Fortanix Key Insight - Azure Configuration for Scanning Using Built-In Roles

Prev Next

1.0 Introduction

This article describes the minimum access privileges required for Fortanix Key Insight to scan the Azure cloud subscription(s) or management groups using Azure built-in roles.

2.0 Configure Azure Cloud in Fortanix Key Insight

This section outlines the necessary steps to securely integrate an Azure cloud with Fortanix Key Insight, which enables streamlined monitoring, management, and optimization of key resources. The integration leverages Azure's Role-Based Access Control (RBAC) for granular permission management.

For more details on Azure built-in role permissions required to onboard an Azure connection, refer to the Fortanix Key Insight – Azure Connection Permissions.

2.1 Prerequisites

The following are the prerequisites to configure an Azure cloud in Fortanix Key Insight:

2.2 Create a Service Principal in Microsoft Entra ID (Azure Active Directory)

Perform the following steps to create a service principal in Microsoft Entra ID:

  1. Navigate to the Azure portal and search for Microsoft Entra ID.

  2. Select App registrations under Manage in the left navigation panel on the Microsoft Entra ID page.

    NOTE

    You can also search for App registrations in the Microsoft Azure search bar.

  3. Click New registration.

  4. On the Register an application page, configure the following fields:

    • Name: The user-facing display name for this application. For example, key-insight-app.

    • Supported account types: Select Accounts in this organizational directory only (<your organization name> only - Single tenant).

    • Redirect URI: This is optional.

  5. Click Register to register an application. The new application will be registered in Microsoft Azure.

    NOTE

    Ensure to copy and save the Directory (tenant) ID and Application (client) ID values. These values are required during the Azure cloud connection onboarding on Fortanix Key Insight.

  6. Perform the following steps to create a new client secret:

    • Navigate to Certificates & secrets from the left navigation panel.

    • Click New client secret.

    • On the Add a client secret panel, enter the following:

      • Description: Enter the description for this secret. For example, key-insight-app-client-secret.

      • Expires: Select 730 days (24 months).

    • Click Add.

    image-20240313-181210.png

    Figure 2: Add a new client secret

    NOTE

    You can only view Client secret value immediately after creation. Ensure to copy and save the secret value before leaving the page. This value is required during the Azure cloud connection onboarding on Fortanix Key Insight.

2.3 Choose the Scope

You can choose Management Groups or Subscription scopes during Azure cloud setup in Fortanix Key Insight. For more details on Azure cloud setup, refer to Fortanix Key Insight - Getting Started With Cloud Connection.

2.3.1 Obtain a Management Group ID

Perform the following steps to obtain a management group ID:

  1. Navigate to Management groups on Microsoft Azure.

  2. Copy the value from the column ID in your Azure Management groups. For example, engineering-management-group from the ID column as shown below:

image-20240317-230149.png

Figure 3: Get a management group ID

2.3.2 Obtain a Subscription ID

Perform the following steps to obtain a subscription ID:

  1. Navigate to Management groups on Microsoft Azure.

  2. Select your subscription.

  3. Copy the Subscription ID from your Azure subscription. For example, the Subscription ID is copied from the Fortanix-Internal subscription as shown below:

image-20240318-002646.png

Figure 4: Get a subscription ID

2.4 Provide Access to Built-In Roles in Your Azure Service Principal

You must provide access to the following built-in roles in your Azure service principal at the management group and subscription levels to help users scan the required Azure keys and services on Fortanix Key Insight:

  • Reader

  • Key Vault Reader

  • Storage Blob Data Reader

2.4.1 Provide Access to Built-In Roles at the Management Group Level

Perform the following steps to provide access to the built-in roles at the Management group level:

  1. Navigate to Access control (IAM) in the selected management group.

  2. Click Add role assignment.

  3. Perform Steps 3 to 6 mentioned in Section 2.4.2: Provide Access to Built-In Roles at the Subscriptions Level and provide permissions for the selected management group.

  4. Reader, Key Vault Reader, and Storage Blob Data Reader roles will be automatically inherited for all the linked subscriptions. You do not have to go to individual subscriptions to provide access permissions.

2.4.2 Provide Access to Built-In Roles at the Subscriptions Level

Perform the following steps to provide access to the built-in roles at the subscription level:

  1. Navigate to Access control (IAM) in the selected subscription.

  2. Click Add role assignment.

  3. Provide access to the specific role using the following steps:

    • Reader

      1. On the Role tab, select the Reader role and click Next.

      2. Perform the following steps to select members:

        1. Click Select members on the Members tab.

        2. Add your app (for example, key-insight-app), as created in Section 2.2: Create a Service Principal for Microsoft Entra ID.

        3. Click Select.

        4. After adding the members, click Review + assign.

    image-20240318-010728.png

    Figure 5: Add a Reader role

    • Key Vault Reader

      1. On the Role tab, select the Key Vault Reader role and click Next.

      2. Perform the following steps to select members:

        1. Click Select members on the Members tab.

        2. Add your app (for example, key-insight-app), as created in Section 2.2: Create a Service Principal for Microsoft Entra ID.

        3. Click Select.

        4. After adding the members, click Review + assign.

      image-20240318-023856.png

      Figure 6: Add a Key Vault Reader role

    • Storage Blob Data Reader

      1. On the Role tab, select the  Storage Blob Data Reader role and click Next.

      2. Perform the following steps to select members:

        1. Click Select members on the Members tab.

        2. Add your app (for example, key-insight-app), as created in Section 2.2: Create a Service Principal for Microsoft Entra ID.

        3. Click Select.

        4. After adding the members, click Review + assign.

      Figure 7: Add a Storage Blob Data Reader role

After access is granted to the built-in roles, as outlined in Section 2.4: Provide Access to Built-In Roles in Your Azure Service Principal, at either the management group or subscription level, all necessary permissions required for Fortanix Key Insight to scan Azure keys and services will be automatically provisioned.

3.0 Help and Support