You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/bastion/kerberos-authentication-portal.md
+27-25Lines changed: 27 additions & 25 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,11 +1,11 @@
1
1
---
2
-
title: 'Configure Bastion for Kerberos authentication: Azure portal'
2
+
title: Configure Bastion for Kerberos authentication - Azure portal
3
3
titleSuffix: Azure Bastion
4
4
description: Learn how to configure Bastion to use Kerberos authentication via the Azure portal.
5
5
author: cherylmc
6
6
ms.service: azure-bastion
7
7
ms.topic: how-to
8
-
ms.date: 09/14/2023
8
+
ms.date: 12/09/2024
9
9
ms.author: cherylmc
10
10
11
11
---
@@ -17,37 +17,32 @@ This article shows you how to configure Azure Bastion to use Kerberos authentica
17
17
## Considerations
18
18
19
19
* The Kerberos setting for Azure Bastion can be configured in the Azure portal only and not with native client.
20
-
* VMs migrated from on-premises to Azure aren't currently supported for Kerberos.
20
+
* VMs migrated from on-premises to Azure aren't currently supported for Kerberos.
21
21
* Cross-realm authentication isn't currently supported for Kerberos.
22
-
* The Domain controller must be an Azure Hosted VM within the same VNET that bastion is deployed.
23
-
* Changes to DNS servers do not propagate to Bastion. Bastion re-deployment is needed for DNS info to properly propagate. After making any changes to DNS server, you'll need to delete and re-create the Bastion resource.
24
-
* If additional DC (domain controllers) are added, Bastion will only recognize the first DC.
25
-
* If additional DCs are added for different domains, the added domains can't successfully authenticate with Kerberos.
22
+
* The Domain controller must be an Azure Hosted VM within the same virtual network that bastion is deployed.
23
+
* Changes to DNS servers don't propagate to Bastion. Bastion redeployment is needed for DNS info to properly propagate. After making any changes to DNS server, you'll need to delete and re-create the Bastion resource.
24
+
* If more DCs (domain controllers) are added, Bastion will only recognize the first DC.
25
+
* If more DCs are added for different domains, the added domains can't successfully authenticate with Kerberos.
26
26
27
27
## Prerequisites
28
28
29
29
* An Azure account with an active subscription. If you don't have one, [create one for free](https://azure.microsoft.com/free/?ref=microsoft.com&utm_source=microsoft.com&utm_medium=docs&utm_campaign=visualstudio). To be able to connect to a VM through your browser using Bastion, you must be able to sign in to the Azure portal.
30
30
31
-
* An Azure virtual network. For steps to create a VNet, see [Quickstart: Create a virtual network](../virtual-network/quick-create-portal.md).
31
+
* An Azure virtual network. For steps to create a virtual network, see [Quickstart: Create a virtual network](../virtual-network/quick-create-portal.md).
32
32
33
33
## Update VNet DNS servers
34
34
35
35
In this section, the following steps help you update your virtual network to specify custom DNS settings.
36
36
37
37
1. Sign in to the [Azure portal](https://portal.azure.com).
38
38
1. Go to the virtual network for which you want to deploy the Bastion resources.
39
-
1. Go to the **DNS servers** page for your VNet and select **Custom**. Add the IP address of your Azure-hosted domain controller and **Save**.
39
+
1. Go to the **DNS servers** page for your virtual network and select **Custom**. Add the IP address of your Azure-hosted domain controller and **Save**.
40
40
41
41
## Deploy Bastion
42
42
43
43
1. Begin configuring your bastion deployment using the steps in [Tutorial: Deploy Bastion using manual configuration settings](tutorial-create-host-portal.md). Configure the settings on the **Basics** tab. Then, at the top of the page, click **Advanced** to go to the Advanced tab.
44
-
45
44
1. On the **Advanced** tab, select **Kerberos**.
46
-
47
-
:::image type="content" source="./media/kerberos-authentication-portal/select-kerberos.png" alt-text="Screenshot of select bastion features." lightbox="./media/kerberos-authentication-portal/select-kerberos.png":::
48
-
49
45
1. At the bottom of the page, select **Review + create**, then **Create** to deploy Bastion to your virtual network.
50
-
51
46
1. Once the deployment completes, you can use it to sign in to any reachable Windows VMs joined to the custom DNS you specified in the earlier steps.
52
47
53
48
## To modify an existing Bastion deployment
@@ -420,25 +415,32 @@ Once you have enabled Kerberos on your Bastion resource, you can verify that it'
420
415
```
421
416
422
417
The following resources have been defined in the template:
423
-
- Deploys the following Azure resources:
424
-
-[**Microsoft.Network/virtualNetworks**](/azure/templates/microsoft.network/virtualnetworks): create an Azure virtual network.
425
-
-[**Microsoft.Network/bastionHosts**](/azure/templates/microsoft.network/bastionHosts): create a Standard SKU Bastion with a public IP and Kerberos feature enabled.
426
-
- Create a Windows 10 ClientVM and a Windows Server 2019 ServerVM.
427
-
- Have the DNS Server of the VNet point to the private IP address of the ServerVM (domain controller).
428
-
- Runs a Custom Script Extension on the ServerVM to promote it to a domain controller with domain name: `bastionkrb.test`.
429
-
- Runs a Custom Script Extension on the ClientVM to have it:
430
-
-**Restrict NTLM: Incoming NTLM traffic** = Deny all domain accounts (this is to ensure Kerberos is used for authentication).
431
-
- Domain-join the `bastionkrb.test` domain.
418
+
419
+
* Deploys the following Azure resources:
420
+
*[**Microsoft.Network/virtualNetworks**](/azure/templates/microsoft.network/virtualnetworks): create an Azure virtual network.
421
+
*[**Microsoft.Network/bastionHosts**](/azure/templates/microsoft.network/bastionHosts): create a Standard SKU Bastion with a public IP and Kerberos feature enabled.
422
+
* Create a Windows 10 ClientVM and a Windows Server 2019 ServerVM.
423
+
424
+
* Have the DNS Server of the virtual network point to the private IP address of the ServerVM (domain controller).
425
+
* Runs a Custom Script Extension on the ServerVM to promote it to a domain controller with domain name: `bastionkrb.test`.
426
+
* Runs a Custom Script Extension on the ClientVM to have it:
427
+
428
+
***Restrict NTLM: Incoming NTLM traffic** = Deny all domain accounts (this is to ensure Kerberos is used for authentication).
429
+
* Domain-join the `bastionkrb.test` domain.
432
430
433
431
## Deploy the template
434
-
To set up Kerberos, deploy the preceding ARM template by running the following PowerShell cmd:
432
+
433
+
To set up Kerberos, deploy the preceding ARM template by running the following PowerShell cmd:
0 commit comments