Prepare Your Azure Account
Prepare your Azure account and subscription(s) before you connect and onboard them to Multicloud Defense Controller with the following steps:
-
Acquire and register an Azure subscription. Ensure the subscription is associated to the Microsoft Entra ID. Review the list of App Registrations in your Azure portal to confirm whether the subscription is correctly linked to Multicloud Defense.
-
Create a custom role for your Azure subscription. This grants Multicloud Defense access to specific resources or actions that would otherwise be blocked.
-
Subscribe to the Azure Event Grid. This allows Multicloud Defense to receive real-time updates and can be configured to send events to subscribers (push) or subscribers can connect to Event Grid to read events (pull). See the "Create event subscriptions" chapter in the Azure User Guide for more information.
-
Connect an Azure Subscription to the Multicloud Defense Controller from the Multicloud Defense Dashboard. Azure subscriptions encapslulate "technical" resources such as virtual machines. Complete this step to use any Azure-based VMs with Multicloud Defense gateways or any depoyment action.
-
Accept Marketplace Terms. If this is the first time your Azure account is being onboarded to Multicloud Defense, you must accept Cisco marketplace terms. Without this agreement you cannot complete the onboarding action.
-
(Optional) User-assigned Managed Identity for Key Vault and Blob Storage access. Configured in the Azure environment, the key vault and blob storage access is intended to give you more flexibility to use the same identity across different resources, maintaining consistent permissions and identities across services.
If you find that you cannot use the automated script, see the alternative procedure to manually onboard your account here.
Note |
If you have more than one subscription you want to configure with Multicloud Defense, use the procedure in Connect an Azure Subscription to the Multicloud Defense Controller from the Multicloud Defense Dashboard for one subscription and then modify the policy in your Azure portal to add the other subscriptions. You must onboard these subscriptions individually, but you can associate them with Multicloud Defense in bulk. |
Register Application in Microsoft Entra ID
Use the following procedure to register the Multicloud Defense application in your Entra ID.
Procedure
Step 1 |
From your Azure portal, navigate to Microsoft Entra ID. |
Step 2 |
Select App registrations. |
Step 3 |
Click New registration. |
Step 4 |
Provide a name to reference the new app registration e.g. Multicloud Defense Controller In the Supported account types choose the second option Accounts in any organizational directory. |
Step 5 |
Choose the option appropriate to your organization. Note that the Redirect URI is not needed for the creation of the App registration. |
Step 6 |
Click Register. |
Step 7 |
In the left navigation bar under the newly created application, click Certificates & secrets. |
Step 8 |
Click + New client secret, and then enter the required information in the Add a client secret dialog
|
Step 9 |
Click Add. The client secret is populated under the Value column. |
Step 10 |
Copy the Client secret into a notepad, as this is shown only once and is never displayed again. |
Step 11 |
In the left navigation bar click Overview. |
Step 12 |
Copy the Application (client) ID and Directory (tenant) ID into a notepad. |
Create a custom role to assign to the Application
The CloudFormation template creates a custom role that will be assigned to the application created for the Multicloud Defense Controller. The custom role gives the application permissions to read inventory information and create resources (e.g., VMs, load balancers, etc.)
There are multiple ways to create a custom role but we recommend the following procedure:
Procedure
Step 1 |
Navigate to Subscription and click Access Control (IAM). |
Step 2 |
Click on Roles and on the top menu bar navigate to click . |
Step 3 |
Give a name to the custom role (e.g., |
Step 4 |
Keep clicking Next until you get to the JSON editing screen. |
Step 5 |
Click Edit on the screen and in the JSON text, under the permissions > actions section, copy and paste the following content between the square brackets (no need to maintain the indentation):
|
Step 6 |
Optional - If you plan to use multiple subscriptions with Multicloud Defense, you must edit the JSON at |
Step 7 |
Click Save at the top of the text box. |
Step 8 |
Click Review + Create and create the role. |
Step 9 |
Once the custom role is created return to Access Control (IAM). |
Step 10 |
On the top menu bar, click . |
Step 11 |
In the Role dropdown, select the custom role created above. |
Step 12 |
In the Assign access to dropdown leave it as the default (Azure AD user, group, service principal). |
Step 13 |
In the Select text box, type in the name of the application created earlier (e.g. |
Step 14 |
In the Subscription page, click on the Overview in the left menu bar and copy the subscription ID to the notepad. |
Connect an Azure Subscription to the Multicloud Defense Controller from the Multicloud Defense Dashboard
Once you prepared the Azure account and subscription as described in the previous sections, you can link it to the Multicloud Defense Controller.
Procedure
Step 1 |
In the Multicloud Defense Controller dashboard, click Add Account in the Cloud Accounts pane. |
||
Step 2 |
On the General Information page, select Azure from the Account Type list box. |
||
Step 3 |
In step 1, click the link to open an Azure Cloud Shell in bash mode. |
||
Step 4 |
In step 2, click the Copy button. |
||
Step 5 |
Run the onboarding script in the bash shell.
|
||
Step 6 |
Provide a name for this Azure account. You can choose to name this the same as your Azure subscription name. This name is visible on the Multicloud Defense Controller accounts page only. |
||
Step 7 |
(Optional) Provide a description for the subscription. |
||
Step 8 |
Enter the Directory ID, also referred as the Tenant ID. |
||
Step 9 |
Enter the Subscription ID for the subscription being onboarded. |
||
Step 10 |
Enter the Application ID, also referred to as the Client ID, created by the onboarding script. |
||
Step 11 |
Enter the Client Secret, also referred to as the Secret ID. |
||
Step 12 |
Click Save & Continue. |
The Azure subscription is onboarded and you are returned to the dashboard to see that the new device has been added.
What to do next
-
Create a policy in the Azure portal.
Accept Marketplace Terms
Multicloud Defense Controller creates Gateway instances using a Multicloud Defense virtual machine (VM) image from the Azure marketplace. The Terms and Conditions must be accepted for each subscription. Open the Azure cloud shell from the Azure portal website (on the top menubar towards the right side). Choose or switch to bash shell and execute the following command (replace the subscription-id with your subscription id copied in the previous section):
az vm image terms accept --subscription $sub_id --publisher valtix --offer datapath --plan valtix_dp_image