This guide walks you through deploying the Multi Agent Custom Automation Engine Solution Accelerator to Azure. The deployment process takes approximately 9-10 minutes for the default Development/Testing configuration and includes both infrastructure provisioning and application setup.
🆘 Need Help? If you encounter any issues during deployment, check our Troubleshooting Guide for solutions to common problems.
Ensure you have access to an Azure subscription with the following permissions:
| Required Permission/Role | Scope | Purpose |
|---|---|---|
| Contributor | Subscription level | Create and manage Azure resources |
| User Access Administrator | Subscription level | Manage user access and role assignments |
| Role Based Access Control | Subscription/Resource Group level | Configure RBAC permissions |
| App Registration Creation | Azure Active Directory | Create and configure authentication |
🔍 How to Check Your Permissions:
- Go to Azure Portal
- Navigate to Subscriptions (search for "subscriptions" in the top search bar)
- Click on your target subscription
- In the left menu, click Access control (IAM)
- Scroll down to see the table with your assigned roles - you should see:
- Contributor
- User Access Administrator
- Role Based Access Control Administrator (or similar RBAC role)
For App Registration permissions:
- Go to Microsoft Entra ID → Manage → App registrations
- Try clicking New registration
- If you can access this page, you have the required permissions
- Cancel without creating an app registration
📖 Detailed Setup: Follow Azure Account Set Up for complete configuration.
Required Azure Services:
- Azure AI Foundry
- Azure OpenAI Service
- Azure AI Search
- Azure App Service
- Azure Container Apps
- Azure Container Registry
- Azure Cosmos DB
- Azure Key Vault
- Azure Blob Storage
- Azure Queue Storage
- GPT Model Capacity
Recommended Regions: East US, East US2, Australia East, Japan East, UK South, France Central
🔍 Check Availability: Use Azure Products by Region to verify service availability.
💡 RECOMMENDED: Check your Azure OpenAI quota availability before deployment for optimal planning.
📖 Follow: Quota Check Instructions to ensure sufficient capacity.
Default Quota Configuration:
- GPT-4.1: 150k tokens
- o4-mini: 50k tokens
- GPT-4.1-mini: 50k tokens
Note: When you run
azd up, the deployment will automatically show you regions with available quota, so this pre-check is optional but helpful for planning purposes. You can customize these settings later in Step 3.3: Advanced Configuration.
📖 Adjust Quota: Follow Azure AI Model Quota Settings if needed.
Select one of the following options to deploy the Multi Agent Custom Automation Engine Solution Accelerator:
| Option | Best For | Prerequisites | Setup Time |
|---|---|---|---|
| GitHub Codespaces | Quick deployment, no local setup required | GitHub account | ~3-5 minutes |
| VS Code Dev Containers | Fast deployment with local tools | Docker Desktop, VS Code | ~5-10 minutes |
| VS Code Web | Quick deployment, no local setup required | Azure account | ~2-4 minutes |
| Local Environment | Enterprise environments, full control | All tools individually | ~15-30 minutes |
💡 Recommendation: For fastest deployment, start with GitHub Codespaces - no local installation required.
Option A: GitHub Codespaces (Easiest)
- Click the badge above (may take several minutes to load)
- Accept default values on the Codespaces creation page
- Wait for the environment to initialize (includes all deployment tools)
- Proceed to Step 3: Configure Deployment Settings
Option B: VS Code Dev Containers
Prerequisites:
- Docker Desktop installed and running
- VS Code with Dev Containers extension
Steps:
- Start Docker Desktop
- Click the badge above to open in Dev Containers
- Wait for the container to build and start (includes all deployment tools)
- Proceed to Step 3: Configure Deployment Settings
Option C: Visual Studio Code Web
-
Click the badge above (may take a few minutes to load)
-
Sign in with your Azure account when prompted
-
Select the subscription where you want to deploy the solution
-
Wait for the environment to initialize (includes all deployment tools)
-
When prompted in the VS Code Web terminal, choose one of the available options shown below:
-
Authenticate with Azure (VS Code Web requires device code authentication):
az login --use-device-code
Note: In VS Code Web environment, the regular
az logincommand may fail. Use the--use-device-codeflag to authenticate via device code flow. Follow the prompts in the terminal to complete authentication. -
Proceed to Step 3: Configure Deployment Settings
Option D: Local Environment
Required Tools:
Setup Steps:
-
Install all required deployment tools listed above
-
Clone the repository:
azd init -t microsoft/Multi-Agent-Custom-Automation-Engine-Solution-Accelerator/
⚠️ Warning: Theazd initcommand will download and initialize the project template. If you run this command in a directory that already contains project files, it may override your existing changes. Only run this command once when setting up the project for the first time. If you need to update an existing project, consider usinggit pullor manually downloading updates instead. -
Open the project folder in your terminal
-
Proceed to Step 3: Configure Deployment Settings
PowerShell Users: If you encounter script execution issues, run:
Set-ExecutionPolicy -Scope Process -ExecutionPolicy BypassReview the configuration options below. You can customize any settings that meet your needs, or leave them as defaults to proceed with a standard deployment.
