Integrate Azure Identity
Integrate FortiCNAPP with Azure Identity to gain unified visibility and deeper insights into your identity security and enhance other capabilities such as attack path analysis, threat alerts, and resource inventory.
Requirements
To take full advantage of FortiCNAPP identity management capabilities, enable the following:
- (Required) Azure Configuration integration: Allows analysis of the identity configuration.
To take full advantage of identity management capabilities, we recommend creating a configuration integration with your Azure organization management account (using your preferred method: Manual or Terraform) so that we can analyze policies and Entra ID data.
To learn more about Azure organizations, tenants, and subscriptions, refer to Subscriptions, licenses, accounts, and tenants for Microsoft's cloud offerings.
-
(Recommended) Azure Activity Log integration: Lets FortiCNAPP determine what entitlements are used and other risks based on usage, such as dormant users, dormant access keys, and more.
-
(Recommended) Azure agentless workload scanning: Allows detection of hardcoded access keys belonging to identities.
Supported features
The following features are available when Azure identity integration is configured:
-
Cloud provider filter option for Azure on all identity pages.
-
New Azure-based Overview charts and Identity Explorer Overview page.
-
Top Identity Risks page for Azure identities.
-
Identity entitlement-based risks for Entra users, groups, and service principals.
-
Identity summary screens for Entra users, groups, and service principals.
-
Entitlements screen for users, groups, and service principals.
-
Linked identities screen for users, groups, and service principals.
-
Exceptions screen for Azure risk properties.
-
Support for net effective permissions:
-
Direct role assignment based permissions.
-
1-hop permissions via group membership.
-
Deny Assignments.
-
Permission inheritance (child resources inherit parent resource permissions).
-
-
Support for remediations.
-
Excessive privileges analysis.