What is the level of access Site24x7 has over my Azure environment?
Site24x7 Azure monitoring is done using the OpenID Connect Authentication, an approved workflow by Microsoft. The Azure resources are discovered and monitored using the global application, Site24x7 App, that is maintained in Site24x7's Microsoft account. 
Log in using your Microsoft credentials that has access to the Active Directory tenant and Owner role for the subscription that needs to be monitored.

You can create a custom app in the Microsoft Azure portal and assign the necessary permissions to the custom app to enable Site24x7 to discover and monitor your Azure resources. 
Learn more.
- Related Articles
- Sync Microsoft Entra ID users to Site24x7 via Zoho Directory- If you want to sync your user data from Microsoft Azure AD to Site24x7, you can do it with Zoho Directory's conditional assignment feature. Once synced, you can easily add users in Site24x7 without requiring manual intervention. The users added to ... 
- Why are my resources not being discovered?- When you cannot view the newly added Azure resources in your Azure monitor, you can check if Auto-discovery is disabled. If it is enabled, new resources will be added during auto-discovery. Manual triggering If your resource is not discovered, you ... 
- What are the common OAuth errors and how to solve them?- While configuring OAuth,  here are a few errors that you might face. They are: Invalid Redirect URI - Error_invalid_redirect_uri Invalid Code - invalid_code OAuth Scope associated to the OAuth Access Token is disallowed. - error_code: 1120 Invalid ... 
- Outgoing IP to be allowlisted from your network for API Access- Site24x7 APIs help to achieve all operations that can be performed on our web client. You can try allowlisting the domain accounts.zoho.com. If you're not able to do that, then you can allowlist the following IP addresses: 204.141.42.100 ... 
- Monitors that require On-Premise Pollers in Site24x7- Certain monitor types in Site24x7 require the use of On-Premise Pollers for data collection, especially when monitoring internal, firewall-restricted, or private resources. Depending on the type of monitoring, additional modules like the Network ...