Deep Security 10.1 has reached end of support. Use the version selector (above) to see more recent versions of the Help Center.
Create an Azure app for Deep Security
In your operating environment, it may not be desirable to allow the Deep Security Manager to access Azure resources with an account that has both the Global Administrator role for the Azure Active Directory and the Subscription Owner role for the Azure subscription. As an alternative, you can create an Azure app for the Deep Security Manager that provides read-only access to Azure resources.
To do this you will need to:
- Record the Azure Active Directory ID.
- Create the Azure app.
- Record the Azure app ID and password.
- Record the Subscription ID.
- Assign the Azure app a reader role and add it to your Azure Subscription.
Record the Azure Active Directory ID
- On the Hub menu, click Azure Active Directory and select your Azure Active Directory.
- In the Azure Active Directory blade, click Properties.
- Record the Directory ID.
Create the Azure app
- In the Azure Active Directory blade, click App registrations.
- Click Add.
- Enter a Name (for example, Deep Security Azure Connector).
- For the Application Type, select Web app/API.
- Enter a Sign-on URL. The URL can be any value, but it must begin with the http prefix.
You must enter a URL in the Sign-on URL field, even though it is not used by Deep Security Azure integration. The value does not need to resolve to a valid address.
- Click Create.
The Deep Security Azure Connector app will appear in the App registrations list.
Record the Azure app ID and password
- In the App registrations list, click on the Deep Security Azure Connector.
- Record the Application ID.
- Click on All settings.
- On the Settings blade, click Keys.
- Enter a Description for the key.
- Select an appropriate Duration.
-
Click Save.
The key Valuewill appear.
- Record the key Value. This will be used as the Application Password when registering the Azure app with Deep Security.
Record the Subscription ID
- On the Hub menu, click Subscriptions, then select the subscription you added the Deep Security Azure Connector app to.
- Record the Subscription ID.
Assign the Azure app a reader role and add it to your Azure Subscription
- In the Subscriptions blade, click on Access Control (IAM).
- Click Add.
- Click on the Reader role.
- Select the Deep Security Azure Connector app. If it is not already in the list, enter it in the search field and select it when it appears.
- Click OK.
You can now continue configuring Deep Security to add Azure virtual machines by following the remaining steps of the Advanced procedure in Add a Microsoft Azure account to Deep Security.