You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/virtual-wan/openvpn-azure-ad-mfa.md
+10-10Lines changed: 10 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,23 +12,23 @@ ms.author: alzam
12
12
---
13
13
# Enable Azure Multi-Factor Authentication (MFA) for VPN users
14
14
15
-
If you want users to be prompted for a second factor of authentication before granting access, you can configure Azure Multi-Factor Authentication (MFA) for your Azure AD tenant. The steps in this article help you enable a requirement for two-step verification.
Copy file name to clipboardExpand all lines: articles/vpn-gateway/openvpn-azure-ad-mfa.md
+10-27Lines changed: 10 additions & 27 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,47 +6,30 @@ author: anzaman
6
6
7
7
ms.service: vpn-gateway
8
8
ms.topic: conceptual
9
-
ms.date: 11/21/2019
9
+
ms.date: 02/14/2020
10
10
ms.author: alzam
11
11
12
12
---
13
13
# Enable Azure Multi-Factor Authentication (MFA) for VPN users
14
14
15
-
If you want users to be prompted for a second factor of authentication before granting access, you can configure Azure Multi-Factor Authentication (MFA) on a per user basis or leverage Multi-Factor Authentication (MFA) via [Conditional Access](../active-directory/conditional-access/overview.md) for more fine-grained control. Configuring Multi-Factor Authentication per user can be enabled at no-additional cost, however when enabling MFA per user, the user will be prompted for second factor authentication against all applications tied to the Azure AD tenant. Conditional Access will allow finer grain control over how a second factor should be promoted and can allow assignment of MFA to only VPN and not other applications tied to the Azure AD tenant.
Conditional Access allows for fine-grained access control on a per-application basis. Please note that to leverage Conditional Access, you should have Azure AD Premium 1 or greater licensing applied to the users that will be subject to the Conditional Access rules.
37
-
38
-
1. On the **Enterprise applications - All applications** page, select **Azure VPN**, select **Conditional Access**, and click **New policy**.
39
-
2. Under Users and groups, on the *Include* tab check **Select users and groups**, check **Users and groups**, and select a group or set of users that should be subject for MFA. Click **Done**.
3. Under **Grant**, check **Grant access**, check **Require multi-factor authentication**, check **Require all the selected controls**, and click the **Select** button.
To connect to your virtual network, you must create and configure a VPN client profile. See [Configure a VPN client for P2S VPN connections](openvpn-azure-ad-client.md).
35
+
To connect to your virtual network, you must create and configure a VPN client profile. See [Configure a VPN client for P2S VPN connections](openvpn-azure-ad-client.md).
# this file is used for both virtual wan and vpn gateway. When modifying, make sure that your changes work for both environments.
13
+
---
14
+
Conditional Access allows for fine-grained access control on a per-application basis. In order to use Conditional Access, you should have Azure AD Premium 1 or greater licensing applied to the users that will be subject to the Conditional Access rules.
15
+
16
+
1. Navigate to the **Enterprise applications - All applications** page and click **Azure VPN**.
17
+
18
+
- Click **Conditional Access**.
19
+
- Click **New policy** to open the **New** pane.
20
+
2. On the **New** pane, navigate to **Assignments -> Users and groups**. On the **Users and groups ->****Include** tab:
21
+
22
+
- Click **Select users and groups**.
23
+
- Check **Users and groups**.
24
+
- Click **Select** to select a group or set of users to be affected by MFA.
# this file is used for both virtual wan and vpn gateway. When modifying, make sure that your changes work for both environments.
13
+
---
14
+
15
+
If you want users to be prompted for a second factor of authentication before granting access, you can configure Azure Multi-Factor Authentication (MFA). You can configure MFA on a per user basis, or you can leverage MFA via [Conditional Access](../articles/active-directory/conditional-access/overview.md).
16
+
17
+
* MFA per user can be enabled at no-additional cost. When enabling MFA per user, the user will be prompted for second factor authentication against all applications tied to the Azure AD tenant. See [Option 1](#peruser) for steps.
18
+
* Conditional Access allows for finer-grained control over how a second factor should be promoted. It can allow assignment of MFA to only VPN, and exclude other applications tied to the Azure AD tenant. See [Option 2](#conditional) for steps.
0 commit comments