Simplify Azure Fabric connector configuration for a FortiGate-VM deployed on Azure
For a FortiGate-VM deployed on Azure, the new Use managed identity setting allows FortiOS to connect to Azure based on the FortiGate-VM's user-assigned managed identity. Using user-assigned managed identities enables a FortiGate-VM deployed on Azure to authenticate to cloud services without storing credentials in FortiOS.
When you enable Use managed identity for an Azure Fabric connector, you do not need to configure the Tenant ID, Client ID, and Client secret fields on the Fabric connector creation page. FortiOS hides these fields when you enable Use managed identity for an Azure Fabric connector.
This feature only applies for a FortiGate-VM deployed on Azure. For a FortiGate that is not deployed on Azure, you must still configure the Tenant ID, Client ID, and Client secret fields for an Azure Fabric connector. This feature also does not apply for a FortiGate-VM deployed on Azure Stack.
This configuration consists of the following steps:
- Configure a user-managed identity in Azure.
- Configure an Azure Fabric connector in FortiOS:
To configure a user-managed identity in Azure:
- In Azure, go to All services > Managed Identities. Create a managed identity.
- Go to the FortiGate-VM instance, then go to Identity. Set the managed identity created in step a as the user-assigned identity.
- Search for subscriptions to assign the level of scope. Select the subscription, then go to Access control (IAM). Click Add role assignment. From the Role dropdown list, select Contributor.
To configure an Azure Fabric connector in the FortiOS GUI:
- Configure the Fabric connector in FortiOS:
- On the FortiGate-VM deployed on Azure, go to Security Fabric > External Connectors.
- Click Create New.
- Under Public SDN, select Microsoft Azure.
- Enable Use managed identity.
- Configure other settings as desired.
- Click OK.
- Create a dynamic firewall address associated to the Fabric connector:
- Go to Policy & Objects > Addresses.
- From the Type dropdown list, select Dynamic.
- From the Sub Type dropdown list, select Fabric Connector Address.
- From the SDN Connector dropdown list, select the Fabric connector that you created in step 1.
- Configure other settings as desired.
- Click OK.
- To confirm that the Fabric connector resolves the dynamic firewall IP addresses with the supported filter, go to Policy & Objects > Addresses. Hover over the address that you created in step 2.
To configure an Azure Fabric connector in the FortiOS CLI:
- Configure the Fabric connector in FortiOS:
config system sdn-connector
edit "azure"
set status enable
set type azure
set azure-region global
set use-metadata-iam enable
next
end
- Create a dynamic firewall address associated to the Fabric connector:
config firewall address
edit "azure-iam-1"
set type dynamic
set sdn "azure"
set color 2
set filter "ResourceGroup=azuretest"
next
end
- Confirm that the Fabric connector resolves the dynamic firewall IP addresses with the supported filter:
config firewall address
edit "azure-iam-1"
set type dynamic
set sdn "azure2"
set color 2
set filter "ResourceGroup=azuretest"
config list
edit "10.0.0.4"
next
edit "10.0.0.5"
next
edit "10.0.1.10"
next
edit "10.0.1.4"
next
edit "10.0.1.5"
next
edit "10.0.2.10"
next
edit "10.0.2.4"
next
edit "10.0.2.5"
next
edit "10.0.3.10"
next
edit "10.0.3.4"
next
edit "10.0.3.5"
next
edit "10.5.0.4"
next
edit "10.5.0.5"
next
edit "10.8.0.5"
next
edit "10.8.1.6"
next
end
next
end