Add an Azure Active Directory Tenant on Prisma Cloud
Add your Azure Active Directory commercial tenant on
Prisma Cloud to monitor for security violations and enforce compliance.
Connecting Prisma ™ Cloud to your Azure commercial
tenant (without management groups) enables you to ingest your Azure
Active Directory metadata for security violations. These onboarding
workflows provides you two options for onboarding your Azure Active
Directory tenant without management groups: with Terraform to automatically
create your Azure resources, or manually using Azure Portal.
Add an Azure Active Directory Tenant—Automatic
This workflow uses Terraform to automatically
create your Azure Active Directory metadata to onboard to Prisma
Cloud for continuous security monitoring.
- Select Azure as the cloud type to onboard.
- Select.SettingsCloud AccountsAdd Cloud AccountAzure
- Configure the initial onboarding options.
- Cloud Account Name—Enter a descriptive name to represent the cloud account that you will onboard to Prisma Cloud.
- Onboard—SelectAzure Tenantto onboard your Azure AD tenant.
- Azure Cloud Type—SelectCommercialto onboard your Microsoft Azure (Commercial) account.
- Onboard Azure Management Groups and Subscriptions—Deselect this option to exclude onboarding management groups and clickNext.
- Select Mode—SelectMonitorto provide Prisma Cloud with read-only access, orMonitor and Protectfor read-write access, and then clickNext.The steps for Monitor and Monitor and Protect are identical onwards.
- Enter your Azure application data into Prisma Cloud.The Azure application details to capture are as follows:
- Application (Client) ID—A public identifier for your app registration.
- Application Client Secret—A secret string that the app uses to prove its identity when requesting a token. Also can be referred to as the application password.
- Enterprise Application Object ID—A unique value for the enterprise application.
- Download the Terraform script from the Prisma Cloud user interface.
- Log in to Azure shell.
- Upload the Terraform script to Azure portal by clicking theUpload/Downloadfiles (
) button in the Azure CLI.
- Run the following Terraform commands:
- terraform init
- terraform apply
- Copy theApplication (Client) ID,Application Client Secret, andEnterprise Application Object IDto a secure location on your computer.
- Grant admin consent.
- Click on thee_consent_linklink which will redirect you to theAPI permissionssection in Azure portal.
- ClickGrant admin consent for Default Directoryand selectYes.A success message should appear with the textgrant consent successful.
- Verify that the status column has green check marks.
- Enter yourApplication (Client) ID,Application Client Secret, andEnterprise Application Object IDdetails into the Prisma Cloud UI and clickNext.
- Add account groups.Select theAccount Groupsyou want to add and clickNext. You must assign each cloud account to an account group, and to associate the account group with it to generate alerts when a policy violation occurs.
- Verify theStatusand clickDoneto save your changes.If Prisma Cloud is able to validate the credentials by making an authentication call using the credentials provided in the previous step, it displays a green check mark.
Add an Azure Active Directory Tenant—Manual
Add your Azure Active Directory commercial tenant on
Prisma Cloud to monitor the metadata for security violations and
enforce compliance using the manual workflow.
This uses the manual workflow of registering
an app in Azure portal and connecting it to Prisma Cloud using APIs—this
enables you to ingest your Azure Active Directory metadata so that
you can monitor it for security violations.
- Select Azure as the cloud type to onboard.
- Select.SettingsCloud AccountsAdd Cloud AccountAzure
- Configure the initial onboarding options.
- Cloud Account Name—Enter a descriptive name to represent the cloud account that you will onboard to Prisma Cloud.
- Onboard—SelectAzure Tenantto onboard your Azure AD tenant.
- Azure Cloud Type—SelectCommercialto onboard your Microsoft Azure (Commercial) account.
- Onboard Azure Management Groups and Subscriptions—Deselect this option to exclude onboarding management groups and clickNext.
- Select Mode—SelectMonitorto provide Prisma Cloud with read-only access, orMonitor and Protectfor read-write access, and then clickNext.Note: The steps for Monitor and Monitor and Protect are identical onwards.
- Enter your Directory (Tenant) ID andNext.
- Register an app on Azure Active Directory (Azure AD).To register an app on Azure AD, ensure that you have access to the following prerequisites:
- A Prisma Cloud tenant with permissions to onboard a cloud account.
- Access to Azure portal with the permissions to:
- Create an app registration (service principal).
- Create a custom role.
- Assign IAM roles at the tenant root level.
- Assign GraphAPI permissions at the tenant level.
- Grant admin consent for Azure AD Graph APIs.
- Register a new app.
- Log in to Azure portal.
- Select.Azure Active DirectoryApp registrations+ New registration
- Enter the application name.
- Select the supported account types.You have the options of choosing from single tenant, multitenant, multitenant and personal Microsoft accounts, or personal Microsoft accounts only.
- Optional—Enter the Redirect URI.The authentication response of the app will be returned to this URI.
- ClickRegister.
- CopyApplication (client) IDandDirectory (tenant) IDto a secure location on your computer. You will later enter these details into the Prisma Cloud UI.
- Create the client secret.The client secret is a secret string that the application uses to prove its identity when requesting a token.
- Select.Certificates & secrets+ New client secret
- Enter a clientDescription, selectExpiresto configure how long the client secret lasts, andAdd.
- CopyValueto a secure location.
Make sure that you copyValueand notSecret ID. - Get the Object ID.
- Select, and search for the app you previously created in the search box.Azure Active DirectoryEnterprise applications
- CopyObject IDto a secure location on your computer.Make sure that you get theObject IDfor the Prisma Cloud application fromon the Azure portal—not fromEnterprise ApplicationsAll applicationsApp Registrations.
- Add the Microsoft Graph APIs.
- Navigate to the app you previously registered.Select, and select your app.Azure Active DirectoryApp registrations
- Navigate to Microsoft Graph.Select.API permissions+ Add a permissionMicrosoft GraphApplication permissions
- Add the permissions.Enter the permission name inSelect permissions, and select the name fromPermission.Add the following permissions:
- User.Read.All
- Policy.Read.All
- Group.Read.All
- GroupMember.Read.All
- Reports.Read.All
- Directory.Read.All
- Domain.Read.All
- Application.Read.All
- Enter your account details.Enter yourApplication (Client) ID,Application Client Secret, andEnterprise Application Object ID, and clickNext.
- Add account groups.Navigate back to the Prisma Cloud UI, and select theAccount Groupsyou want to add and clickNext.You must assign each cloud account to an account group, and to associate the account group with it to generate alerts when a policy violation occurs.
- Verify theStatusandSaveto save your changes.If Prisma Cloud is able to validate the credentials by making an authentication call using the credentials provided in the previous step, it displays a green check mark for the Active Directory permissions status along with Azure Active Directory Authentication.
Recommended For You
Recommended Videos
Recommended videos not found.