...
Click Add an Application ID URI, which is used by the client applications to identify this application.
Set the Application ID URI.
Navigate to Go to App roles:
Click Create app role.
Set up a Dev Admin role.
Choose Applications for the Allowed member types.
Specify the Value as dev.environmentAdmin.
Provide a useful description of what this role is supposed to allow.
Navigate to Manifest in the left navigation to ensure Azure Active Directory returns version 2 tokens on its token endpoint.
Search for the key for ‘accessTokenAcceptedVersion’.
Update the value from
null
to 2, and save it.
Return to the Overview and view the Endpoints, where you can copy and save the OAuth 2.0 token endpoint.
Register the Kafka client application.
Navigate to Certificates & secrets on the left navigation bar and create a new client secret.
...
Navigate to the API permissions > Add a permission.
Select the APIs my organization uses tab.
Add the roles to your client application according to your Confluent Cloud registration.
Copy and save the Scope parameter from the role you added to the client application.
Click the Grant admin consent and confirm the grant. This completes the Azure AD configuration for the client application. You can now generate a JWT from an Azure AD OAuth 2.0 token endpoint using the Client ID, Client Secret, and Scope Parameters.
Specify the Credentials and Validate the Snap Account
Navigate to the Kafka Snap of your choice and configure the Kafka OAuth2 Account with the details from the Azure portal's registered application.
Validate the Snap Account.
Click Apply to save the Account configuration.
Related Links:content: