You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/howto-saml-token-encryption.md
+2-7Lines changed: 2 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,12 +13,12 @@ ms.workload: identity
13
13
ms.tgt_pltfrm: na
14
14
ms.devlang: na
15
15
ms.topic: conceptual
16
-
ms.date: 02/06/2019
16
+
ms.date: 03/13/2020
17
17
ms.author: mimart
18
18
ms.reviewer: paulgarn
19
19
ms.collection: M365-identity-device-management
20
20
---
21
-
# How to: Configure Azure AD SAML token encryption (Preview)
21
+
# How to: Configure Azure AD SAML token encryption
22
22
23
23
> [!NOTE]
24
24
> Token encryption is an Azure Active Directory (Azure AD) premium feature. To learn more about Azure AD editions, features, and pricing, see [Azure AD pricing](https://azure.microsoft.com/pricing/details/active-directory/).
@@ -118,9 +118,6 @@ When you configure a keyCredential using Graph, PowerShell, or in the applicatio
118
118
119
119
### To configure token encryption using PowerShell
120
120
121
-
This functionality is coming soon.
122
-
123
-
<!--
124
121
1. Use the latest Azure AD PowerShell module to connect to your tenant.
125
122
126
123
1. Set the token encryption settings using the **[Set-AzureApplication](https://docs.microsoft.com/powershell/module/azuread/set-azureadapplication?view=azureadps-2.0-preview)** command.
@@ -137,8 +134,6 @@ This functionality is coming soon.
137
134
$app.TokenEncryptionKeyId
138
135
```
139
136
140
-
-->
141
-
142
137
### To configure token encryption using the application manifest
143
138
144
139
1. From the Azure portal, go to **Azure Active Directory > App registrations**.
When you create a function app, supply a valid **App name**, which can contain only letters, numbers, and hyphens. Underscore (**_**) is not an allowed character.
18
-
19
-
Storage account names must be between 3 and 24 characters in length and may contain numbers and lowercase letters only. Your storage account name must be unique within Azure.
20
-
21
17
After the function app is created, you can create individual functions in one or more different languages. Create functions [by using the portal](functions-create-first-azure-function.md#create-function), [continuous deployment](functions-continuous-deployment.md), or by [uploading with FTP](https://github.com/projectkudu/kudu/wiki/Accessing-files-via-ftp).
Copy file name to clipboardExpand all lines: articles/bastion/bastion-create-host-portal.md
+6-26Lines changed: 6 additions & 26 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
-
title: 'Create an Azure Bastion host | Microsoft Docs'
3
-
description: In this article, learn how to create an Azure Bastion host
2
+
title: 'Create an Azure Bastion host: portal'
3
+
description: In this article, learn how to create an Azure Bastion host using the portal
4
4
services: bastion
5
5
author: cherylmc
6
6
@@ -12,19 +12,19 @@ ms.author: cherylmc
12
12
13
13
---
14
14
15
-
# Create an Azure Bastion host
15
+
# Create an Azure Bastion host using the portal
16
16
17
17
This article shows you how to create an Azure Bastion host using the Azure portal. Once you provision the Azure Bastion service in your virtual network, the seamless RDP/SSH experience is available to all of the VMs in the same virtual network. Azure Bastion deployment is per virtual network, not per subscription/account or virtual machine.
18
18
19
-
You can create a new bastion host resource in the portal either by specifying all of the settings manually, or by using the settings that correspond to an existing VM. Optionally, you can use [Azure Powershell](bastion-create-host-powershell.md) to create an Azure Bastion host.
19
+
You can create a new bastion host resource in the portal either by specifying all of the settings manually, or by using the settings that correspond to an existing VM. To create a bastion host by using VM settings, see the [quickstart](quickstart-host-portal.md) article. Optionally, you can use [Azure PowerShell](bastion-create-host-powershell.md) to create an Azure Bastion host.
20
20
21
21
## Before you begin
22
22
23
23
Bastion is available in the following Azure public regions:
## <aname="createhost"></a>Create a bastion host - specify settings
27
+
## <aname="createhost"></a>Create a bastion host
28
28
29
29
This section helps you create a new Azure Bastion resource from the Azure portal.
30
30
@@ -41,7 +41,7 @@ This section helps you create a new Azure Bastion resource from the Azure portal
41
41

42
42
43
43
***Subscription**: The Azure subscription you want to use to create a new Bastion resource.
44
-
***Resource Group**: The Azure resource group in which the new Bastion resource will be created in. If you don’t have an existing resource group, you can create a new one.
44
+
***Resource Group**: The Azure resource group in which the new Bastion resource will be created in. If you don't have an existing resource group, you can create a new one.
45
45
***Name**: The name of the new Bastion resource
46
46
***Region**: The Azure public region that the resource will be created in.
47
47
***Virtual network**: The virtual network in which the Bastion resource will be created in. You can create a new virtual network in the portal during this process, or use an existing virtual network. If you are using an existing virtual network, make sure the existing virtual network has enough free address space to accommodate the Bastion subnet requirements.
@@ -57,26 +57,6 @@ This section helps you create a new Azure Bastion resource from the Azure portal
57
57
1. On the **Create a bastion** page, click **Create**.
58
58
1. You will see a message letting you know that your deployment is underway. Status will display on this page as the resources are created. It takes about 5 minutes for the Bastion resource to be created and deployed.
59
59
60
-
## <aname="createvmset"></a>Create a bastion host - use VM settings
61
-
62
-
If you create a bastion host in the portal by using an existing VM, various settings will automatically default to correspond to your virtual machine and/or virtual network.
