Skip to content

Commit 49dbf02

Browse files
authored
Merge pull request #291743 from cherylmc/images3
freshness update
2 parents 55a7af5 + 69fe7ff commit 49dbf02

File tree

2 files changed

+27
-25
lines changed

2 files changed

+27
-25
lines changed

articles/bastion/kerberos-authentication-portal.md

Lines changed: 27 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
11
---
2-
title: 'Configure Bastion for Kerberos authentication: Azure portal'
2+
title: Configure Bastion for Kerberos authentication - Azure portal
33
titleSuffix: Azure Bastion
44
description: Learn how to configure Bastion to use Kerberos authentication via the Azure portal.
55
author: cherylmc
66
ms.service: azure-bastion
77
ms.topic: how-to
8-
ms.date: 09/14/2023
8+
ms.date: 12/09/2024
99
ms.author: cherylmc
1010

1111
---
@@ -17,37 +17,32 @@ This article shows you how to configure Azure Bastion to use Kerberos authentica
1717
## Considerations
1818

1919
* The Kerberos setting for Azure Bastion can be configured in the Azure portal only and not with native client.
20-
* VMs migrated from on-premises to Azure aren't currently supported for Kerberos. 
20+
* VMs migrated from on-premises to Azure aren't currently supported for Kerberos.
2121
* Cross-realm authentication isn't currently supported for Kerberos.
22-
* The Domain controller must be an Azure Hosted VM within the same VNET that bastion is deployed.
23-
* Changes to DNS servers do not propagate to Bastion. Bastion re-deployment is needed for DNS info to properly propagate. After making any changes to DNS server, you'll need to delete and re-create the Bastion resource.
24-
* If additional DC (domain controllers) are added, Bastion will only recognize the first DC.
25-
* If additional DCs are added for different domains, the added domains can't successfully authenticate with Kerberos.
22+
* The Domain controller must be an Azure Hosted VM within the same virtual network that bastion is deployed.
23+
* Changes to DNS servers don't propagate to Bastion. Bastion redeployment is needed for DNS info to properly propagate. After making any changes to DNS server, you'll need to delete and re-create the Bastion resource.
24+
* If more DCs (domain controllers) are added, Bastion will only recognize the first DC.
25+
* If more DCs are added for different domains, the added domains can't successfully authenticate with Kerberos.
2626

2727
## Prerequisites
2828

2929
* An Azure account with an active subscription. If you don't have one, [create one for free](https://azure.microsoft.com/free/?ref=microsoft.com&utm_source=microsoft.com&utm_medium=docs&utm_campaign=visualstudio). To be able to connect to a VM through your browser using Bastion, you must be able to sign in to the Azure portal.
3030

31-
* An Azure virtual network. For steps to create a VNet, see [Quickstart: Create a virtual network](../virtual-network/quick-create-portal.md).
31+
* An Azure virtual network. For steps to create a virtual network, see [Quickstart: Create a virtual network](../virtual-network/quick-create-portal.md).
3232

3333
## Update VNet DNS servers
3434

3535
In this section, the following steps help you update your virtual network to specify custom DNS settings.
3636

3737
1. Sign in to the [Azure portal](https://portal.azure.com).
3838
1. Go to the virtual network for which you want to deploy the Bastion resources.
39-
1. Go to the **DNS servers** page for your VNet and select **Custom**. Add the IP address of your Azure-hosted domain controller and **Save**.
39+
1. Go to the **DNS servers** page for your virtual network and select **Custom**. Add the IP address of your Azure-hosted domain controller and **Save**.
4040

4141
## Deploy Bastion
4242

4343
1. Begin configuring your bastion deployment using the steps in [Tutorial: Deploy Bastion using manual configuration settings](tutorial-create-host-portal.md). Configure the settings on the **Basics** tab. Then, at the top of the page, click **Advanced** to go to the Advanced tab.
44-
4544
1. On the **Advanced** tab, select **Kerberos**.
46-
47-
:::image type="content" source="./media/kerberos-authentication-portal/select-kerberos.png" alt-text="Screenshot of select bastion features." lightbox="./media/kerberos-authentication-portal/select-kerberos.png":::
48-
4945
1. At the bottom of the page, select **Review + create**, then **Create** to deploy Bastion to your virtual network.
50-
5146
1. Once the deployment completes, you can use it to sign in to any reachable Windows VMs joined to the custom DNS you specified in the earlier steps.
5247

5348
## To modify an existing Bastion deployment
@@ -420,25 +415,32 @@ Once you have enabled Kerberos on your Bastion resource, you can verify that it'
420415
```
421416

422417
The following resources have been defined in the template:
423-
- Deploys the following Azure resources:
424-
- [**Microsoft.Network/virtualNetworks**](/azure/templates/microsoft.network/virtualnetworks): create an Azure virtual network.
425-
- [**Microsoft.Network/bastionHosts**](/azure/templates/microsoft.network/bastionHosts): create a Standard SKU Bastion with a public IP and Kerberos feature enabled.
426-
- Create a Windows 10 ClientVM and a Windows Server 2019 ServerVM.
427-
- Have the DNS Server of the VNet point to the private IP address of the ServerVM (domain controller).
428-
- Runs a Custom Script Extension on the ServerVM to promote it to a domain controller with domain name: `bastionkrb.test`.
429-
- Runs a Custom Script Extension on the ClientVM to have it:
430-
- **Restrict NTLM: Incoming NTLM traffic** = Deny all domain accounts (this is to ensure Kerberos is used for authentication).
431-
- Domain-join the `bastionkrb.test` domain.
418+
419+
* Deploys the following Azure resources:
420+
* [**Microsoft.Network/virtualNetworks**](/azure/templates/microsoft.network/virtualnetworks): create an Azure virtual network.
421+
* [**Microsoft.Network/bastionHosts**](/azure/templates/microsoft.network/bastionHosts): create a Standard SKU Bastion with a public IP and Kerberos feature enabled.
422+
* Create a Windows 10 ClientVM and a Windows Server 2019 ServerVM.
423+
424+
* Have the DNS Server of the virtual network point to the private IP address of the ServerVM (domain controller).
425+
* Runs a Custom Script Extension on the ServerVM to promote it to a domain controller with domain name: `bastionkrb.test`.
426+
* Runs a Custom Script Extension on the ClientVM to have it:
427+
428+
* **Restrict NTLM: Incoming NTLM traffic** = Deny all domain accounts (this is to ensure Kerberos is used for authentication).
429+
* Domain-join the `bastionkrb.test` domain.
432430

433431
## Deploy the template
434-
To set up Kerberos, deploy the preceding ARM template by running the following PowerShell cmd:
432+
433+
To set up Kerberos, deploy the preceding ARM template by running the following PowerShell cmd:
434+
435435
```
436436
New-AzResourceGroupDeployment -ResourceGroupName <your-rg-name> -TemplateFile "<path-to-template>\KerberosDeployment.json"`
437437
```
438+
438439
## Review deployed resources
440+
439441
Now, sign in to ClientVM using Bastion with Kerberos authentication:
440-
- credentials: username = `[email protected]` and password = `<password-entered-during-deployment>`.
441442

443+
- credentials: username = `[email protected]` and password = `<password-entered-during-deployment>`.
442444

443445
## Next steps
444446

Binary file not shown.

0 commit comments

Comments
 (0)