You finally got your dashboards to pull live data, only to realize your credentials are hardcoded in three separate places. Azure tokens expire, Redash jobs fail, and someone always forgets which service principal has rights where. Sound familiar? That’s exactly the loop Azure Resource Manager and Redash can break when configured with proper identity and automation.
Azure Resource Manager (ARM) is Microsoft’s control plane for the cloud. It defines, deploys, and monitors everything in Azure using consistent templates and RBAC policies. Redash is the open-source query and visualization tool that turns raw data into shareable insights. Combined, they allow teams to expose Azure data safely to analysts without giving them full portal access.
The integration revolves around service principals and API permissions. ARM provides fine-grained RBAC roles, while Redash uses query runners and data sources to connect to Azure services such as SQL Database or Application Insights. The key is configuring Redash to authenticate through Azure AD, not with static keys. This gives you traceability, conditional access, and automated token refresh.
To make it work, create a managed identity or service principal in Azure AD, assign it the Reader or Contributor role over the desired Resource Group, then link those credentials as Redash environment variables. Redash’s metadata connection handles refresh tokens if OIDC is set up properly. Grant the least privilege needed, test queries, and audit access regularly.
If something breaks, the cause is usually token scope or an expired secret. Rotate credentials through Azure Key Vault and let Redash pull fresh secrets on startup. For large teams, map user groups in Azure AD directly to Redash permissions to preserve identity context. You avoid guessing who queried what when reviewing audit logs.