# Azure AD: Managing Access to Groups

In this tutorial, you'll learn how to configure [Key Concepts](/how-abbey-works/concepts.md#grant-kits) to add users to groups. This use case models Group-based access control.

To make this example simple, you can act as both the Azure user gaining access to the system and the approver of the system. This will allow you to go through the flow of requesting and approving access from the same account. In a more common production scenario, these calls would be happening from two separate accounts.

We will be using the [Azure Starter Kit](https://github.com/abbeylabs/abbey-starter-kit-azure) as a base and replace configuration stubs for our use case.

## Before you start

1. **Make sure you have:**
   * An [Abbey account](https://app.abbey.so/sign-up)
   * An [Abbey API Token](/admin/managing-api-tokens.md#creating-new-api-tokens)
   * An Azure user
2. **Make sure you setup:**
   * An [Azure Starter Kit](https://github.com/abbeylabs/abbey-starter-kit-azure) by following [Get a Starter Kit](/build-a-grant-kit/get-a-starter-kit.md)
   * A Connection to a repo by following [Connect a Repo](/build-a-grant-kit/connect-a-repo.md)

## Step 1: Configure Your Grant Kit

### Configure Output

Grant Kits rely on your GitHub account and repository name to output access changes, which we'll set through Terraform local variables. Update the `locals` block in `main.tf` with your `account_name` and `repo_name`

{% code title="main.tf" %}

```hcl
 locals {
  account_name = "" #CHANGEME
  repo_name = "" #CHANGEME
  ...
}
```

{% endcode %}

### Configure Reviewers

Workflow defines who should approve an access request.&#x20;

Let's update the `reviewers` block by adding yourself as the reviewer by switching `replace-me@example.com` with the email address you use to sign into Abbey.&#x20;

{% code title="main.tf" %}

```diff
 resource "abbey_grant_kit" "..." {
   ...
   workflow = {
     steps = [
       {
         reviewers = {
-          one_of = ["replace-me@example.com"] # CHANGEME
+          one_of = ["alice@example.com"]
```

{% endcode %}

## Step 2: Configure the Azure User

In the Azure console, find your User and copy the **User Principal Name.** Replace the stub with it.

{% code title="main.tf" lineNumbers="true" %}

```diff
data "azuread_user" "dev_azure_user" {
-  user_principal_name = "replace-me-EXT-MICROSOFT_UPN@example.com" # need to use azure userPrincipalName
+  user_principal_name = "alice-EXT-MICROSOFT_UPN@example.com"
}
```

{% endcode %}

This will allow terraform to grab the Azure user ID to generate the grant that adds the user to the group.

## Step 3: Deploy Your Starter Kit

This repo uses Azure in the Github Actions job when generating terraform resources. We'll need to [install the Azure CLI](https://learn.microsoft.com/en-us/cli/azure/install-azure-cli). On Mac:

```bash
brew update && brew install azure-cli
az login
```

Then we'll need to create a set of credentials for use by Github via:

```bash
az ad sp create-for-rbac --name "myApp" --role contributor \
                            --scopes /subscriptions/{subscription-id} \
                            --sdk-auth
```

The command should output a JSON object similar to this:

```json
  {
    "clientId": "<GUID>", # AZURE_CLIENT_ID
    "clientSecret": "<GUID>", # AZURE_CLIENT_SECRET
    "subscriptionId": "<GUID>", # AZURE_SUBSCRIPTION_ID
    "tenantId": "<GUID>", # AZURE_TENANT_ID
    (...)
  }
```

Next, add the following repository secrets so Github Actions can access these credentials.

1. `AZURE_CLIENT_ID`
2. `AZURE_CLIENT_SECRET`
3. `AZURE_SUBSCRIPTION_ID`
4. `AZURE_TENANT_ID`
5. `ABBEY_TOKEN` - API token taken from [**Settings > API Tokens**](https://app.abbey.io/settings/developers)

You can do this via **Github repo page -> Settings -> Secrets and Variables -> Actions -> New Repository Secret** and create with the above names. You can take the values from the JSON output of the `az ad sp` command.

<details>

<summary>What should it look like?</summary>

<img src="/files/LAcRxAAwAQmCX1jLfgGZ" alt="" data-size="original">

</details>

We also will need to add the correct permissions to the role we created during the `az ad sp create-for-rbac` command. This will allow the Azure client using the secrets in the github actions job to add the user to the desired group.

Find the role by navigating to the Azure Console , then

1. App Registrations
2. View all registrations in Directory
3. Select "myApp" (the app we created as part of the `az` command).
4. API Permissions
5. Add a Permissions
6. Microsoft Graph
7. Add Directory.ReadWrite.All with "Grant Admin Consent for Default Directory" enabled

Your final page in permissions should look like this:

<figure><img src="/files/BKH74BQQZgJzrccq0TyQ" alt=""><figcaption></figcaption></figure>

To deploy your Starter Kit, follow instructions from [Deploy Your Grant Kit](/build-a-grant-kit/deploying-your-grant-kit.md).

## Step 5: Automate Access Management

:tada: Congratulations! Abbey is now managing permissions to your Resource for you. :tada:

You can now start requesting and approving access by following the [Request Access](/build-a-grant-kit/requesting-access.md) and [Approve or Deny Access Requests](/build-a-grant-kit/approving-or-denying-access-requests.md) guides.

{% hint style="success" %}
Abbey strives to help you automate and secure access management without being intrusive.

To that end, this Pull Request contains native Terraform HCL code using normal open source Terraform Provider libraries. It represents the permissions change. In this case, it's just a simple creation of a new Terraform Resource.
{% endhint %}

After approving the request, you should be able to see that the User has been added to the Group in the Azure console. Note that because this starter kit comes with a time-based policy by default, the user will automatically be removed after 1 hour.

<figure><img src="/files/WujU4W4PYO1ympW9ckYa" alt=""><figcaption></figcaption></figure>

## Next Steps

To learn more about what [Resources](/resources/privacy-policy.md) you can configure, try one of our [Step-by-Step Tutorials](/getting-started/tutorials.md).

For more information on how Abbey works, visit the [Key Concepts](/how-abbey-works/concepts.md) or [Grant Kits](/reference/grant-kits.md) page.


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://docs.abbey.io/getting-started/tutorials/azure-ad-managing-access-to-groups.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
