Migration to Azure
Azure Pre-requisites
Generating the required Azure Credentials
To generate the required Azure credentials to enable Migration, create an Azure Active Directory (AD) application which has permissions to access and modify resources on Azure. During creation of the Azure AD application and assignment of required permissions, you are provided with credentials needed to enter in the IBM Live Migration Service console. These credentials include:
- Application ID
- Authentication Key
- Directory ID
- Subscription ID
The instructions below describe the steps to create an Azure AD application, to assign required permissions and obtain required Azure credentials. The steps include:
- Verify the existence of required permissions to create a new Azure AD application
- Create a new Azure AD application
- Assign new AD application to the required role in the Azure subscription
- Obtain the Application ID and Authenticating Key of the new Azure AD applications
- Obtain the Directory ID of the Azure Active Directory
- Obtain the Subscription ID of the Azure AD application
In the subsequent instructions, the term Azure AD directory represents synonymous terms.
Verifying the existence of required permissions for creating a new Azure AD application
To generate required credentials, permissions are required to register an application with the Azure AD directory and assign the application to a role in the Azure subscription. The first step is to ensure that you have the right permissions to perform actions.
Checking Azure Active Directory Permissions
Check the current Azure AD directory user permissions, before creating a new Azure AD application. Verify if permissions to register AD apps are made available.
The permission check results in one of the following:
- The Azure AD directory allows any user, either an admin or non-admin to register AD apps. Here, specific user permissions check isn't mandated but permissions are given by default. Proceed to check permissions for the Azure subscription.
- Only admins are authorised to register AD apps on the Azure AD directory. Check for specific user permissions:
- An admin should check if they can register AD apps.
- A non-admin should check if they have Write access to register AD apps.
- Check the Azure AD directory permissions.
The steps to check Azure active permissions include:
-
Sign in to the Azure account through the Azure portal.

-
On the Azure (ARM) portal search for Azure Active Directory. Click on the Azure Active Directory search result.

-
In the Azure Active Directory navigation menu, select, User settings.
-
In the User settings, verify App registrations settings for your Azure AD directory.

- When set to Yes, non-admin users can register AD apps. Basically, any user in the Azure AD directory can register an app and create a new AD application.
-
When set to No, only admin users can register apps. Check whether your user account is an admin for the Azure AD directory or not.
The steps to check if you are an admin or not include:
-
Select Overview in the navigation menu.

-
On the right-hand menu, search for a User under the Find menu by typing in the user account into the search box. Click on the account from the search results.

-
When user account details are displayed, select Directory role option from the navigation menu.Your assigned directory role will show to the right.

-
If the account is assigned the role of a user and App registration setting is not enabled for users, but is limited to only admin users, you cannot register apps.
Here, you need to ask the admin to either assign an admin role or allow users to register apps in the Azure AD directory. This is done by enabling App registrations settings.
-
If your account is assigned an admin role, then you are authorized to register apps.
-
The next step is to check whether the Azure subscription facilitates assigning a role to AD apps. This check is required, as you must be able to assign a specific role to the new AD application for this app. This will enable the app to access resources in your subscription.
Checking Azure Subscription Permissions
Verify the user account has the permission to register AD apps. To confirm, check permissions for the Azure subscription.
To access resources in the subscription, assign new AD application to the Contributor role. The Azure account subscription, should have Microsoft. Authorization/*/Write access to assign an AD app to a role. The Write action is granted only by the Owner or User Access Administrator roles. If the account is assigned a different role in your subscription, adequate permissions will not be made available.
-
Navigate to Azure Active Directory in the navigation menu. (More services-Azure Active Directory).

-
Navigate to Overview in the navigation menu.

-
Click, Find a user under Quick tasks menu.

-
Search for the user account in the search box and click, account.
-
Navigate to Azure resources in the navigation menu.

-
Navigate to Azure resources on the internal left-hand navigational menu. View your assigned roles to determine if you have adequate permissions to assign an AD app to a role. Only the Owner and User Access Administrator roles can assign an AD app to a role. If you do not have the proper roles, ask your subscription administrator to add you to the User Access Administrator role. The following example shows users with the Contributor, User Access Administrator, and Owner roles assigned to them.
The below example shows a user with the Owner role assigned to them:

After verifying all required permissions, the next step is to create a new Azure AD application. This has permissions to access and modify resources on Azure.
Creating an Azure Active Directory Application
After checking the user account and subscription permissions the next step is to create an Azure AD application and assign required permissions for it.
-
Sign in to the Azure account through the Azure portal.
-
Type Azure Active Directory in the Filter search box. Click on Azure Active Directory search result.

-
In the Azure Active Directory, select, App registrations from the navigation menu.

-
On the App registrations pane, click New application registration button.