63
-
64
-
1. Open the [Azure portal](https://portal.azure.com). Go to your virtual machine, then click **Connect**.
1. On the Bastion page, fill out the following settings fields:
71
-
72
-
***Name**: The name of the bastion host you want to create.
73
-
***Subnet**: The subnet inside your virtual network to which Bastion resource will be deployed. The subnet must be created with the name **AzureBastionSubnet**. This lets Azure know which subnet to deploy the Bastion resource to. This is different than a Gateway subnet. You must use a subnet of at least /27 or larger (/27, /26, and so on). Create the subnet without any Network Security Groups, route tables, or delegations. If you later choose to use Network Security Groups on the **AzureBastionSubnet**, see [Work with NSGs](bastion-nsg.md).
74
-
75
-
Click **Manage subnet configuration** to create the **AzureBastionSubnet**. Click **Create** to create the subnet, then proceed with the next settings.
76
-
***Public IP address**: The public IP of the Bastion resource on which RDP/SSH will be accessed (over port 443). Create a new public IP, or use an existing one. The public IP address must be in the same region as the Bastion resource you are creating.
77
-
***Public IP address name**: The name of the public IP address resource.
78
-
1. On the validation screen, click **Create**. Wait for about 5 minutes for the Bastion resource create and deploy.
79
-
80
60
## Next steps
81
61
82
62
* Read the [Bastion FAQ](bastion-faq.md) for additional information.
Copy file name to clipboardExpand all lines: articles/vpn-gateway/vpn-gateway-howto-always-on-device-tunnel.md
+7-139Lines changed: 7 additions & 139 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,155 +7,23 @@ author: cherylmc
7
7
8
8
ms.service: vpn-gateway
9
9
ms.topic: conceptual
10
-
ms.date: 12/11/2019
10
+
ms.date: 03/12/2020
11
11
ms.author: cherylmc
12
12
13
13
---
14
14
# Configure an Always On VPN device tunnel
15
15
16
-
One of the new features of the Windows 10 Virtual Private Network (VPN) client is the ability to maintain a VPN connection. Always On is a Windows 10 feature that enables the active VPN profile to connect automatically and remain connected based on triggers — namely, user sign-in, network state change, or device screen active.
Azure virtual network gateways can be used with Windows 10 Always On to establish persistent user tunnels as well as device tunnels to Azure. This article will help you configure an Always ON VPN device tunnel.
18
+
## Configure the gateway
19
19
20
-
Always On VPN connections include two types of tunnels:
20
+
Configure the VPN gateway to use IKEv2 and certificate-based authentication using the [Configure a Point-to-Site VPN connection](vpn-gateway-howto-point-to-site-resource-manager-portal.md) article.
21
21
22
-
***Device tunnel** connects to specified VPN servers before users sign in the device. Pre-login connectivity scenarios and device management purposes use device tunnel.
22
+
## Configure the devicetunnel
23
23
24
-
***User tunnel** connects only after a user sign in the device. User tunnel allows users to access organization resources through VPN servers.
Both Device tunnel and User tunnel operate independently with their VPN profiles. They can be connected at the same time, and can use different authentication methods and other VPN configuration settings as appropriate.
27
-
28
-
## 1. Configure the gateway
29
-
30
-
Configure the VPN gateway to use IKEv2 and certificate-based authentication using this [point-to-site article](vpn-gateway-howto-point-to-site-resource-manager-portal.md).
31
-
32
-
## 2. Configure the device tunnel
33
-
34
-
The following requirements must be met in order to successfully establish a device tunnel:
35
-
36
-
* The device must be a domain joined computer running Windows 10 Enterprise or Education version 1809 or later.
37
-
* The tunnel is only configurable for the Windows built-in VPN solution and is established using IKEv2 with computer certificate authentication.
38
-
* Only one device tunnel can be configured per device.
39
-
40
-
1. Install client certificates on the Windows 10 client as shown in this [point-to-site VPN client article](point-to-site-how-to-vpn-client-install-azure-cert.md). The certificate needs to be in the Local Machine store.
41
-
1. Use [these instructions](https://docs.microsoft.com/windows-server/remote/remote-access/vpn/vpn-device-tunnel-config#vpn-device-tunnel-configuration) to create a VPN Profile and configure device tunnel in the context of the LOCAL SYSTEM account.
42
-
43
-
### Configuration example for device tunnel
44
-
45
-
After you have configured the virtual network gateway and installed the client certificate in the Local Machine store on the Windows 10 client, use the following examples to configure a client device tunnel.
46
-
47
-
1. Copy the following text and save it as ***devicecert.ps1***.
$Message = "Unable to create $ProfileName profile: $_"
93
-
Write-Host "$Message"
94
-
exit
95
-
}
96
-
$Message = "Complete."
97
-
Write-Host "$Message"
98
-
```
99
-
1. Copy the following text and save it as ***VPNProfile.xml*** in the same folder as **devicecert.ps1**. Edit the following text to match your environment.
100
-
101
-
*`<Servers>azuregateway-1234-56-78dc.cloudapp.net</Servers> <= Can be found in the VpnSettings.xml in the downloaded profile zip file`
102
-
*`<Address>192.168.3.5</Address> <= IP of resource in the vnet or the vnet address space`
103
-
*`<Address>192.168.3.4</Address> <= IP of resource in the vnet or the vnet address space`
0 commit comments