| Aspect | Development/Testing (Default) | Production |
|---|---|---|
| Configuration File | main.parameters.json (sandbox) |
Copy main.waf.parameters.json to main.parameters.json |
| Security Controls | Minimal (for rapid iteration) | Enhanced (production best practices) |
| Cost | Lower costs | Cost optimized |
| Use Case | POCs, development, testing | Production workloads |
| Framework | Basic configuration | Well-Architected Framework |
| Features | Core functionality | Reliability, security, operational excellence |
To use production configuration:
Prerequisite — Enable the Microsoft.Compute/EncryptionAtHost feature for every subscription (and region, if required) where you plan to deploy VMs or VM scale sets with encryptionAtHost: true. Repeat the registration steps below for each target subscription (and for each region when applicable). This step is required for WAF-aligned (production) deployments.
Steps to enable the feature:
- Set the target subscription:
Run:
az account set --subscription "<YourSubscriptionId>" - Register the feature (one time per subscription):
Run:
az feature register --name EncryptionAtHost --namespace Microsoft.Compute - Wait until registration completes and shows "Registered":
Run:
az feature show --name EncryptionAtHost --namespace Microsoft.Compute --query properties.state -o tsv - Refresh the provider (if required):
Run:
az provider register --namespace Microsoft.Compute - Re-run the deployment after registration is complete.
Note: Feature registration can take several minutes. Ensure the feature is registered before attempting deployments that require encryptionAtHost.
Reference: Azure Host Encryption — https://learn.microsoft.com/azure/virtual-machines/disks-enable-host-based-encryption-portal?tabs=azure-cli
Copy the contents from the production configuration file to your main parameters file:
- Navigate to the
infrafolder in your project - Open
main.waf.parameters.jsonin a text editor (like Notepad, VS Code, etc.) - Select all content (Ctrl+A) and copy it (Ctrl+C)
- Open
main.parameters.jsonin the same text editor - Select all existing content (Ctrl+A) and paste the copied content (Ctrl+V)
- Save the file (Ctrl+S)
Note: This section only applies if you selected Production deployment type in section 3.1. VMs are not deployed in the default Development/Testing configuration.
By default, random GUIDs are generated for VM credentials. To set custom credentials:
azd env set AZURE_ENV_VM_ADMIN_USERNAME <your-username>
azd env set AZURE_ENV_VM_ADMIN_PASSWORD <your-password>Configurable Parameters
You can customize various deployment settings before running azd up, including Azure regions, AI model configurations (deployment type, version, capacity), container registry settings, and resource names.
📖 Complete Guide: See Parameter Customization Guide for the full list of available parameters and their usage.
[Optional] Quota Recommendations
By default, the GPT model capacity in deployment is set to 150k tokens.
To adjust quota settings, follow these steps.
Reuse Existing Resources
To optimize costs and integrate with your existing Azure infrastructure, you can configure the solution to reuse compatible resources already deployed in your subscription.
Supported Resources for Reuse:
-
Log Analytics Workspace: Integrate with your existing monitoring infrastructure by reusing an established Log Analytics workspace for centralized logging and monitoring. Configuration Guide
-
Azure AI Foundry Project: Leverage your existing AI Foundry project and deployed models to avoid duplication and reduce provisioning time. Configuration Guide
Key Benefits:
- Cost Optimization: Eliminate duplicate resource charges
- Operational Consistency: Maintain unified monitoring and AI infrastructure
- Faster Deployment: Skip resource creation for existing compatible services
- Simplified Management: Reduce the number of resources to manage and monitor
Important Considerations:
- Ensure existing resources meet the solution's requirements and are in compatible regions
- Review access permissions and configurations before reusing resources
- Consider the impact on existing workloads when sharing resources
💡 Before You Start: If you encounter any issues during deployment, check our Troubleshooting Guide for common solutions.
azd up in this folder (i.e., a .azure folder exists), you must create a fresh environment to avoid conflicts and deployment failures.
azd auth loginNote for VS Code Web Users: If you're using VS Code Web and have already authenticated using
az login --use-device-codein Option C, you may skip this step or proceed withazd auth loginif prompted.
For specific tenants:
azd auth login --tenant-id <tenant-id>Finding Tenant ID:
- Open the Azure Portal
- Navigate to Microsoft Entra ID from the left-hand menu
- Under the Overview section, locate the Tenant ID field. Copy the value displayed
azd upDuring deployment, you'll be prompted for:
- Environment name (e.g., "macaedev") - Must be 3-16 characters long, alphanumeric only
- Azure subscription selection
- Azure AI Foundry deployment region - Select a region with available model quota for AI operations
- Primary location - Select the region where your infrastructure resources will be deployed
- Resource group selection (create new or use existing)
Expected Duration: 9-10 minutes for default configuration
- Upon successful completion, you will see a success message indicating that all resources have been deployed, along with the application URL and next steps for uploading team configurations and sample data.
