You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/bastion/kerberos-authentication-portal.md
+16-13Lines changed: 16 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ description: Learn how to configure Bastion to use Kerberos authentication via t
5
5
author: cherylmc
6
6
ms.service: bastion
7
7
ms.topic: how-to
8
-
ms.date: 06/12/2023
8
+
ms.date: 09/14/2023
9
9
ms.author: cherylmc
10
10
11
11
---
@@ -17,11 +17,11 @@ This article shows you how to configure Azure Bastion to use Kerberos authentica
17
17
## Considerations
18
18
19
19
* The Kerberos setting for Azure Bastion can be configured in the Azure portal only and not with native client.
20
-
* VMs migrated from on-premises to Azure are not currently supported for Kerberos.
21
-
* Cross-realm authentication is not currently supported for Kerberos.
22
-
* Changes to DNS server are not currently supported for Kerberos. After making any changes to DNS server, you will need to delete and re-create the Bastion resource.
20
+
* VMs migrated from on-premises to Azure aren't currently supported for Kerberos.
21
+
* Cross-realm authentication isn't currently supported for Kerberos.
22
+
* Changes to DNS server aren't currently supported for Kerberos. After making any changes to DNS server, you'll need to delete and re-create the Bastion resource.
23
23
* If additional DC (domain controllers) are added, Bastion will only recognize the first DC.
24
-
* If additional DCs are added for different domains, the added domains cannot successfully authenticate with Kerberos.
24
+
* If additional DCs are added for different domains, the added domains can't successfully authenticate with Kerberos.
25
25
26
26
## Prerequisites
27
27
@@ -56,11 +56,11 @@ In this section, the following steps help you modify your virtual network and ex
56
56
1.[Update the DNS settings](#update-vnet-dns-servers) for your virtual network.
57
57
1. Go to the portal page for your Bastion deployment and select **Configuration**.
58
58
1. On the Configuration page, select **Kerberos authentication**, then select **Apply**.
59
-
1. Bastion will update with the new configuration settings.
59
+
1. Bastion updates with the new configuration settings.
60
60
61
61
## To verify Bastion is using Kerberos
62
62
63
-
> [!NOTE]
63
+
> [!NOTE]
64
64
> You must use the User Principal Name (UPN) to sign in using Kerberos.
65
65
66
66
Once you have enabled Kerberos on your Bastion resource, you can verify that it's actually using Kerberos for authentication to the target domain-joined VM.
@@ -71,7 +71,10 @@ Once you have enabled Kerberos on your Bastion resource, you can verify that it'
71
71
1. End the VM session.
72
72
1. Connect to the target VM again using Bastion. Sign-in should succeed, indicating that Bastion used Kerberos (and not NTLM) for authentication.
73
73
74
-
## Quickstart: Setup Bastion with Kerberos - Resource Manager template
74
+
> [!NOTE]
75
+
> To prevent failback to NTLM, make sure you follow the preceding steps. Enabling Kerberos (without following the procedure) won't prevent failback to NTLM.
76
+
77
+
## Quickstart: Set up Bastion with Kerberos - Resource Manager template
75
78
76
79
### Review the template
77
80
@@ -418,21 +421,21 @@ Once you have enabled Kerberos on your Bastion resource, you can verify that it'
418
421
The following resources have been defined in the template:
419
422
- Deploys the following Azure resources:
420
423
-[**Microsoft.Network/virtualNetworks**](/azure/templates/microsoft.network/virtualnetworks): create an Azure virtual network.
421
-
-[**Microsoft.Network/bastionHosts**](/azure/templates/microsoft.network/bastionHosts): create a Standard SKU Bastion with a public IP and Kerberos feature enabled
422
-
- Create a Windows 10 ClientVM and a Windows Server 2019 ServerVM
423
-
- Have the DNS Server of the VNET point to the private IP address of the ServerVM (domain controller).
424
+
-[**Microsoft.Network/bastionHosts**](/azure/templates/microsoft.network/bastionHosts): create a Standard SKU Bastion with a public IP and Kerberos feature enabled.
425
+
- Create a Windows 10 ClientVM and a Windows Server 2019 ServerVM.
426
+
- Have the DNS Server of the VNet point to the private IP address of the ServerVM (domain controller).
424
427
- Runs a Custom Script Extension on the ServerVM to promote it to a domain controller with domain name: `bastionkrb.test`.
425
428
- Runs a Custom Script Extension on the ClientVM to have it:
426
429
-**Restrict NTLM: Incoming NTLM traffic** = Deny all domain accounts (this is to ensure Kerberos is used for authentication).
427
430
- Domain-join the `bastionkrb.test` domain.
428
431
429
432
## Deploy the template
430
-
To setup Kerberos, deploy the ARM template above by running the following PS cmd:
433
+
To set up Kerberos, deploy the preceding ARM template by running the following PowerShell cmd:
0 commit comments