Documentation Index
Fetch the complete documentation index at: https://docs.rad.security/llms.txt
Use this file to discover all available pages before exploring further.
RAD Security – Azure Cloud Connect (Azure Portal Only)
This guide walks you through connecting your Azure subscription(s) to RAD Security using only the Azure Portal. No infrastructure-as-code or automation tools are required.What you will do
- Create an Azure application (service principal) for RAD Security
- Create a custom Azure RBAC role with read-only permissions
- Assign that role to the RAD Security application
- Complete the connection in the RAD Security UI
Prerequisites
- Azure Owner or User Access Administrator permissions on each subscription
- Ability to create App Registrations and Custom RBAC Roles
- List of Azure Subscription IDs you want RAD to connect
Step 1: Create an Azure Application for RAD Security
This application is how RAD securely reads data from your Azure environment.- Sign in to the Azure Portal
- Go to Microsoft Entra ID
- Click + Add → App registration
- Fill in:
- Name:
RAD-Security-Connect - Supported account types: Single tenant
- Name:
- Click Register
Capture these values (you will need them later):
- Application (client) ID
- Directory (tenant) ID
Step 2: Create a Client Secret
- In the app you just created, click on Add a certificate or secret
- Click on New client secret
-
Add:
- Description:
RAD Security - Expiration: per your security policy
- Description:
- Click Add
- Immediately copy and save the secret VALUE and Secret ID (This cannot be retrieved later)
Step 3: Create the Custom RBAC Role
This role grants RAD Security read-only access required for visibility.Create the role
- Go to Subscriptions
- Select any one of the subscriptions you plan to connect
- Go to Access control (IAM)
- Select the Roles tab
- Click + Add → Custom role
- Custom role name:
RAD Security Connect - Description:
Allow RAD Security read access to Azure resources - Baseline permissions: Start from scratch
- Click Next
Permissions
- Go to the JSON tab
- Click Edit
- Add actions so that JSON looks as follows:
- Leave NotActions, DataActions, and NotDataActions empty.
- Click on Review + create
- Click on Create
Step 4: Assign the Role to the RAD Security Application
Repeat the steps below for each subscription you want to connect.- Go to Subscriptions
- Select the subscription
- Go to Access control (IAM)
- Click + Add → Add role assignment
- Role:
RAD Security Connect - Assign access to: User, group, or service principal
- Click Select members
- Select the RAD-Security-Connect application
- Click Review + assign
- Click Review + assign again
Step 5: Send Connection Details to RAD Security
What the customer needs to send
Once all Azure steps are complete, please securely send the following information to your RAD Security contact or RAD support:- Tenant ID
- Client ID (Application ID)
- Client Secret
- Subscription ID(s) connected
- Confirmation that:
- The custom role is created
- The role is assigned to the RAD application on each subscription
What RAD will do
RAD Security will:- Validate permissions
- Complete the backend registration
- Confirm when the Azure account is successfully connected and ingesting data
Validation Checklist
Before finishing, confirm:- The RAD-Security-Connect app exists in Entra ID
- The RAD Security Connect role exists
- The role is assigned to the app on each subscription
- The Azure account shows as connected in RAD Security