After successful deployment:
- Open Azure Portal
- Navigate to your resource group
- Find the Frontend App Service
- Copy the Default domain
- You can upload Team Configurations using command printed in the terminal. The command will look like one of the following. Run the appropriate command for your shell from the project root:
-
For Bash (Linux/macOS/WSL):
bash infra/scripts/selecting_team_config_and_data.sh
-
For PowerShell (Windows):
infra\scripts\Selecting-Team-Config-And-Data.ps1
- After executing the above script, the system will present available use case scenarios for selection. You can choose individual scenarios or deploy all use cases simultaneously. Upon selection, the corresponding datasets and configuration files for the chosen use case(s) will be uploaded to your Azure environment.
- Follow App Authentication Configuration
- Wait up to 10 minutes for authentication changes to take effect
- Access your application using the URL from Step 4.3
- Confirm the application loads successfully
Quick Test Steps:
- Access the application using the URL from Step 4.3
- Sign in with your authenticated account
- Select a use case from the available scenarios you uploaded in Step 5.1
- Ask a sample question relevant to the selected use case
- Verify the response includes appropriate multi-agent collaboration
- Check the logs in Azure Portal to confirm backend processing
📖 Detailed Instructions: See the complete Sample Workflow guide for step-by-step testing procedures and sample questions for each use case.
To purge resources and clean up after deployment, use the azd down command or follow the Delete Resource Group Guide for manual cleanup through Azure Portal.
azd downNote: If you deployed with
enableRedundancy=trueand Log Analytics workspace replication is enabled, you must first disable replication before runningazd downelse resource group delete will fail. Follow the steps in Handling Log Analytics Workspace Deletion with Replication Enabled, wait until replication returnsfalse, then runazd down.
If deployment fails or you need to clean up manually:
- Follow Delete Resource Group Guide
If your deployment failed or encountered errors, here are the steps to recover:
Recover from Failed Deployment
If your deployment failed or encountered errors:
- Try a different region: Create a new environment and select a different Azure region during deployment
- Clean up and retry: Use
azd downto remove failed resources, thenazd upto redeploy - Check troubleshooting: Review Troubleshooting Guide for specific error solutions
- Fresh start: Create a completely new environment with a different name
Example Recovery Workflow:
# Remove failed deployment (optional)
azd down
# Create new environment (3-16 chars, alphanumeric only)
azd env new macaeretry
# Deploy with different settings/region
azd upIf you need to deploy to a different region, test different configurations, or create additional environments:
Create a New Environment
Create Environment Explicitly:
# Create a new named environment (3-16 characters, alphanumeric only)
azd env new <new-environment-name>
# Select the new environment
azd env select <new-environment-name>
# Deploy to the new environment
azd upExample:
# Create a new environment for production (valid: 3-16 chars)
azd env new macaeprod
# Switch to the new environment
azd env select macaeprod
# Deploy with fresh settings
azd upEnvironment Name Requirements:
- Length: 3-16 characters
- Characters: Alphanumeric only (letters and numbers)
- Valid examples:
macae,test123,myappdev,prod2025- Invalid examples:
co(too short),my-very-long-environment-name(too long),test_env(underscore not allowed)
Switch Between Environments
List Available Environments:
azd env listSwitch to Different Environment:
azd env select <environment-name>View Current Environment:
azd env get-values- Use descriptive names:
macaedev,macaeprod,macaetest(remember: 3-16 chars, alphanumeric only) - Different regions: Deploy to multiple regions for testing quota availability
- Separate configurations: Each environment can have different parameter settings
- Clean up unused environments: Use
azd downto remove environments you no longer need
Now that your deployment is complete and tested, explore these resources to enhance your experience:
📚 Learn More:
- Local Development Setup - Set up your local development environment
- Sample Questions - Explore sample questions and workflows
- MCP Server Documentation - Learn about Model Context Protocol server integration
- Customizing Parameters - Advanced configuration options
- Azure Account Setup - Detailed Azure subscription configuration
- 🐛 Issues: Check Troubleshooting Guide
- 💬 Support: Review Support Guidelines
- 🔧 Development: See Contributing Guide
If you've made local modifications to the code and want to deploy them to Azure, follow these steps to swap the configuration files:
Note: To set up and run the application locally for development, see the Local Development Setup Guide.
In the root directory:
- Rename
azure.yamltoazure_custom2.yaml - Rename
azure_custom.yamltoazure.yaml
In the infra directory:
- Rename
main.biceptomain_custom2.bicep - Rename
main_custom.biceptomain.bicep
Run the deployment command:
azd upNote: These custom files are configured to deploy your local code changes instead of pulling from the GitHub repository.


