You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/magic-cloud-networking/get-started.mdx
+11-6Lines changed: 11 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -89,6 +89,10 @@ The first discovery of resources may not succeed in all regions, while the IAM p
89
89
90
90
### 2. Authorize access to your Azure account
91
91
92
+
:::caution
93
+
Magic Cloud does not support personal Microsoft accounts. Please sign in using a work or school account that is part of an Azure Entra Tenant.
94
+
:::
95
+
92
96
1. Select **Create service principal**. You will be redirected to Microsoft's login page.
93
97
2. Enter your Azure credentials. If your account does not have administrator privileges, you may need to pass this link to an account that has administrator privileges.
94
98
3. The next screen lists Cloudflare required permissions to access your account. Select **Accept**.
@@ -125,13 +129,14 @@ The first discovery of resources may not succeed in all regions, while the IAM p
125
129
2. Grant the new service account these roles:
126
130
-`Compute Network Admin`
127
131
-`Compute Viewer`
128
-
3. Grant the **Service Account Token Creator** role to our bot account to allow it to impersonate this service account. Learn how to grant a specific role [in Google's documentation](https://cloud.google.com/iam/docs/manage-access-service-accounts#grant-single-role):
132
+
3. Under **IAM & Admin** > **Service Accounts**, select the service account you just created, and navigate to the **Permissions** tab.
133
+
4. Grant the **Service Account Token Creator** role to our bot account to allow it to impersonate this service account. Learn how to grant a specific role [in Google's documentation](https://cloud.google.com/iam/docs/manage-access-service-accounts#grant-single-role):
4. In the **service account email field**, enter the email account that you used to create the GCP service account.
131
-
5. In the **Project ID field**, enter the [project ID](https://support.google.com/googleapi/answer/7014113?hl=en) associated with your project.
132
-
6.[Add the label](https://cloud.google.com/resource-manager/docs/creating-managing-labels#create-labels) displayed on the dash to your project.
133
-
7. Select **I authorize Cloudflare to access my GCP account.** If your account does not have administrator privileges, you may need to pass this link to an account that has administrator privileges.
134
-
8. Select **Authorize**.
135
+
5. In the **service account email field**, enter the email account that you used to create the GCP service account.
136
+
6. In the **Project ID field**, enter the [project ID](https://support.google.com/googleapi/answer/7014113?hl=en) associated with your project.
137
+
7.[Add the label](https://cloud.google.com/resource-manager/docs/creating-managing-labels#create-labels) displayed on the dash to your project.
138
+
8. Select **I authorize Cloudflare to access my GCP account.** If your account does not have administrator privileges, you may need to pass this link to an account that has administrator privileges.
139
+
9. Select **Authorize**.
135
140
136
141
You have successfully connected your cloud provider to Magic Cloud Networking. Cloud resources found by Magic Cloud Networking are available in the [Cloud resource catalog](/magic-cloud-networking/manage-resources/#cloud-resource-catalog).
0 commit comments