Skip to content

Commit 46d2ed9

Browse files
added new step and warning (#22012)
1 parent 29028c2 commit 46d2ed9

File tree

1 file changed

+11
-6
lines changed

1 file changed

+11
-6
lines changed

src/content/docs/magic-cloud-networking/get-started.mdx

Lines changed: 11 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -89,6 +89,10 @@ The first discovery of resources may not succeed in all regions, while the IAM p
8989

9090
### 2. Authorize access to your Azure account
9191

92+
:::caution
93+
Magic Cloud does not support personal Microsoft accounts. Please sign in using a work or school account that is part of an Azure Entra Tenant.
94+
:::
95+
9296
1. Select **Create service principal**. You will be redirected to Microsoft's login page.
9397
2. Enter your Azure credentials. If your account does not have administrator privileges, you may need to pass this link to an account that has administrator privileges.
9498
3. The next screen lists Cloudflare required permissions to access your account. Select **Accept**.
@@ -125,13 +129,14 @@ The first discovery of resources may not succeed in all regions, while the IAM p
125129
2. Grant the new service account these roles:
126130
- `Compute Network Admin`
127131
- `Compute Viewer`
128-
3. Grant the **Service Account Token Creator** role to our bot account to allow it to impersonate this service account. Learn how to grant a specific role [in Google's documentation](https://cloud.google.com/iam/docs/manage-access-service-accounts#grant-single-role):
132+
3. Under **IAM & Admin** > **Service Accounts**, select the service account you just created, and navigate to the **Permissions** tab.
133+
4. Grant the **Service Account Token Creator** role to our bot account to allow it to impersonate this service account. Learn how to grant a specific role [in Google's documentation](https://cloud.google.com/iam/docs/manage-access-service-accounts#grant-single-role):
129134
130-
4. In the **service account email field**, enter the email account that you used to create the GCP service account.
131-
5. In the **Project ID field**, enter the [project ID](https://support.google.com/googleapi/answer/7014113?hl=en) associated with your project.
132-
6. [Add the label](https://cloud.google.com/resource-manager/docs/creating-managing-labels#create-labels) displayed on the dash to your project.
133-
7. Select **I authorize Cloudflare to access my GCP account.** If your account does not have administrator privileges, you may need to pass this link to an account that has administrator privileges.
134-
8. Select **Authorize**.
135+
5. In the **service account email field**, enter the email account that you used to create the GCP service account.
136+
6. In the **Project ID field**, enter the [project ID](https://support.google.com/googleapi/answer/7014113?hl=en) associated with your project.
137+
7. [Add the label](https://cloud.google.com/resource-manager/docs/creating-managing-labels#create-labels) displayed on the dash to your project.
138+
8. Select **I authorize Cloudflare to access my GCP account.** If your account does not have administrator privileges, you may need to pass this link to an account that has administrator privileges.
139+
9. Select **Authorize**.
135140

136141
You have successfully connected your cloud provider to Magic Cloud Networking. Cloud resources found by Magic Cloud Networking are available in the [Cloud resource catalog](/magic-cloud-networking/manage-resources/#cloud-resource-catalog).
137142

0 commit comments

Comments
 (0)