Prepare Your Azure Account
Prepare your Azure account and subscription(s) before you connect and onboard them to Multicloud Defense Controller with the following steps:
-
Acquire and register an Azure subscription. Ensure the subscription is associated to the Microsoft Entra ID. Review the list of App Registrations in your Azure portal to confirm whether the subscription is correctly linked to Multicloud Defense.
-
Create a custom role for your Azure subscription.
If you find that you cannot use the automated script, see the alternative procedure to manually onboard your account here.
Note |
If you have more than one subscription you want to configure with Multicloud Defense, use the procedure in Connect an Azure Subscription to the Multicloud Defense Controller from the Multicloud Defense Dashboard for one subscription and then modify the policy in your Azure portal to add the other subscriptions. You must onboard these subscriptions individually, but you can associate them with Multicloud Defense in bulk. |
Register Application in Microsoft Entra ID
Use the following procedure to register the Multicloud Defense application in your Entra ID.
Procedure
Step 1 |
From your Azure portal, navigate to Microsoft Entra ID. |
Step 2 |
Select App registrations. |
Step 3 |
Click New registration. |
Step 4 |
Provide a name to reference the new app registration e.g. Multicloud Defense Controller In the Supported account types choose the second option Accounts in any organizational directory. |
Step 5 |
Choose the option appropriate to your organization. Note that the Redirect URI is not needed for the creation of the App registration. |
Step 6 |
Click Register. |
Step 7 |
In the left navigation bar under the newly created application, click Certificates & secrets. |
Step 8 |
Click + New client secret, and then enter the required information in the Add a client secret dialog
|
Step 9 |
Click Add. The client secret is populated under the Value column. |
Step 10 |
Copy the Client secret into a notepad, as this is shown only once and is never displayed again. |
Step 11 |
In the left navigation bar click Overview. |
Step 12 |
Copy the Application (client) ID and Directory (tenant) ID into a notepad. |
Create a custom role to assign to the Application
The CloudFormation template creates the following role:
-
Custom Role - The custom role gives the application permissions to read inventory information and create resources (e.g., VMs, load balancers, etc.) The custom role can be created in multiple ways.
Create a custom role that will be assigned to the application created for the Multicloud Defense Controller. The custom role gives the application permissions to read inventory information and create resources (e.g., VMs, load balancers, etc.) The custom role can be created in multiple ways.
Procedure
Step 1 |
Navigate to Subscription and click Access Control (IAM). |
Step 2 |
Click on Roles and on the top menu bar navigate to click . |
Step 3 |
Give a name to the custom role (e.g., |
Step 4 |
Keep clicking Next until you get to the JSON editing screen. |
Step 5 |
Click Edit on the screen and in the JSON text, under the permissions > actions section, copy and paste the following content between the square brackets (no need to maintain the indentation):
|
Step 6 |
Optional - If you plan to use multiple subscriptions with Multicloud Defense, you must edit the JSON at |
Step 7 |
Click Save at the top of the text box. |
Step 8 |
Click Review + Create and create the role. |
Step 9 |
Once the custom role is created return to Access Control (IAM). |
Step 10 |
On the top menu bar, click . |
Step 11 |
In the Role dropdown, select the custom role created above. |
Step 12 |
In the Assign access to dropdown leave it as the default (Azure AD user, group, service principal). |
Step 13 |
In the Select text box, type in the name of the application created earlier (e.g. |
Step 14 |
In the Subscription page, click on the Overview in the left menu bar and copy the subscription ID to the notepad. |