Guide to generating an access token in Azure, retrieving virtual machines, and configuring the Cloud Builder role for Azure, GCP, and AWS.
az
, gcloud
, and aws
CLIs are installed and authenticated with sufficient permissions.az account
commands for token generation to simplify the process and reduce manual key management.Contributor
, Reader
).gcloud
CLI installed and authenticated for GCP operations.aws
CLI installed and authenticated for AWS operations.your-azure-subscription-id
.your-project-name
(Project Number: your-project-number
).your-aws-account-id
.your-service-principal@your-tenant.onmicrosoft.com
.your-service-principal
) for authentication.
Reader
role, e.g.:
appId
, password
, and tenant
for use as YOUR_CLIENT_ID
, YOUR_CLIENT_SECRET
, and YOUR_TENANT_ID
.cloud-builder-role.json
:your-steampipe-svc@your-tenant.onmicrosoft.com
at the desired scope.your-steampipe-svc@your-project-name.iam.gserviceaccount.com
at the desired scope.cloud-builder-trust-policy.json
:cloud-builder-policy.json
:az login
to authenticate as the service principal and generate an access token.
accessToken
for use as YOUR_ACCESS_TOKEN
.your-service-principal@your-tenant.onmicrosoft.com
CloudBuilder
eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiIsIng1dCI6...
your-azure-subscription-id
.