-
In the Create dialog box, set the following:
- Name - provide a name and URL for the new application.
- Application Type - select Web app / API as the application type.
-
Sign-in URL - enter any URL in this field. This text is ignored by the IBM Live Migration Service.

-
After setting values, to create the new AD application click Create button at the bottom-left of the page.

The Azure AD application required for IBM Live Migration Service is created. Next, assign the required role to this application.
Assigning the required Role to the Application
To access resources in the subscription, assign the Contributor role to the newly created AD application.
-
Type subscription in the Filter search box From the navigation menu. Click on Subscription search result.

-
In the Subscriptions pane, select specific subscription-resource group or resource to which the application must be assigned.

The selected subscription details are displayed:
-
Select Access Control (IAM), from the navigation menu.

-
In the Access control (IAM) pane, click Add.

-
In the Add permissions dialog box, select Contributor role from the Role dropdown. Search for the new application created earlier and select from the list.

-
Click Save button to finish assigning the app to the role.

The correct role is now assigned to the AD application. This gives permissions to perform the required actions to use the IBM Live Migration Service. The next step is to obtain the credentials needed to enter the IBM Live Migration Service User Console.
Obtaining Azure Credentials
After creating a new AD app and assigning the Contributor role, obtain credentials for this application and the Azure AD directory.
The credentials consist of:
- Application ID and Authentication Key
- Directory ID
- Subscription ID
Obtaining Application ID and Authentication Key
After creating a new Azure AD application, obtain the Application ID and Authentication Key. Remember to copy and save these values, since you will later need to enter them into IBM Live Migration Service user console as part of your Azure credentials
-
Look for Azure Active Directory in the Filter search box. Click Azure Active Directory search result.

-
In the Azure Active Directory, select App registrations from the navigation menu.

-
On the App registrations pane in the Azure Active Directory, select the application created.

The details of the selected application are displayed.
-
Copy the Application ID and save it in an accessible and secured location.
-
To generate an Authentication Key, select the Keys option from the Settings menu.
NoteClick Settings to expand the menu.
-
In the Keys pane, set the following:
-
DESCRIPTION - Provide a description
-
EXPIRES - Select a duration

The key turns blue once values have been added. Click Save.
-
-
-
After saving the Key settings, the Authentication Key value is displayed. Save this value in an accessible and secured location.
Obtaining the Directory ID
After obtaining and saving the Application ID and Authentication Key values, the next step is to obtain the Directory ID. Copy and save the value, which is a part of the required Azure credentials.
-
Look for Azure Active Directory in the Filter search box. Click Azure Active Directory.

-
In the Azure Active Directory, navigate to the Properties tab.Here, copy and save the Directory ID in an accessible and secure location.

Obtaining the Subscription ID
The final step is to obtain the Subscription ID. You need to copy and save this value, since it is a part of the required Azure credentials.
-
Type subscription in the Filter search box From the navigation menu. Click on Subscription search result..

-
In the Subscriptions pane, locate the specific subscription to which the AD application is assigned. Copy and save the Subscription ID in an accessible and secured location.

Now, you have completed generating and gathering the required Azure credentials. The next step to follow is entering the Application ID, Authentication Key, Directory ID, and Subscription ID into the migration console.
Using your Azure ARM Credentials
After generating the required Azure (ARM) credentials, enter the credentials into the IBM Live Migration Service User Console.
- Sign in to the IBM Live Migration Service user console.
-
From the Projects dropdown menu, select the Azure (ARM) project to which the Azure (ARM) credentials should be assigned to.
-
Click Setup & Info in the main navigational menu to the left. From the Setup & Info, click the ARM CREDENTIALS tab.
The ARM CREDENTIALS page allows for setting up the replication Staging Area on Azure (ARM) and manage and monitor resources on your Azure (ARM)Target infrastructure.
-
Enter your unique values, based on the required Azure (ARM) credentials you created for the IBM Live Migration Service solution, into the corresponding fields:
- Application ID
- Key (Authentication Key)
- Directory ID
-
Subscription ID

-
After entering your values, click Save at the bottom right of the page.

After saving, your screen should look like this image:

Your Azure (ARM) credentials are now saved in your IBM Live Migration Service Project.
NoteIf the Azure (ARM) credentials you entered do not exist or is invalid in any way, or the if the IAM role of the AD application used for IBM Live Migration Service is NOT the Contributor, you get the following error message:
In this event, you should attempt the following troubleshooting steps:
- Verify that you assigned the new AD application to the Contributor role in your Azure (ARM) subscription (as illustrated in the Assigning the Required Role to the Application section).
- Retry the steps described in the Generating the Required Azure Credentials section with the most updated credentials within the Azure (ARM) portal.