An administrator decides to use the Use managed identity option on the FortiGate SDN connector with Microsoft Azure However, the SDN connector is failing on the connection What must the administrator do to correct this issue?
A.
Make sure to add the Tenant ID on FortiGate side of the configuration
B.
Make sure to set the type to system managed identity on FortiGate SDN connector settings
C.
Make sure to enable the system assigned managed identity on Azure
D.
Make sure to add the Client secret on FortiGate side of the configuration
When an administrator decides to use the 'Use managed identity' option for the FortiGate SDN connector with Microsoft Azure and faces a connection failure, the correct action to take is:
C. Make sure to enable the system assigned managed identity on Azure.
Managed Identity Configuration: The system assigned managed identity is a feature in Azure that provides an identity for the Azure service instance (in this case, the FortiGate SDN connector) within Azure Active Directory and eliminates the need for credentials to be stored in the configuration.
Troubleshooting Connection Issues: If the SDN connector is failing to connect, it could be because the system assigned managed identity has not been enabled or configured properly in Azure for the FortiGate service.
References: Azure documentation on managed identities explains the need to enable and configure this feature for services to authenticate and interact securely with Azure resources.
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit