Setting up Insight Azure Integration

On this page

What you need to get it up and running

Insight Azure Integration requires both JIRA (Core, Software or Service Desk) and Insight to function.

Download and install Insight Azure Integration

The latest version of Insight Azure can be downloaded from Atlassian Marketplace.

Setting up Insight synchronization

You need to setup Insight in order to import data from Azure. Read about how to setup up Insight here

1. Getting your Directory Id

1.1) On the dashboard, in the left navigation menu, select All services > Azure Active Directory.

1.2) Scroll down to Manage and open the Properties

1.3) Note the Directory Id for usage in the import configuration.

2. Getting you Subscription Id

2.1) On the dashboard, in the left navigation menu, select All services > Subscriptions.

2.2) Note the Subscription Id for usage in the import configuration.

3. Creating Access Application

You need to create an Application that will be used for the API-Gateway.

3.1) On the dashboard, in the left navigation menu, select All services > Azure Active Directory.

3.2) Go to App registrations. Select New registration.

3.3) Enter an application name of your choice. For example, "insight-azure-integration"

3.4) Create the App registration

4. Creating Application Secret Key

4.1) Go to the settings of the previous created application.

4.2) Select Certificates & secrets

4.3) Click New client secret

4.4) Enter a Description for the Key (e.g. AppKey), choose a duration and click Save.

4.5) Note the generated Key-Value for using it in the import configuration.

5. Assign Application Role assignment

6.1) On the dashboard, in the left navigation menu, select All services > Subscriptions.

Select/Open your subscription

6.2) Select Access control (IAM)

6.3) Select Role assignments

6.4) Click Add

6.5) Choose Role = Reader and search at the select for the Application name that you have created in step 2

6. Check Required Permissions

6.1) Go to the settings of the previous created application.

6.2) Select API permissions.

6.3) make sure that the delegated permission User.Read exists. (default)


The following steps are required if you like to fetch Azure Graph Data

6.4) On the dashboard, in the left navigation menu, select All services > Azure Active Directory.

6.5) Go to App registrations. Select the App registration that you have created in step 2

6.6) Click API permissions and Add a permission

6.7) Select "Microsoft Graph"

6.8) Select "Application permissions"

6.9) Select and add User and check "User.Read.All"

6.10) Repeat from step 6.7 for:

  • "Group.Read.All"
  • "Device.ReadWrite.All"
  • "DeviceManagementManagedDevices.Read.All"

6.11) Select "Azure Active Directory Graph"

6.12) Select "Application permissions"

6.13) Select and add Application and check "Application.ReadWrite.All"

6.14) Click "Grant admin consent for <Your Subscription>"