Azure Integration - Documentation
What Azure Integration Does
Pinger Man can integrate with Microsoft Azure to streamline domain and DNS management. With this integration:
- Your domains and DNS records are automatically imported.
- WHOIS monitors are automatically created for imported domains.
- You can view all your DNS records and create DNS monitors with a single click.
- With the right permissions, you can also add, edit, or delete DNS records directly from Pinger Man, making it your central hub for DNS management.
How to Integrate with Azure
- Go to the Integrations Area
- In the Pinger Man dashboard, select Integrations from the left sidebar.
- Click Add Integration to open the Add Integration form.
- Enter a Name for the integration.
- Select Azure as the Type.
- Create the App Registration and Service Principal
- Sign in to the Azure Portal using an account with permission to register applications.
- Go to Azure Active Directory → App registrations → + New registration.
-
Fill in:
- Name : e.g., PingerMan
- Supported account types : Select the option that matches your use case.
- Click Register.
-
After registration:
- Copy the Application (client) ID and Directory (tenant) ID.
- Go to Certificates & Secrets → Client secrets → + New client secret.
- Add a description and select an expiry (e.g., 12 or 24 months).
- Click Add and copy the secret value immediately — it will only be shown once.
-
Assign DNS Permissions
Use Role-Based Access Control (RBAC) to grant the required permissions for reading and optionally modifying DNS records.
-
Option A: Full DNS Access (DNS Zone Contributor)
- Navigate to the Resource Group or specific DNS Zone you want Pinger Man to manage.
- Go to Access control (IAM) → + Add role assignment.
- Select the role: DNS Zone Contributor (full control over DNS zones and records).
- Assign it to your App Registration.
- Click Save.
-
Option B: Fine-Grained Permissions (Recommended)
If you prefer limited permissions (e.g., to manage only CNAME records), create a Custom Role with these permissions:
- Microsoft.Network/dnsZones/CNAME/*
- Microsoft.Network/dnsZones/read
- Microsoft.Authorization/*/read
- Microsoft.Resources/deployments/*
- Microsoft.Resources/subscriptions/resourceGroups/read
Assign the custom role to your App Registration at the Resource Group or DNS Zone level.
-
Option A: Full DNS Access (DNS Zone Contributor)
-
Fill Out the Integration Form
Back in Pinger Man, complete the form with the following details:
- Azure Tenant ID
- Azure Client ID
- Azure Client Secret
- Azure Subscription ID
- Azure Resource Group
Click Finish to complete the integration.
Always review the permissions granted with your security or IT team to ensure compliance with your organization’s policies.