Application Configuration in Azure Portal for Kafka OAuth2 Account
Overview
Snaps in the Kafka Snap Pack require a Kafka OAuth2 account to access Azure resources. To authorize the accounts successfully, ensure that you create and configure two applications corresponding to the account:
- Confluent Cloud application
- Client application
Prerequisites
An Azure account with a free subscription to create the application.
-
Create Two Applications in the Azure Portal
- Log in to the Microsoft Azure Portal.
- Navigate to Azure services > Microsoft Entra ID
- Navigate to Add > App registration.
- On the Register an application page, specify the name for
registering the Confluent Cloud application, which allows client
applications to claim roles in Confluent Cloud, and click
Register. Learn more about creating an application at How to register an app in Microsoft
Entra ID - Microsoft identity platform. Note: To use an existing application, navigate to Portal Home > Azure Active Directory > App registrations > All applications. In the search box, specify the application name you want to use. The details of the registered application are displayed in the search list.Note: This application does not need the Redirect URI.
.png)
- Click Add an Application ID URI. This URI is used by the client applications to identify this application.
- Set the Application ID URI.
.png)
- Navigate to Go to App roles.
- Click Create app role.
- Set up a Dev Admin role.
- Choose Applications for the Allowed member types.
- Specify the Value as
dev.environmentAdmin. - Provide a useful description of what this role is supposed to
allow.
.png)
- Navigate to Manifest in the left navigation to
ensure Azure Active Directory returns version 2 tokens on its token
endpoint.
.png)
-
- Search for the key for
‘
requestedAccessTokenVersion’. - Update the value from
nullto 2, and save it..png)
- Search for the key for
‘
-
- Return to the Overview and view the
Endpoints, where you can copy and save the
OAuth 2.0 token endpoint.
.png)
- Register the Kafka client application.
.png)
- Navigate to Certificates & secrets on the left navigation bar
and create a new client secret.
Note: You can copy the Client secret value only after it is generated. This value displays only once, so ensure you copy it securely. - Navigate to API permissions > Add a permission
- Select the APIs my organization uses tab.
.png)
- Add the roles to your client application according to your Confluent
Cloud registration.
.png)
- Copy and save the Scope parameter from the role
you added to the client application.
.png)
- Click the Grant admin consent and confirm the
grant. This completes the Azure AD configuration for the client
application. You can now generate a JWT from an Azure AD OAuth 2.0 token
endpoint using the Client ID, Client Secret, and Scope
Parameters.
.png)
-
Specify the Credentials and Validate the Snap Account
- Navigate to the Kafka Snap of your choice and configure the Kafka OAuth2
Account with the details from the Azure portal's registered
application.
.png)
- Validate the Snap Account.
- Click Apply to save the Account configuration.
- Navigate to the Kafka Snap of your choice and configure the Kafka OAuth2
Account with the details from the Azure portal's registered
application.