TABLE OF CONTENTS
Overview
The Azure platform integrates with most well-known Network Devices, or “Remediators,” through their APIs. At the start, the user provides the remediator credentials. The platform then uses these credentials to push policies according to the remediation rules. The user must ensure the credentials have the required privileges so the platform can take the necessary actions. Users add these credentials once in the Remediator screen, located under the Administration section of the UI.
Steps of Configuration
- Login on the Tenant and go navigate to Administration > Remediator Tab.
- Click on Add. Complete the required fields.
- Device Category: Identity.
- Devices: Azure AD.
- Device IP: Leave it blank.
- User Name/Access ID: Add the client_id here.
- Password/Secret Key: Add the client_secret here.
- Confirmed Password/Secret Key: Same as the first one.
- Name: Add a meaningful name here.
- CCE IP: CCE IP on which the remediator is being configured.
- Config: {"azureTenantID":"Value of azureTenantID"}
- Click Save.
Azure Details
To get the client_id, client_secret, and tenantID from Azure, you typically need to register an application in Azure Active Directory (Azure AD). This process involves creating an application registration, which then provides you with the client_id. You can then create a secret for that application, which serves as the client_secret. The Azure tenantID can be found in the Azure Active Directory information.
Below is a step-by-step guide:
1. Register an Application in Azure AD
- Sign in to the Azure Portal: Go to https://portal.azure.com and log in with your Azure account.
- Navigate to Azure Active Directory: Find Azure Active Directory (Microsoft Entra ID) in the side menu. If you don’t see it, use the search bar.
- Go to App Registrations: Click on “App registrations” in the Azure AD menu.
- New Registration: Click on “New registration” at the top.
- Create your application:
- Enter a name for your application.
- Choose who can use the application.
- Optionally, enter a Redirect URL (if your application requires one).
- Click on “Register”.
- After registration, you will be directed to your application’s overview page, where you can find the Application (client) ID; this is your client_id.
2. Create a Client Secret
- Certificates & Secrets: In your application’s menu on the Azure portal, click on “Certificates & secrets”.
- New Client Secret: Click on “New client secret”.
- Add a Description and Expiry: Give your secret a description and choose an expiry period that suits your application's needs.
- Save: Click on “Add”.
- After you click “Add”, the value of the client secret will be displayed. Make sure to copy the client_secret value now; you won’t be able to retrieve it again once you leave this blade.
3. Find Your Azure TenantID
- Azure Active Directory: Navigate back to the Azure Active Directory overview page.
- Properties: Click on “Properties” in the Azure AD menu.
- Directory ID: On the properties page, you’ll find the Directory ID. This is your Azure tenantID.
Important Notes
- Security: Keep your client_secret secure. Do not share it or commit it to source code repositories.
- Permissions: Depending on what your application needs to do, you might have to set permissions. This can be done in the “API permissions” section of your application in Azure AD.
The permissions in the snapshot below should be granted:
URL: This is important for web applications that need to authenticate users; it's where Azure AD will return any security tokens.
Following these steps will help you set up an application in Azure AD and obtain the necessary client_id, client_secret, and Azure tenantID for your application to authenticate and authorize against Azure services.
Follow these steps to test the connection:
- Click on Test Connection.
- Check on device status by clicking on Test Status.
Outcome
The outcome should show success, the snapshot attached here gives you an example:
Was this article helpful?
That’s Great!
Thank you for your feedback
Sorry! We couldn't be helpful
Thank you for your feedback
Feedback sent
We appreciate your effort and will try to fix the article