Add an Azure Active Directory Account on Prisma Cloud
Add your Azure Active Directory account on Prisma Cloud
to retrieve information on your users.
Connecting Prisma™ Cloud to monitor your Azure
Active Directory enables you to retrieve information on your users
who access resources deployed within your Azure subscription.
- Authorize an Azure Active Directory application to read user profile information.
- Log in to the Azure portal.
- Select.Azure Active DirectoryApp Registrations
- Select the application from the list and select.API PermissionsAdd a Permission
- SelectMicrosoft GraphApplication PermissionsThis allows you to allow the application to access the Microsoft Graph APIs.
- Select the permissionuser.read.all, andAdd Permission.The permission you added allows the app to read user profiles without a signed in user.This permission requires admin consent. An Azure AD tenant administrator must grant these permissions by making a call to the admin consent endpoint.
- Collect the details for the Active Directory app.
- Log in to the Azure portal.
- Get theDirectory (tenant) ID.
- Get theApplication (client) IDandObject ID.You must enter the Object ID as the Enterprise Application Object ID in Step 3-d.
- Get theApplication Key.
- Add your Azure Active Directory on Prisma Cloud.
- Access Prisma Cloud and select.SettingsCloud AccountsAdd New
- Enter aCloud Account Name.
- SelectOnboard using Azure Active Directory
- SelectCloud TypeAzure and theCommercialorGovernmentenvironment where your AD resources are deployed, clickNext.
- Enter your AzureDirectory (Tenant) ID,Application (Client) ID,Application Client SecretandEnterprise Application Object ID.
- Select theAccount Groupsyou want to add and clickNext.You must assign each cloud account to an account group, and Create an Alert Rule for Run-Time Checks to associate the account group with it to generate alerts when a policy violation occurs.
- Verify theStatusandDoneto save your changes.If Prisma Cloud is able to validate the credentials by making an authentication call using the credentials provided in the previous step, it displays a green check mark.
- Verify that you can view the information on your Azure Active Directory users on Prisma Cloud.
- Log in to Prisma Cloud.
- SelectInvestigateand enter the following RQL query to view details on your Azure Active Directory users.config where cloud.type = 'azure' AND api.name = 'azure-active-directory-user' AND json.rule = userType equals "Guest"
Recommended For You
Recommended Videos
Recommended videos not found.