Enable system assigned managed identity and configure permissions
To enable a system assigned managed identity:
- In Azure, go to Home > Virtual machines and click the name of the VM (fazha001).
- Go to Identity.
- Set the Status to On.
- Click Save.
A messages asks you to confirm the action.
A system assigned managed identity is restricted to one per resource and is tied to the lifecycle of this resource. You can grant permissions to the managed identity by using Azure role-based access control (Azure RBAC). The managed identity is authenticated with Microsoft Entra ID (formerly Azure AD), so you don’t have to store any credentials in code.
- Click Yes.
To configure the permissions:
- In Azure, go to Home > Virtual machines and click the name of the VM (fazha001).
- Go to Identity > System assigned.
- Click Azure role assignments.
- From the Subscription dropdown, select SE-Subscription.
- Click Add role assignment (Preview).
- Enter the resource group information that was created as a Prerequisite:
Scope =
Resource group
Subscription =
SE-Subscription
Resource group =
CMM_RG_FAZHA
Role =
Owner
- Click Save.
- Repeat the previous steps for the second FortiAnalyzer-VM (fazha002).