Setup - Azure¶
Looking for Amazon Web Services instructions? To get started with Fugue on AWS, see Setup - AWS & AWS GovCloud.
Ready to create a Fugue environment? An environment represents cloud infrastructure configuration in a provider account – in this case, Azure. Fugue surveys the resource configuration in an environment and reports whether the infrastructure is compliant with a particular compliance standard.
In a hurry? For an even quicker setup guide, see Get Started in 5 Minutes.
To learn more about the basics of using Fugue, see Fugue 101.
Sign Up for Fugue¶
Before you can create an environment, you’ll need to sign up for a free account with Fugue. (You’ll start off with a free Enterprise trial, which gives you access to all of Fugue’s features; after 30 days, you’ll be transitioned to the free-forever Developer plan if you choose not to upgrade.)
Once you’re all signed up and logged in, select the Define New Environment button:
Step 1: Setup (Name, Provider)¶
You must have at least one existing resource group in Azure in order to create an environment in Fugue.
In the first step of creating an environment, you name it and specify your cloud provider.
Name your environment.
Select Azure as the cloud provider.
Step 2: Settings (Credentials, Resource Groups)¶
If at any point you want to change something, you can select “Back” at the bottom of the page to return to the previous step, or “Edit” in the sidebar next to the desired step to return to that step.
Step 2 has two parts, which we’ll detail next:
Step 2a: Connect to Azure¶
Before Fugue can connect to your Azure subscription and scan your infrastructure, you’ll need to provide four pieces of information:
- Subscription ID
The ID for your trial or paid subscription to Microsoft Azure. To find your subscription ID, go to All services > Subscriptions > Subscription ID.
- Tenant ID (directory ID)
The ID of your specific Azure Active Directory instance. To find your tenant ID, log into the Azure Portal and navigate to Azure Active Directory > Properties > Directory ID.
- Application ID (client ID)
The ID for the Azure Active Directory application you register for Fugue. You’ll create this in the next step.
- Client secret
The secret string Fugue uses to authenticate with Azure. You’ll also create this in the next step.
Create Azure Active Directory Application¶
To obtain an application ID (client ID) and client secret, you’ll need to create an Azure Active Directory (AD) application and service principal, assign it an RBAC role, and then generate a secret. This gives Fugue the permissions required to scan your selected resource groups.
In the Azure Portal, navigate to Azure Active Directory > App registrations, then select the “New registration” button.
Enter a name for the AD application – we’ve called ours
in the image below – and then ensure supported account types is set to
“Accounts in this organizational directory only.” You can leave the
“Redirect URI” field blank. Then, click the “Register” button.
After Azure registers the application and creates the service principal, you can copy the application ID and enter it into the Fugue environment setup:
Assign an RBAC Role¶
Next, you’ll need to assign the service principal an RBAC role. You can scope the role to your entire subscription, a specific resource group, or an individual resource. If you intend to use Fugue to scan more than one resource group, it’s simplest to give the application access at the subscription level, but go with whatever works best for your use case.
To assign your service principal a role at the subscription level, navigate to All services > Subscriptions > Subscription ID and select your subscription. Then, select the Access Control (IAM) link and click the “Add” button, then “Add role assignment”:
To give Fugue permission to scan your Azure resources, select the Reader role.
To give Fugue permission to scan AND enforce your Azure resources, select the Contributor role. (You don’t need to enable enforcement right now; this just grants permission in case you want to enable it later.)
Leave the “Assign access to” field as is and search for the name of your AD application in the “Select” field, then select the “Save” button.
Example Reader role:
Generate a Client Secret¶
Now that you’ve created the AD application and set up the service principal, you can generate a client secret. Return to Azure Active Directory > App registrations and select the application you just registered, then select the Certificates & secrets link. Click the “New client secret” button and enter a description for your client secret and set an expiration date, then select “Add.” You can then copy the generated secret and enter it into the Fugue environment setup:
Back in the Fugue environment setup, select the “Connect to Azure” button. You should see a message confirming that the connection was successful:
You can select “Undo” if you need Fugue to connect again and refresh the list of resource groups. Note that when you select “Undo,” Fugue clears all of the credential fields.
Step 2b: Select Resource Groups¶
Now that Fugue has connected to your Azure subscription, you may specify the resource groups you want Fugue to scan or enforce:
If you want to select a resource group you created in Azure after connecting but before finalizing the environment, you can refresh the list of available resource groups by selecting “Undo” and re-entering the connection information.
You can remove resource groups later by editing the environment settings, as long as at least one resource group remains selected. However, to add resource groups after the environment has been created, you must use the Fugue API. See How To: Add or Remove Azure Resource Groups for details.
Step 3: Select Compliance Libraries¶
If you’d like Fugue to evaluate your infrastructure configuration for all compliance standards, ensure “Yes” is selected.
If you’d prefer to select the compliance families yourself, click No - select a subset.
Fugue supports the following compliance families for Azure environments:
Step 4: Review Environment Details¶
Review the details for your environment, including environment name, subscription/tenant/application IDs, compliance standards, and resource groups.
If anything needs to be changed, click Edit next to the appropriate step, as highlighted below.
3. If everything looks good, select the Approve and Begin Scan button. Fugue will create your environment and start to scan your infrastructure.
When the scan is complete, Fugue brings you to your environment’s dashboard, where you can see your compliance state.
Congratulations! You’ve just created an Azure environment with Fugue.
Fugue will continue to scan the resource configuration in your environment at regular intervals (and on demand). This is how Fugue detects compliance violations in your infrastructure.
Now that you’ve created an environment, learn how to configure it further in Environment Configuration. If you’d like to learn more about checking compliance state, see Compliance. Or, check out the visualizer for an interactive diagram of your cloud infrastructure.