Create an Azure application for Deep Security
In your operating environment, it may not be desirable to allow the Deep Security Manager to access Azure resources with an account that has both the Global Administrator role for Microsoft Entra ID and the Subscription Owner role for the Azure subscription. As an alternative, you can create an Azure application for Deep Security Manager that provides read-only access to Azure resources.
If you have multiple Azure subscriptions, you can create a single Deep Security Azure application for all of them, as long as the subscriptions all connect to the same Active Directory.
To create an Azure application, you need to do the following:
- Assign the correct roles
- Create the Azure application
- Record the Azure app ID and Active Directory ID
- Record the Subscription ID
- Assign the Azure application a role and connector
Assign the correct roles
To create an Azure application, your account must have the User Administrator role for Microsoft Entra ID and the User Access Administrator role for the Azure subscription. Assign these roles to your Azure account before proceeding.
Create the Azure application
- In the Microsoft Entra ID blade, click App registrations.
- Click New registration.
- Enter a Name (for example, Deep Security Azure Connector).
- For the Supported account types, select Accounts in this organizational directory only.
- Click Register.
The Azure application appears in the App registrations list with the Name you provided.
Record the Azure app ID and Active Directory ID
- In the App registrations list, click the Azure application.
- Record the Application (client) ID.
- Record the Directory (tenant) ID
Create an application secret or upload the application certificate
- On the Certificates & secrets tab, select the type of the application credential to use:
- Option 1: Client secrets (application password)
- Option 2: Certificate
You can create multiple application credentials in Azure, but Deep Security Manager only required one credential (either the application secret or application certificate) for the Azure account.
- Follow the procedure for either Option 1 or Option 2 (below) depending on the type of credential you want to use.
Option 1: Create client secrets (application password)
- Click New client secret.
- Enter a Description for the client secret.
- Select an appropriate Duration. The client secret expires after this time.
- Click Add.
The client secret Value appears.
- Record the client secret Value. You need to use it as the Application Password when registering the Azure application with Deep Security.
The client secret Value only appears once, so record it now. If you do not, you must regenerate it to obtain a new Value.
If the client secret Value expires, you must regenerate it and update it in the associated Azure accounts.
Option 2: Upload an application certificate
- Prepare a certificate in X.509 PEM text format.
The certificate can be either public-signed or self-signed and should not expire. If the private key is protected with a secret, you need the certificate private key and optional passphrase or secret when setting up the Azure account in Deep Security Manager. The RSA key size must be at least 2048 bits.
Deep Security Manager currently does not support certificates in binary format.
- Click the Upload certificate button.
- Select certificate file to upload.
- Click Add.
If you provide invalid credentials or configurations (for example, the RSA key is too short), the Azure connector displays an error message "Unable to authenticate to Azure Entra ID. Credential or configuration is invalid".
Record the Subscription ID
- On the left, go to All Services and click Subscriptions.
A list of subscriptions appears.
If Subscriptions does not appear on the left, use the search box at the top of the screen to find it.
- Record the Subscription ID of each subscription you want to associate with the Azure application. You need the ID later, when adding the Azure accounts to Deep Security.
Assign the Azure application a role and connector
- Under All Services > Subscriptions, click a subscription that you want to associate with the Azure application.
- Click Access Control (IAM).
- In the main pane, click Add, and then select Add Role Assignment from the menu.
- Under Role, enter Reader and then click the Reader role that appears.
- Under Assign access to, select User, user group, or service principal.
- Under Select members, enter the Azure application Name (for example, Deep Security Azure Connector).
The Azure application appears with the Name you chose for it in Step 3 of the Create the Azure application procedure.
- Click Save.
- If you want to associate the Azure application to another subscription, repeat this procedure (Assign the Azure application a role and connector) for that subscription.
You can associate another subscription with the Azure application later if you want to.
You can now configure Deep Security to add Azure virtual machines by following the instructions in Add a Microsoft Azure account to Deep Security.