-
Notifications
You must be signed in to change notification settings - Fork 3.4k
[Reference feedback]: az login in firewalled environment, FQDNs required #30723
Copy link
Copy link
Open
Labels
Accountaz login/accountaz login/accountAuto-AssignAuto assign by botAuto assign by botAzure CLI TeamThe command of the issue is owned by Azure CLI teamThe command of the issue is owned by Azure CLI teamact-identity-squadcustomer-reportedIssues that are reported by GitHub users external to the Azure organization.Issues that are reported by GitHub users external to the Azure organization.needs-triageThis is a new issue that needs to be triaged to the appropriate team.This is a new issue that needs to be triaged to the appropriate team.questionThe issue doesn't require a change to the product in order to be resolved. Most issues start as thatThe issue doesn't require a change to the product in order to be resolved. Most issues start as that
Milestone
Metadata
Metadata
Labels
Accountaz login/accountaz login/accountAuto-AssignAuto assign by botAuto assign by botAzure CLI TeamThe command of the issue is owned by Azure CLI teamThe command of the issue is owned by Azure CLI teamact-identity-squadcustomer-reportedIssues that are reported by GitHub users external to the Azure organization.Issues that are reported by GitHub users external to the Azure organization.needs-triageThis is a new issue that needs to be triaged to the appropriate team.This is a new issue that needs to be triaged to the appropriate team.questionThe issue doesn't require a change to the product in order to be resolved. Most issues start as thatThe issue doesn't require a change to the product in order to be resolved. Most issues start as that
Type of issue
Other (describe below)
Reference command name
az loginFeedback
Use case
Creation of an Azure environment that handles sensitive data and minimises routes for data exfiltration.
Azure Firewall is deployed and blocks most outbound traffic.
The environment provides Azure SQL and Storage accounts with Entra authentication only - therefore the ability for users to authenticate to Entra is required, which I'm testing using
az login.Getting
az loginworkingIn order to get
az loginworking so that users can authenticate to Entra, I've add the following service tag to the firewall allow list:AzureActiveDirectoryservice tagHowever
az loginworks part of the way and fails as it tries to retrieve tenant and subscription information:I've found that adding the FQDN
management.azure.comto the firewall unblocks this last step.I've tried the same within Azure Data Studio using the 'Microsoft Entra ID - Universal with MFA Support' authentication method and that also fails without
management.azure.comon the allow list.However this is the whole management plane API of Azure (not just to authenticate), and I'd rather not allow access to this if it's not needed.
Question
Is there a way to authenticate to Entra WITHOUT having to add
management.azure.comto the firewall allow list?Thanks
Page URL
No response
Content source URL
No response
Author
jonnyry
Document Id
No response