# Prerequisite Checklist

## 1. Access Management for Azure Resources

Archera creates a Custom RBAC role inside an Azure Tenant. Please make sure your user has **Access management for Azure resources** enabled.

You can find this setting in: **Microsoft Entra ID > Overview > Properties**

## 2. Management Groups

Archera Custom RBAC role is created at Tenant scope. Please make sure Management group hierarchy is enabled in your Tenant.

You can find this setting in: **Management groups > Start using management groups**

## 3. User Access Admin Role

The **User Access Admin Role** must be present within the subscriptions selected for data ingestion.

In order for Archera to function properly, we need to create a custom read-only RBAC role that allows us to generate and export the cost usage report (CUR) to a storage account. Then we ingest that CUR into Archera's proprietary savings engine to surface commitments whether guaranteed or traditional.

## Related Resources

* [Azure Onboarding - Supported Account / Subscription Types](https://docs.archera.ai/help-center/azure-onboarding/supported-account-types)
* [Azure Onboarding - Required Permissions](https://docs.archera.ai/help-center/azure-onboarding/required-permissions)
* [Does Archera for Azure rely on Microsoft Azure Exchanges or Returns policy?](https://docs.archera.ai/help-center/azure-onboarding/exchanges-returns-policy)
* [Does Archera Support Reservations for Azure Storage Disks?](https://docs.archera.ai/help-center/azure-onboarding/storage-disks)
* [Azure Offboarding](https://docs.archera.ai/help-center/azure-onboarding/offboarding)
