Azure Integration - Documentation


What Azure Integration Does

Pinger Man can integrate with Microsoft Azure to streamline domain and DNS management. With this integration:

  • Your domains and DNS records are automatically imported.
  • WHOIS monitors are automatically created for imported domains.
  • You can view all your DNS records and create DNS monitors with a single click.
  • With the right permissions, you can also add, edit, or delete DNS records directly from Pinger Man, making it your central hub for DNS management.

How to Integrate with Azure

  1. Go to the Integrations Area
    1. In the Pinger Man dashboard, select Integrations from the left sidebar.
    2. Click Add Integration to open the Add Integration form.
    3. Enter a Name for the integration.
    4. Select Azure as the Type.
  2. Create the App Registration and Service Principal
    1. Sign in to the Azure Portal using an account with permission to register applications.
    2. Go to Azure Active DirectoryApp registrations+ New registration.
    3. Fill in:
      • Name : e.g., PingerMan
      • Supported account types : Select the option that matches your use case.
    4. Click Register.
    5. After registration:
      • Copy the Application (client) ID and Directory (tenant) ID.
      • Go to Certificates & SecretsClient secrets+ New client secret.
      • Add a description and select an expiry (e.g., 12 or 24 months).
      • Click Add and copy the secret value immediately — it will only be shown once.
  3. Assign DNS Permissions

    Use Role-Based Access Control (RBAC) to grant the required permissions for reading and optionally modifying DNS records.

    • Option A: Full DNS Access (DNS Zone Contributor)
      1. Navigate to the Resource Group or specific DNS Zone you want Pinger Man to manage.
      2. Go to Access control (IAM)+ Add role assignment.
      3. Select the role: DNS Zone Contributor (full control over DNS zones and records).
      4. Assign it to your App Registration.
      5. Click Save.
    • Option B: Fine-Grained Permissions (Recommended)

      If you prefer limited permissions (e.g., to manage only CNAME records), create a Custom Role with these permissions:

      • Microsoft.Network/dnsZones/CNAME/*
      • Microsoft.Network/dnsZones/read
      • Microsoft.Authorization/*/read
      • Microsoft.Resources/deployments/*
      • Microsoft.Resources/subscriptions/resourceGroups/read

      Assign the custom role to your App Registration at the Resource Group or DNS Zone level.

  4. Fill Out the Integration Form

    Back in Pinger Man, complete the form with the following details:

    • Azure Tenant ID
    • Azure Client ID
    • Azure Client Secret
    • Azure Subscription ID
    • Azure Resource Group
  5. Click Finish to complete the integration.

Always review the permissions granted with your security or IT team to ensure compliance with your organization’s policies.