically titled (Connection 1,2,3 etc), but you can change it to a custom name to make it easier to identify.
    For example: scytale-production-env.
  • Click Connect to complete the integration process within the tool.

  • To approve the application's permissions, you will be redirected to a Microsoft page. 



All the permissions that are required for the integration with Azure Storage Account are read-only permissions and do not allow Scytale to perform any actions within your Azure account.

  • "Microsoft.Storage/storageAccounts/read"
  • "Microsoft.Storage/storageAccounts/blobServices/containers/read"
  • "Microsoft.Insights/Workbooks/Read"
  • "Microsoft.Insights/MetricAlerts/Read"
  • "Microsoft.Storage/storageAccounts/fileServices/read"