Skip to content

Commit 7b333aa

Browse files
Merge pull request #298649 from cherylmc/vwan-RADIUS
update include
2 parents 2c87d35 + a0749a6 commit 7b333aa

File tree

10 files changed

+39
-48
lines changed

10 files changed

+39
-48
lines changed
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.

articles/virtual-wan/user-groups-radius.md

Lines changed: 9 additions & 48 deletions
Original file line numberDiff line numberDiff line change
@@ -5,68 +5,29 @@ description: Learn how to configure RADIUS/NPS for user groups to assign IP addr
55
author: cherylmc
66
ms.service: azure-virtual-wan
77
ms.topic: how-to
8-
ms.date: 07/16/2024
8+
ms.date: 04/23/2025
99
ms.author: cherylmc
1010

1111
---
1212
# RADIUS - Configure NPS for vendor-specific attributes - P2S user groups
1313

14-
The following section describes how to configure Windows Server Network Policy Server (NPS) to authenticate users to respond to Access-Request messages with the Vendor Specific Attribute (VSA) used for user group support in Virtual WAN point-to-site-VPN. The following steps assume that your Network Policy Server is already registered to Active Directory. The steps might vary depending on the vendor/version of your NPS server.
14+
This article helps you configure Windows Server Network Policy Server (NPS) to authenticate users to respond to Access-Request messages with the Vendor Specific Attribute (VSA) that is used for user group support in Virtual WAN point-to-site-VPN. For more information RADIUS and user groups for point-to-site, see [About user groups and IP address pools for P2S User VPNs](user-groups-about.md#radius-server-openvpn-and-ikev2).
1515

16-
The following steps describe setting up single Network Policy on the NPS server. The NPS server replies with the specified VSA for all users who match this policy, and the value of this VSA can be used on your point-to-site VPN gateway in Virtual WAN.
16+
The steps in the following sections help you set up a network policy on the NPS server. The NPS server replies with the specified VSA for all users who match this policy, and the value of this VSA can be used on your Virtual WAN point-to-site VPN gateway.
1717

18-
## Configure
18+
You can create multiple network policies on your NPS server to send different Access-Accept messages to the Virtual WAN point-to-site VPN gateway based on Active Directory group membership, or any other mechanism you'd like to support.
1919

20-
1. Open the **Network Policy Server** management console, and right click **Network Policies -> New** to create a new Network Policy.
20+
## Prerequisites
2121

22-
:::image type="content" source="./media/user-groups-radius/network-policy-server.png" alt-text="Screenshot of new network policy." lightbox="./media/user-groups-radius/network-policy-server.png":::
22+
Verify that you have a working RADIUS server (NPS) already registered to Active Directory.
2323

24-
1. In the wizard, select **Access granted** to ensure your RADIUS server can send Access-Accept messages after authenticating users. Then, click **Next**.
24+
## Configure the NPS server
2525

26-
1. Name the policy and select **Remote Access Server (VPN-Dial up)** as the network access server type. Then, click **Next**.
26+
Use the following steps to help you configure a network policy on your NPS server. Steps might vary, depending on vendor and version. For more information about how to configure network policies, see [Network Policy Server](https://learn.microsoft.com/windows-server/networking/technologies/nps/nps-np-configure).
2727

