Skip to content

Commit 2d6d764

Browse files
authored
Merge pull request #252355 from MicrosoftDocs/main
9/20 OOB publish
2 parents 75d5ccd + f2c67de commit 2d6d764

File tree

309 files changed

+8636
-6647
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

309 files changed

+8636
-6647
lines changed

articles/active-directory/app-proxy/app-proxy-protect-ndes.md

Lines changed: 17 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Integrate with Azure Active Directory Application Proxy on an NDES server
3-
description: Guidance on deploying an Azure Active Directory Application Proxy to protect your NDES server.
2+
title: Integrate with Microsoft Entra application proxy on an NDES server
3+
description: Guidance on deploying a Microsoft Entra application proxy to protect your NDES server.
44
services: active-directory
55
author: kenwith
66
manager: amycolannino
@@ -12,17 +12,17 @@ ms.date: 09/13/2023
1212
ms.author: kenwith
1313
---
1414

15-
# Integrate with Azure Active Directory Application Proxy on a Network Device Enrollment Service (NDES) server
15+
# Integrate with Microsoft Entra application proxy on a Network Device Enrollment Service (NDES) server
1616

17-
Azure Active Directory (AD) Application Proxy lets you publish applications inside your network. These applications are ones such as SharePoint sites, Microsoft Outlook Web App, and other web applications. It also provides secure access to users outside your network via Azure.
17+
Microsoft Entra application proxy lets you publish applications inside your network. These applications are ones such as SharePoint sites, Microsoft Outlook Web App, and other web applications. It also provides secure access to users outside your network via Azure.
1818

19-
If you're new to Azure AD Application Proxy and want to learn more, see [Remote access to on-premises applications through Azure AD Application Proxy](application-proxy.md).
19+
If you're new to Microsoft Entra application proxy and want to learn more, see [Remote access to on-premises applications through Microsoft Entra application proxy](application-proxy.md).
2020

21-
Azure AD Application Proxy is built on Azure. It gives you a massive amount of network bandwidth and server infrastructure for better protection against distributed denial-of-service (DDOS) attacks and superb availability. Furthermore, there's no need to open external firewall ports to your on-premises network and no DMZ server is required. All traffic is originated inbound. For a complete list of outbound ports, see [Tutorial: Add an on-premises application for remote access through Application Proxy in Azure Active Directory](./application-proxy-add-on-premises-application.md#prepare-your-on-premises-environment).
21+
Microsoft Entra application proxy is built on Azure. It gives you a massive amount of network bandwidth and server infrastructure for better protection against distributed denial-of-service (DDOS) attacks and superb availability. Furthermore, there's no need to open external firewall ports to your on-premises network and no DMZ server is required. All traffic is originated inbound. For a complete list of outbound ports, see [Tutorial: Add an on-premises application for remote access through Application Proxy in Microsoft Entra ID](./application-proxy-add-on-premises-application.md#prepare-your-on-premises-environment).
2222

23-
> Azure AD Application Proxy is a feature that is available only if you are using the Premium or Basic editions of Azure Active Directory. For more information, see [Azure Active Directory pricing](https://www.microsoft.com/security/business/identity-access-management/azure-ad-pricing).
23+
> Microsoft Entra application proxy is a feature that is available only if you are using the Premium or Basic editions of Microsoft Entra ID. For more information, see [Microsoft Entra pricing](https://www.microsoft.com/security/business/identity-access-management/azure-ad-pricing).
2424
> If you have Enterprise Mobility Suite (EMS) licenses, you are eligible to use this solution.
25-
> The Azure AD Application Proxy connector only installs on Windows Server 2012 R2 or later. This is also a requirement of the NDES server.
25+
> The Microsoft Entra application proxy connector only installs on Windows Server 2012 R2 or later. This is also a requirement of the NDES server.
2626
2727
## Install and register the connector on the NDES server
2828

@@ -36,26 +36,26 @@ Azure AD Application Proxy is built on Azure. It gives you a massive amount of n
3636
![Download connector service to see the Terms of Service](./media/app-proxy-protect-ndes/application-proxy-download-connector-service.png)
3737

