Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Configure Firewall to allow authentication to AAD #410

Closed
Phydeauxman opened this issue Sep 13, 2021 · 2 comments · Fixed by #442
Closed

Configure Firewall to allow authentication to AAD #410

Phydeauxman opened this issue Sep 13, 2021 · 2 comments · Fixed by #442
Assignees

Comments

@Phydeauxman
Copy link
Contributor

Phydeauxman commented Sep 13, 2021

Benefit/Result/Outcome
As a user/admin of MLZ capabilities, I need to be able to access Azure endpoints from within the MLZ environment

Description
When using systems deployed within the MLZ hub and spoke architecture, there may be a need for accessing endpoints from IaaS systems. As an example, when logged into a Remote Access server, a user/admin may need to query a Key Vault for Secrets. In order to access the Key Vault, the user/admin would need to first authenticate against the login endpoint for the respective cloud.

The scope for this backlog item is limited to providing network access to AAD authentication. We assume that Azure resources that allow private endpoints will be addressable if users can get a token from AAD. See #306 for planning on private endpoints.

Acceptance Criteria

  • As a user/admin, I am able to execute a curl against the login endpoint for the respective cloud
@shawngib
Copy link
Member

I agree that in certain cases this needs to be considered. I feel that it needs to better understand the scenarios and can't be a generic setting and documented very well. This would be inline with being opinionated. For example, a simple service tag endpoint for storage via SAS token solves storage access. A private end point and DNS entry will be required for Log Analytics. Key vault, mentioned here requires the following: Getting token being the problem?

  • Authentication via Azure Active Directory (Azure AD).
  • Management of Azure Key Vault. This includes creating, reading, updating, deleting, and setting access policies through Azure Resource Manager.
  • Accessing and managing objects (keys and secrets) stored in Key Vault itself, going through the Key Vault-specific endpoint (for example, https://yourvaultname.vault.azure.net).

The info on Key Vault is here.

The question is what is allowed and still be compliant and what requires this access.

@brooke-hamilton brooke-hamilton changed the title Configure Firewall to allow traffic to Azure endpoints Configure Firewall to allow authentication to AAD Sep 20, 2021
@shawngib shawngib self-assigned this Oct 6, 2021
@shawngib
Copy link
Member

shawngib commented Oct 6, 2021

The failure appears to be the javascript that is downloaded from login portal tries to reach aadcdn.msftauth.net and aacdn.msft.net to get an answer and those domains are not in the AzureCloud tag. By adding these as a Firewall policy in MAG to allow it then works. Further testing in commercial but this will need to add AzureCloud tag and 1 additional application rule for those domains.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging a pull request may close this issue.

3 participants