28-
:::image type="content" source="./media/user-groups-radius/policy-name.png" alt-text="Screenshot of policy name field." lightbox="./media/user-groups-radius/policy-name.png":::
29-
30-
1. On the **Specify Conditions** page, click **Add** to select a condition. Then, select **User Groups** as the condition and click **Add**. You can also use other Network Policy conditions that are supported by your RADIUS server vendor.
31-
32-
:::image type="content" source="./media/user-groups-radius/specify.png" alt-text="Screenshot of specifying conditions for User Groups." lightbox="./media/user-groups-radius/specify.png":::
33-
34-
1. On the **User Groups** page, click **Add Groups** and select the Active Directory groups that will use this policy. Then, click **OK** and **OK** again. You'll see the groups you've added in the **User Groups** window. Click **OK** to return to the **Specify Conditions** page and click **Next**.
35-
36-
1. On the **Specify Access Permission** page, select **Access granted** to ensure your RADIUS server can send Access-Accept messages after authenticating users. Then, click **Next**.
37-
38-
:::image type="content" source="./media/user-groups-radius/specify-access.png" alt-text="Screenshot of the Specify Access Permission page." lightbox="./media/user-groups-radius/specify-access.png":::
39-
40-
1. For **Configuration Authentication Methods**, make any necessary changes, then click **Next**.
41-
1. For **Configure Constraints** select any necessary settings. Then, click **Next**.
42-
1. On the **Configure Settings** page, for **RADIUS Attributes**, highlight **Vendor Specific** and click **Add**.
43-
44-
:::image type="content" source="./media/user-groups-radius/configure-settings.png" alt-text="Screenshot of the Configure Settings page." lightbox="./media/user-groups-radius/configure-settings.png":::
45-
46-
1. On the **Add Vendor Specific Attribute** page, scroll to select **Vendor-Specific**.
47-
48-
:::image type="content" source="./media/user-groups-radius/vendor-specific.png" alt-text="Screenshot of the Add Vendor Specific Attribute page with Vendor-Specific selected." lightbox="./media/user-groups-radius/vendor-specific.png":::
49-
50-
1. Click **Add** to open the **Attribute Information** page. Then, click **Add** to open the **Vendor-Specific Attribute Information** page. Select **Select from list** and select **Microsoft**. Select **Yes. It conforms**. Then, click **Configure Attribute**.
51-
52-
:::image type="content" source="./media/user-groups-radius/attribute-information.png" alt-text="Screenshot of the Attribute Information page." lightbox="./media/user-groups-radius/attribute-information.png":::
53-
54-
1. On the **Configure VSA (RFC Compliant)** page, select the following values:
55-
56-
* **Vendor-assigned attribute number**: 65
57-
* **Attribute format**: Hexadecimal
58-
* **Attribute value**: Set this to the VSA value you have configured on your VPN server configuration, such as 6a1bd08. The VSA value should begin with **6ad1bd**.
59-
60-
1. Click **OK** and **OK** again to close the windows. On the **Attribute Information** page, you'll see the Vendor and Value listed that you just input. Click **OK** to close the window. Then, click **Close** to return to the **Configure Settings** page.
61-
62-
1. The **Configure Settings** now looks similar to the following screenshot:
63-
64-
:::image type="content" source="./media/user-groups-radius/vendor-value.png" alt-text="Screenshot of the Configure Settings page with Vendor Specific attributes." lightbox="./media/user-groups-radius/vendor-value.png":::
65-
66-
1. Click **Next** and then **Finish**. You can create multiple network policies on your RADIUS server to send different Access-Accept messages to the Virtual WAN point-to-site VPN gateway based on Active Directory group membership or any other mechanism you would like to support.
28+
[!INCLUDE [NPS steps](../../includes/vpn-gateway-vwan-user-groups-radius.md)]
6729

6830
## Next steps
6931

7032
* For more information about user groups, see [About user groups and IP address pools for P2S User VPNs](user-groups-about.md).
71-
7233
* To configure user groups, see [Configure user groups and IP address pools for P2S User VPNs](user-groups-create.md).
Lines changed: 30 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,30 @@
1+
---
2+
author: cherylmc
3+
ms.author: cherylmc
4+
ms.date: 04/23/2025
5+
ms.service: azure-virtual-wan
6+
ms.topic: include
7+
---
8+
1. Open the Network Policy Server console, and then double-click **Policies**.
9+
1. In the console tree, right-click **Network Policies**, and click **New**. The New Network Policy wizard opens.
10+
1. Use the New Network Policy wizard to create a policy. Advance through the policy pages, specifying the following settings:
11+
12+
|Page | Setting | Value |
13+
|---|---|---|
14+
| Specify Network Policy Name and Connection Type | Policy name | Enter a name for the policy. |
15+
| | Type of network access server | From the dropdown, select **Remote Access Server (VPN-Dial up)**. |
16+
|Specify Conditions | Conditions | Click **Add** and select **User Groups**. Then, click **Add**. You can also use other Network Policy conditions supported by your RADIUS server vendor.|
17+
| User Groups | Add Groups | Click **Add Groups** and select the Active Directory groups that will use this policy. Click **OK** and **OK**, then click **Next**. |
18+
| Specify Access Permission | Access Permission | Select **Access granted**, then **Next**. |
19+
| Configuration Authentication Methods | Authentication methods | Make any necessary changes. |
20+
| Configure Constraints | Constraints | Select any necessary settings. |
21+
| Configure Settings | RADIUS Attributes | Click to highlight **Vendor Specific**, then click **Add**. |
22+
| Add Vendor Specific Attribute | Attributes| Scroll to select **Vendor-Specific**, then click **Add**. |
23+
| Attribute Information| Attribute values| Select **Add**. |
24+
| Vendor-Specific Attribute Information | Specify network access server vendor/Specify conforms| Choose **Select from list** and select **Microsoft**.<br>Select **Yes. It conforms**. Then, click **Configure Attribute**. |
25+
| Configure VSA (RFC Compliant) | Vendor-assigned attribute number | 65 |
26+
| | Attribute format | Hexadecimal |
27+
| |Attribute value | Set this value to the VSA value configured on your VPN server configuration, such as 6ad1bd08. The VSA value should begin with **6ad1bd**.|
28+
29+
1. Click **OK**, and **OK** again. Then, **Close** to return to the **Configure Settings** page.
30+
1. Click **Next**, and then **Finish** to create your policy.

0 commit comments

Comments
 (0)