8.2.3 Configuring Network Security Groups

In the previous section Creating and Deploying Virtual Machines, a separate network security group is created for each virtual machine. You must modify these security groups to open the required incoming ports, depending on the Access Manager component type that will be installed on the virtual machine.

Edit the network security groups for Administration Console, Identity Server, and Access Gateway to configure the ports based on requirements of that component.

For information about the required ports, see Table 1-7, Administration Console on Cloud, Table 1-8, Identity Server on Cloud, and Table 1-9, Access Gateway on Cloud.

  1. In the Azure portal, click All resources.

    You can filter the list can using the fields at the top of the page.

  2. Find and click the desired network security group created in Step 10.

  3. Click Inbound security rules > Add.

  4. Specify details in fields.

    The following is an example configuration:

    Field

    Value

    Source

    Any

    Source port range

    *

    Destination

    Any

    Destination port range

    8443

    Protocol

    TCP

    Action

    Allow

    Priority

    100

    Name

    Administration Console HTTPS

    Description

    HTTPS port for Access Manager Administration Console.

  5. Repeat Step 3 and Step 4 for each inbound port rule to be added as listed in Table 1-7, Administration Console on Cloud, Table 1-8, Identity Server on Cloud, and Table 1-9, Access Gateway on Cloud, depending on the component type that will use this network security group.

  6. Continue with Changing the Private IP Address from Dynamic to Static.