Tenant control
In this example, tenant control is configured for Microsoft in the inline CASB profile for the fortinet-us.com domain.
To configure an inline CASB profile with tenant control in the GUI:
-
Configure the inline CASB profile:
-
Go to Security Profiles > Inline-CASB and click Create new.
-
Enter a Name, such as microsoft_test.
-
In the SaaS Applications table, click Create new. The Create SaaS Application Rules pane opens.
-
Set the Application to microsoft, then click Next.
-
Enable Tenant control. Click the + and enter fortinet-us.com.
-
Click OK.
-
-
Configure the firewall policy:
-
Go to Policy & Objects > Firewall Policy. Edit an existing policy, or create a new one.
-
Set the Inspection Mode to Proxy-based.
-
In the Security Profiles section, enable Inline-CASB and select the microsoft_test profile.
-
Set the SSL Inspection profile to one that uses deep inspection.
-
Configure the other settings as needed.
-
Click OK.
-
To configure an inline CASB profile with tenant control in the CLI:
-
Configure the inline CASB profile:
config casb profile edit "microsoft_test" config saas-application edit "microsoft" set tenant-control enable set tenant-control-tenants "fortinet-us.com" next end next end
-
Configure the firewall policy:
config firewall policy edit 8 set name "casb_test_microsoft" set srcintf "port1" set dstintf "port3" set action accept set srcaddr "all" set dstaddr "all" set schedule "always" set service "ALL" set utm-status enable set inspection-mode proxy set ssl-ssh-profile "ssl" set casb-profile "microsoft_test" set nat enable next end
To test the configuration:
-
Open a browser and attempt to log in to Microsoft Office 365 with a fortinet-us.com account.
-
Since the domain is valid, the user can log in successfully.
-
Attempt to log in to Microsoft Office 365 with another account with a different domain.
-
The domain is invalid. The user is unable to log in, and an error message appears: Your network administrator has blocked access.
Sample log:
1: date=2023-08-18 time=17:09:25 eventtime=1692403765238967943 tz="-0700" logid="2500010002" type="utm" subtype="casb" eventtype="casb" level="information" vd="vdom1" msg="CASB access was monitored because it contained activity." policyid=8 sessionid=65108 srcip=10.1.100.195 dstip=20.189.173.15 srcport=61912 dstport=443 srcintf="port1" srcintfrole="undefined" dstintf="port3" dstintfrole="undefined" proto=6 action="monitor" profile="microsoft_test" saasapp="microsoft" useractivity="ms-tenant-control" activitycategory="tenant-control"