Fortinet black logo

Azure AD Server

Azure AD Server

Connect FortiPhish to your organization's Azure AD tenant to import users to create new recipients.

Note

FortiPhish only supports importing users from Azure AD. You cannot import groups from Azure AD at this time.

Configuring Azure AD for FortiPhish:

Generate a Client ID and Secret in Azure AD to allow access for FortiPhish service.

To generate a Client ID and Secret in Azure AD:
  1. In Azure or O365 portal, switch to Azure Active Directory page.
  2. Create a new application that can be associated with FortiPhish. In azure portal:
    1. Go to App Registrations > New Registration.
      1. Provide a name for App. Ex. FortiPhish-AD-Proxy.
      2. Select the tenant.
      3. Leave Redirect URI blank.
    2. Record the Client ID and Tenant ID.
  3. Create an Access key.
    1. Under App Registrations select the created application.
    2. Go to Certificates & Secrets > New Client Secret.
    3. Record the Client Secret (named value in the GUI).
  4. Provide permissions to Graph API.
    1. Under App Registrations select the created application.
    2. Go to API Permissions > Add permission.
    3. Select Microsoft Graph” and then Application Permissions.
    4. Provide Permissions to the list of users and groups such as Directory ReadAll and Group ReadAll.
      Note

      After permissions are added, you should grant them using Grant admin consent to xxx in permission overview page.

Syncing the Azure AD server

You can sync the Azure AD server when members join or leave your organization.

To sync the server:
  1. In FortiPhish, go to Recipients > Azure AD Server.
  2. (Optional) In the Sync Status column, hover over the status column to view the latest sync date and time. If this is the first time, the status will be Never.

  3. In the Action column, click the sync button. A confirmation window opens.
  4. Click Yes. When the sync is complete, the number of users fetched is displayed.

Azure AD Server

Connect FortiPhish to your organization's Azure AD tenant to import users to create new recipients.

Note

FortiPhish only supports importing users from Azure AD. You cannot import groups from Azure AD at this time.

Configuring Azure AD for FortiPhish:

Generate a Client ID and Secret in Azure AD to allow access for FortiPhish service.

To generate a Client ID and Secret in Azure AD:
  1. In Azure or O365 portal, switch to Azure Active Directory page.
  2. Create a new application that can be associated with FortiPhish. In azure portal:
    1. Go to App Registrations > New Registration.
      1. Provide a name for App. Ex. FortiPhish-AD-Proxy.
      2. Select the tenant.
      3. Leave Redirect URI blank.
    2. Record the Client ID and Tenant ID.
  3. Create an Access key.
    1. Under App Registrations select the created application.
    2. Go to Certificates & Secrets > New Client Secret.
    3. Record the Client Secret (named value in the GUI).
  4. Provide permissions to Graph API.
    1. Under App Registrations select the created application.
    2. Go to API Permissions > Add permission.
    3. Select Microsoft Graph” and then Application Permissions.
    4. Provide Permissions to the list of users and groups such as Directory ReadAll and Group ReadAll.
      Note

      After permissions are added, you should grant them using Grant admin consent to xxx in permission overview page.

Syncing the Azure AD server

You can sync the Azure AD server when members join or leave your organization.

To sync the server:
  1. In FortiPhish, go to Recipients > Azure AD Server.
  2. (Optional) In the Sync Status column, hover over the status column to view the latest sync date and time. If this is the first time, the status will be Never.

  3. In the Action column, click the sync button. A confirmation window opens.
  4. Click Yes. When the sync is complete, the number of users fetched is displayed.