3838
1. Read the Terms of Service. When you're ready, select **Accept terms & Download**.
39-
1. Copy the Azure AD Application Proxy connector setup file to your NDES server.
39+
1. Copy the Microsoft Entra application proxy connector setup file to your NDES server.
4040
> You can install the connector on any server within your corporate network with access to NDES. You don't have to install it on the NDES server itself.
4141
1. Run the setup file, such as *AADApplicationProxyConnectorInstaller.exe*. Accept the software license terms.
42-
1. During the install, you're prompted to register the connector with the Application Proxy in your Azure AD directory.
43-
* Provide the credentials for a global or application administrator in your Azure AD directory. The Azure AD global or application administrator credentials may be different from your Azure credentials in the portal.
42+
1. During the install, you're prompted to register the connector with the Application Proxy in your Microsoft Entra directory.
43+
* Provide the credentials for a global or application administrator in your Microsoft Entra directory. The Microsoft Entra global or application administrator credentials may be different from your Azure credentials in the portal.
4444

4545
> [!NOTE]
4646
> The global or application administrator account used to register the connector must belong to the same directory where you enable the Application Proxy service.
4747
>
48-
> For example, if the Azure AD domain is *contoso.com*, the global/application administrator should be `[email protected]` or another valid alias on that domain.
48+
> For example, if the Microsoft Entra domain is *contoso.com*, the global/application administrator should be `[email protected]` or another valid alias on that domain.
4949
5050
* If Internet Explorer Enhanced Security Configuration is turned on for the server where you install the connector, the registration screen might be blocked. To allow access, follow the instructions in the error message, or turn off Internet Explorer Enhanced Security during the install process.
5151
* If connector registration fails, see [Troubleshoot Application Proxy](application-proxy-troubleshoot.md).
52-
1. At the end of the setup, a note is shown for environments with an outbound proxy. To configure the Azure AD Application Proxy connector to work through the outbound proxy, run the provided script, such as `C:\Program Files\Microsoft AAD App Proxy connector\ConfigureOutBoundProxy.ps1`.
52+
1. At the end of the setup, a note is shown for environments with an outbound proxy. To configure the Microsoft Entra application proxy connector to work through the outbound proxy, run the provided script, such as `C:\Program Files\Microsoft AAD App Proxy connector\ConfigureOutBoundProxy.ps1`.
5353
1. On the Application proxy page in the Microsoft Entra admin center, the new connector is listed with a status of *Active*, as shown in the following example:
5454

55-
![The new Azure AD Application Proxy connector shown as active in the Microsoft Entra admin center](./media/app-proxy-protect-ndes/connected-app-proxy.png)
55+
![The new Microsoft Entra application proxy connector shown as active in the Microsoft Entra admin center](./media/app-proxy-protect-ndes/connected-app-proxy.png)
5656

5757
> [!NOTE]
58-
> To provide high availability for applications authenticating through the Azure AD Application Proxy, you can install connectors on multiple VMs. Repeat the same steps listed in the previous section to install the connector on other servers joined to the Azure AD DS managed domain.
58+
> To provide high availability for applications authenticating through the Microsoft Entra application proxy, you can install connectors on multiple VMs. Repeat the same steps listed in the previous section to install the connector on other servers joined to the Microsoft Entra DS managed domain.
5959
6060
1. After successful installation, go back to the Microsoft Entra admin center.
6161

@@ -74,7 +74,7 @@ Azure AD Application Proxy is built on Azure. It gives you a massive amount of n
7474

7575
1. Select **+Add** to save your application.
7676

77-
1. Test whether you can access your NDES server via the Azure AD Application proxy by pasting the link you copied in step 15 into a browser. You should see a default IIS welcome page.
77+
1. Test whether you can access your NDES server via the Microsoft Entra application proxy by pasting the link you copied in step 15 into a browser. You should see a default IIS welcome page.
7878
1. As a final test, add the *mscep.dll* path to the existing URL you pasted in the previous step:
7979
`https://scep-test93635307549127448334.msappproxy.net/certsrv/mscep/mscep.dll`
8080
1. You should see an **HTTP Error 403 – Forbidden** response.
@@ -84,4 +84,4 @@ Azure AD Application Proxy is built on Azure. It gives you a massive amount of n
8484

8585
## Next steps
8686

87-
With the Azure AD Application Proxy integrated with NDES, publish applications for users to access. For more information, see [publish applications using Azure AD Application Proxy](./application-proxy-add-on-premises-application.md).
87+
With the Microsoft Entra application proxy integrated with NDES, publish applications for users to access. For more information, see [publish applications using Microsoft Entra application proxy](./application-proxy-add-on-premises-application.md).

0 commit comments

Comments
 (0)