Tutorial: Configure hybrid cloud identity for Azure and Azure Stack applications

Applies to: Azure Stack integrated systems and Azure Stack Development Kit

Learn how to configure a hybrid cloud identity for your Azure and Azure Stack applications.

You have two options for granting access to your applications in both global Azure and Azure Stack.

  • When Azure Stack has a continuous connection to the Internet, you can use Azure Active Directory (Azure AD).
  • When Azure Stack is disconnected from the Internet, you can use Azure Directory Federated Services (AD FS).

You use service principals to grant access to your Azure Stack applications for the purpose of deployment or configuration using the Azure Resource Manager in Azure Stack.

In this tutorial, you will build a sample environment to:

  • Establish a hybrid identity in global Azure and Azure Stack
  • Retrieve a token to access the Azure Stack API.

You must have Azure Stack operator permissions for the steps in this tutorial.

Tip

hybrid-pillars.png
Microsoft Azure Stack is an extension of Azure. Azure Stack brings the agility and innovation of cloud computing to your on-premises environment and enabling the only hybrid cloud that allows you to build and deploy hybrid apps anywhere.

The whitepaper Design Considerations for Hybrid Applications reviews pillars of software quality (placement, scalability, availability, resiliency, manageability and security) for designing, deploying and operating hybrid applications. The design considerations assist in optimizing hybrid application design, minimizing challenges in production environments.

Create a service principal for Azure AD in the portal

If you've deployed Azure Stack using Azure AD as the identity store, you can create service principals just like you do for Azure. The create service principals article shows you how to perform the steps through the portal. Check to see that you have the required Azure AD permissions before beginning.

Create a service principal for AD FS using PowerShell

If you have deployed Azure Stack with AD FS, you can use PowerShell to create a service principal, assign a role for access, and sign in from PowerShell using that identity. Create service principal for AD FS shows you how to perform the required steps using PowerShell.

Using the Azure Stack API

The Azure Stack API tutorial walks you through the process of retrieving a token to access the Azure Stack API.

Connect to Azure Stack using Powershell

The quickstart to get up and running with PowerShell in Azure Stack walks you through the steps needed to install Azure PowerShell and connect to your Azure Stack installation.

Prerequisites

An Azure Stack installation connected to Azure Active Directory with a subscription you can access. If you don't have an Azure Stack installation, you can use these instructions to set up an Azure Stack Development Kit.

Connect to Azure Stack using code

To connect to Azure Stack using code, use the Azure Resource Manager endpoints API to get the authentication and graph endpoints for your Azure Stack installation, and then authenticate using REST requests. You can find a sample client application on GitHub.

Note

Unless the Azure SDK for your language of choice supports Azure API Profiles, the SDK may not work with Azure Stack. To learn more about Azure API Profiles, see the manage API version profiles article.

Next steps