Enabling Azure Account Creation

Follow

Enabling Azure Account Creation

Before you can create Azure subscriptions or resource groups through Kion, you need to ensure creation is enabled on the Kion billing source and in the Azure Portal.

In Kion

The ability to create Azure EA and Azure MCA subscriptions was added in version 3.8.0. If you use an earlier version, account creation is only supported for CSP subscriptions.

To enable the creation of new Azure resource groups in Kion:

  1. Navigate to Accounts > Billing Sources.
  2. Click the ellipsis menu next to the billing source, and select Edit.
  3. Ensure the This Billing Source Supports Resource Group Creation option is enabled.
  4. Click Update Billing Source.

To enable the creation of new Azure subscriptions in Kion:

  1. Navigate to Accounts > Billing Sources.
  2. Click the ellipsis menu next to the billing source, and select Edit.
  3. Ensure the This Billing Source Supports Subscription Creation option is enabled.
  4. Click Update Billing Source.

In Azure

The process to enable account creation in the Azure Portal depends on the type of billing account you have. If you are unsure what your Azure billing account type is, see Identifying Your Azure Billing Type.

EAMCACSP

Currently, you must use Azure APIs to enable account creation on Azure EA billing accounts. To do this, you need to know your billing account ID, enrollment account ID, tenant ID, and app registration principal ID.

To find this information:

  1. Log in to the Azure Portal with your enrollment account.
  2. Navigate to your enrollment account page.
  3. Select Settings > Properties.
  4. Record the (enrollment) Account ID and the Billing Account ID.
  5. Navigate to your app registration page.
  6. Record the Directory (Tenant) ID.
  7. Click the link next to Managed application in local directory.
  8. Record the Object ID. This is your principal ID.
  9. The billing role assignment ID is: a0bcee42-bf30-4d1b-926a-48d21664ef71

To make the role assignments, you can use any method of call the Azure API. However, you must use a user or auth token that has the ability to make role assignments.

PUT /providers/Microsoft.Billing/billingAccounts/{billingAccountID}/enrollmentAccounts/{enrollmentAccountID}/billingRoleAssignments/{billingRoleAssignmentID}?api-version=2019-10-01-preview
{
	"properties": {
		"principalId": "{principal ID}",
		"principalTenantId": "{tenant ID}",
		"roleDefinitionId": "/providers/Microsoft.Billing/billingAccounts/{billingAccountID}/enrollmentAccounts/{encrollmentAccountID}/billingRoleDefinitions/a0bcee42-bf30-4d1b-926a-48d21664ef71"
	}
}