You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/vpn-gateway/openvpn-azure-ad-tenant.md
+13-12Lines changed: 13 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,17 +1,18 @@
1
1
---
2
-
title: 'Configure a P2S VPN gateway and Microsoft Entra tenant: Microsoft Entra authentication: OpenVPN'
2
+
title: 'Configure P2S VPN gateway for Microsoft Entra ID authentication'
3
3
titleSuffix: Azure VPN Gateway
4
4
description: Learn how to set up a Microsoft Entra tenant and P2S gateway for P2S Microsoft Entra authentication - OpenVPN protocol.
5
5
author: cherylmc
6
6
ms.service: vpn-gateway
7
7
ms.topic: how-to
8
-
ms.date: 03/22/2024
8
+
ms.date: 04/09/2024
9
9
ms.author: cherylmc
10
10
11
11
---
12
-
# Configure a P2S VPN gateway and Microsoft Entra tenant for Microsoft Entra authentication
13
12
14
-
This article helps you configure your AD tenant and P2S (point-to-site) VPN Gateway settings for Microsoft Entra authentication. For more information about point-to-site protocols and authentication, see [About VPN Gateway point-to-site VPN](point-to-site-about.md). To authenticate using the Microsoft Entra authentication type, you must include the OpenVPN tunnel type in your point-to-site configuration.
13
+
# Configure a P2S VPN gateway for Microsoft Entra ID authentication
14
+
15
+
This article helps you configure your Microsoft Entra tenant and point-to-site (P2S) VPN Gateway settings for Microsoft Entra ID authentication. For more information about point-to-site protocols and authentication, see [About VPN Gateway point-to-site VPN](point-to-site-about.md). To authenticate using Microsoft Entra ID authentication, you must include the OpenVPN tunnel type in your point-to-site configuration.
@@ -22,7 +23,7 @@ The steps in this article require a Microsoft Entra tenant. If you don't have a
22
23
* Organizational name
23
24
* Initial domain name
24
25
25
-
If you already have an existing P2S gateway, the steps in this article help you configure the gateway for Microsoft Entra authentication. You can also create a new VPN gateway that specifies Microsoft Entra authentication. The link to create a new gateway is included in this article.
26
+
If you already have an existing P2S gateway, the steps in this article help you configure the gateway for Microsoft Entra ID authentication. You can also create a new VPN gateway. The link to create a new gateway is included in this article.
26
27
27
28
<aname='create-azure-ad-tenant-users'></a>
28
29
@@ -40,7 +41,7 @@ If you already have an existing P2S gateway, the steps in this article help you
40
41
41
42
[!INCLUDE [Steps to authorize the Azure VPN app](../../includes/vpn-gateway-vwan-azure-ad-tenant.md)]
42
43
43
-
## <aname="enable-authentication"></a>Configure the VPN gateway - Entra authentication
44
+
## <aname="enable-authentication"></a>Configure the VPN gateway
44
45
45
46
> [!IMPORTANT]
46
47
> [!INCLUDE [Entra ID note for portal pages](../../includes/vpn-gateway-entra-portal-note.md)]
@@ -59,14 +60,14 @@ If you already have an existing P2S gateway, the steps in this article help you
59
60
***Tunnel type:** OpenVPN (SSL)
60
61
***Authentication type**: Microsoft Entra ID
61
62
62
-
For **Microsoft Entra ID** values, use the following guidelines for **Tenant**, **Audience**, and **Issuer** values. Replace {AzureAD TenantID} with your tenant ID, taking care to remove **{}** from the examples when you replace this value.
63
+
For **Microsoft Entra ID** values, use the following guidelines for **Tenant**, **Audience**, and **Issuer** values. Replace {TenantID} with your tenant ID, taking care to remove **{}** from the examples when you replace this value.
63
64
64
65
***Tenant:** TenantID for the Microsoft Entra tenant. Enter the tenant ID that corresponds to your configuration. Make sure the Tenant URL doesn't have a `\` (backslash) at the end. Forward slash is permissible.
65
66
66
-
* Azure Public AD: `https://login.microsoftonline.com/{AzureAD TenantID}`
67
-
* Azure Government AD: `https://login.microsoftonline.us/{AzureAD TenantID}`
* China 21Vianet AD: `https://login.chinacloudapi.cn/{TenantID}`
70
71
71
72
***Audience**: The Application ID of the "Azure VPN" Microsoft Entra Enterprise App.
72
73
@@ -77,7 +78,7 @@ If you already have an existing P2S gateway, the steps in this article help you
77
78
78
79
***Issuer**: URL of the Secure Token Service. Include a trailing slash at the end of the **Issuer** value. Otherwise, the connection might fail. Example:
79
80
80
-
*`https://sts.windows.net/{AzureAD TenantID}/`
81
+
*`https://sts.windows.net/{TenantID}/`
81
82
82
83
1. Once you finish configuring settings, click **Save** at the top of the page.
0 commit comments