Skip to content

Commit 03494da

Browse files
Merge pull request #251452 from cherylmc/kerberos
Freshness review + kerberos note
2 parents db68dc5 + c633c27 commit 03494da

File tree

1 file changed

+16
-13
lines changed

1 file changed

+16
-13
lines changed

articles/bastion/kerberos-authentication-portal.md

Lines changed: 16 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: Learn how to configure Bastion to use Kerberos authentication via t
55
author: cherylmc
66
ms.service: bastion
77
ms.topic: how-to
8-
ms.date: 06/12/2023
8+
ms.date: 09/14/2023
99
ms.author: cherylmc
1010

1111
---
@@ -17,11 +17,11 @@ This article shows you how to configure Azure Bastion to use Kerberos authentica
1717
## Considerations
1818

1919
* The Kerberos setting for Azure Bastion can be configured in the Azure portal only and not with native client.
20-
* VMs migrated from on-premises to Azure are not currently supported for Kerberos. 
21-
* Cross-realm authentication is not currently supported for Kerberos. 
22-
* Changes to DNS server are not currently supported for Kerberos. After making any changes to DNS server, you will need to delete and re-create the Bastion resource.
20+
* VMs migrated from on-premises to Azure aren't currently supported for Kerberos. 
21+
* Cross-realm authentication isn't currently supported for Kerberos. 
22+
* Changes to DNS server aren't currently supported for Kerberos. After making any changes to DNS server, you'll need to delete and re-create the Bastion resource.
2323
* If additional DC (domain controllers) are added, Bastion will only recognize the first DC.
24-
* If additional DCs are added for different domains, the added domains cannot successfully authenticate with Kerberos.
24+
* If additional DCs are added for different domains, the added domains can't successfully authenticate with Kerberos.
2525

2626
## Prerequisites
2727

@@ -56,11 +56,11 @@ In this section, the following steps help you modify your virtual network and ex
5656
1. [Update the DNS settings](#update-vnet-dns-servers) for your virtual network.
5757
1. Go to the portal page for your Bastion deployment and select **Configuration**.
5858
1. On the Configuration page, select **Kerberos authentication**, then select **Apply**.
59-
1. Bastion will update with the new configuration settings.
59+
1. Bastion updates with the new configuration settings.
6060

6161
## To verify Bastion is using Kerberos
6262

63-
> [!NOTE]
63+
> [!NOTE]
6464
> You must use the User Principal Name (UPN) to sign in using Kerberos.
6565
6666
Once you have enabled Kerberos on your Bastion resource, you can verify that it's actually using Kerberos for authentication to the target domain-joined VM.
@@ -71,7 +71,10 @@ Once you have enabled Kerberos on your Bastion resource, you can verify that it'
7171
1. End the VM session.
7272
1. Connect to the target VM again using Bastion. Sign-in should succeed, indicating that Bastion used Kerberos (and not NTLM) for authentication.
7373

74-
## Quickstart: Setup Bastion with Kerberos - Resource Manager template
74+
> [!NOTE]
75+
> To prevent failback to NTLM, make sure you follow the preceding steps. Enabling Kerberos (without following the procedure) won't prevent failback to NTLM.
76+
77+
## Quickstart: Set up Bastion with Kerberos - Resource Manager template
7578

7679
### Review the template
7780

@@ -418,21 +421,21 @@ Once you have enabled Kerberos on your Bastion resource, you can verify that it'
418421
The following resources have been defined in the template:
419422
- Deploys the following Azure resources:
420423
- [**Microsoft.Network/virtualNetworks**](/azure/templates/microsoft.network/virtualnetworks): create an Azure virtual network.
421-
- [**Microsoft.Network/bastionHosts**](/azure/templates/microsoft.network/bastionHosts): create a Standard SKU Bastion with a public IP and Kerberos feature enabled
422-
- Create a Windows 10 ClientVM and a Windows Server 2019 ServerVM
423-
- Have the DNS Server of the VNET point to the private IP address of the ServerVM (domain controller).
424+
- [**Microsoft.Network/bastionHosts**](/azure/templates/microsoft.network/bastionHosts): create a Standard SKU Bastion with a public IP and Kerberos feature enabled.
425+
- Create a Windows 10 ClientVM and a Windows Server 2019 ServerVM.
426+
- Have the DNS Server of the VNet point to the private IP address of the ServerVM (domain controller).
424427
- Runs a Custom Script Extension on the ServerVM to promote it to a domain controller with domain name: `bastionkrb.test`.
425428
- Runs a Custom Script Extension on the ClientVM to have it:
426429
- **Restrict NTLM: Incoming NTLM traffic** = Deny all domain accounts (this is to ensure Kerberos is used for authentication).
427430
- Domain-join the `bastionkrb.test` domain.
428431

429432
## Deploy the template
430-
To setup Kerberos, deploy the ARM template above by running the following PS cmd:
433+
To set up Kerberos, deploy the preceding ARM template by running the following PowerShell cmd:
431434
```
432435
New-AzResourceGroupDeployment -ResourceGroupName <your-rg-name> -TemplateFile "<path-to-template>\KerberosDeployment.json"`
433436
```
434437
## Review deployed resources
435-
Now, login to ClientVM using Bastion with Kerberos authentication:
438+
Now, sign in to ClientVM using Bastion with Kerberos authentication:
436439
- credentials: username = `[email protected]` and password = `<password-entered-during-deployment>`.
437440

438441

0 commit comments

Comments
 (0)