Azure CSP Account Registration
To successfully register your Azure CSP account in Octo, there are pre-requisite steps that must be completed outside the Octo platform. These steps involve enabling API access in the Microsoft Partner Center and Dev Center to allow Octo to retrieve ERP pricing and billing data.
Setup Partner Center Access
You can follow the steps here and here to set up API access to the Partner Center.
Note: Access to the sandbox integration account is not required.
Enable API Access
Once the account is configured, you must enable API access in advance to use the Partner Center SDK in the integration sandbox. This must be done separately for both the primary partner account and the sandbox account.
- Sign in to the Partner Dashboard with a Global Administrator account.
- From the Settings menu (gear icon), select Partner Settings.
- On the Account Settings page, select App Management.
- If no apps exist, add a new Web App. If an app already exists, click Add Key.
- When creating a Web App, copy the app registration information (especially the key) and store it securely.
- Sign out of the Partner Dashboard.
- Sign in with the integration sandbox account and repeat steps 2–5 to enable API access there as well.
You can write and test code in the integration sandbox. To configure Azure AD authentication for Partner Center access, the following information is required:
Item Name | Location |
---|---|
App ID / Client ID | Settings > Partner Settings > App Management. Listed under registered applications. |
Key | The key saved in Step 5 when creating the Web App. |
Domain | The domain of the integration sandbox. |
Partner Center uses Azure Active Directory for authentication. When interacting with the API, SDK, or PowerShell modules, you must configure the Azure AD application correctly and request an access token.
- You can use App-only authentication or App + User authentication.
- MFA is required if you use App + User authentication.
- Some API operations do not support App-only authentication. Refer to scenario documentation to confirm what is supported.
Initial Setup
- Record the Azure AAD application's Registration ID and Client Secret (Client Secret is required for App-only auth).
- Sign in to Azure AD via the Azure portal.
- Under API permissions for other applications, configure Windows Azure Active Directory as Delegated Permissions.
- Select both:
- "Access the directory as the signed-in user"
- "Read the signed-in user's profile"
- In the Azure portal, add an application.
- Search for Microsoft Partner Center.
- Assign Delegated Permissions to "Access Partner Center API".
Setup Dev Center Access
In order to get ERP price data for Azure, we need to gain access to the Microsoft Dev Center. To do this, we'll use the application user that was created during the onboarding process. The exact steps are listed below:
- Sign in to your Partner account in the Azure portal.
- Select Azure Active Directory.
- Choose App registrations, then select the application you created for Octo.
- Go to API Permissions > Add a permission > APIs my organization uses.
-
Search for: Microsoft Partner (Microsoft Dev Center) API (
4990cffe-04e8-4e8b-808a-1175604b879f
).Click to view image
-
Set Delegated Permissions to Partner Center.
Click to view image
-
For the application you registered, choose Overview and then select copy the Application ID.
- Now, we need to generate an authorization code. The authorization code is generated by granting the consent to the application used in the API call via the following URL template. You just need to replace the values in the template to create the consent URL for your application:
https://login.microsoftonline.com/common/oauth2/authorize?client_id=<Web_App_Client_ID>&response_type=code&redirect_url=<RedirectURI>
- Replace
<Web_App_Client_ID>
with the Application (client) ID you copied earlier. - Replace
<RedirectURI>
with the Reply URL you set when registering the application (found in Azure portal > Azure Active Directory > App registrations > Select your application > Authentication). - Open an InPrivate or Incognito browser window and paste the completed URL into the address bar.
Once you have replaced the required values, the URL will look something like this:
https://login.microsoftonline.com/common/oauth2/authorize?client_id=<Web_App_Client_ID>&response_type=code&redirect_url=<RedirectURI>
- If your redirect URL is
https://localhost
, you may see an error message such as “couldn’t find the server” or “can’t establish a connection to the server at localhost.”- However, the address bar will contain the Authorization Code.
??? info "Click to view image"

-
Copy the entire URL from the address bar into a notepad. It will look similar to:
13. The Authorization Code is the value aftercode=
and before&session_state=
in the URL.
- Save this code securely.
- Note: The Authorization Code is single-use and will expire after it is used, similar to a one-time passcode (OTP).
Azure Account Registration in Octo
Registering Azure CSP Payer Account involves 3 steps: Basic Details, Partner Center Credentials, and Partner API Credentials.
Note: You can only register one payer account as of now.
-
Basic Details
a. Input your preferred account name (Optional).
b. Click Next.
-
Partner Center Credentials
a. Input your Client ID, Application ID, and Secret key to proceed.
b. Click Register Credentials. This will verify your input credentials.
c. If success, you can now click Next.
-
Partner API Credentials
a. On this step, you can verify your MPN ID, Directory (Tenant ID), and Application ID.
b. Input your secret key.
c. Click register credentials. This will open a new tab on which you will be required to sign in to your account. The goal of this step is to obtain an authorization code which is needed on the next input.
d. Input the code.
e. Click confirm and register.