Skip to content

Commit 81ecbd0

Browse files
authored
Merge pull request #219220 from MicrosoftDocs/main
11/21 PM Publish
2 parents a65ab79 + b3a5a05 commit 81ecbd0

File tree

1,773 files changed

+3344
-3290
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,773 files changed

+3344
-3290
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10953,7 +10953,7 @@
1095310953
},
1095410954
{
1095510955
"source_path_from_root": "/articles/active-directory/fundamentals/keep-me-signed-in.md",
10956-
"redirect_url": "/azure/active-directory/fundamentals/customize-branding",
10956+
"redirect_url": "/azure/active-directory/fundamentals/active-directory-users-profile-azure-portal",
1095710957
"redirect_document_id": false
1095810958
},
1095910959
{

.openpublishing.redirection.virtual-desktop.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -74,6 +74,11 @@
7474
"source_path_from_root": "/articles/virtual-desktop/user-documentation/linux-overview.md",
7575
"redirect_url": "/azure/virtual-desktop/users/connect-thin-clients",
7676
"redirect_document_id": true
77+
},
78+
{
79+
"source_path_from_root": "/articles/virtual-desktop/troubleshoot-client.md",
80+
"redirect_url": "/azure/virtual-desktop/troubleshoot-client-windows",
81+
"redirect_document_id": true
7782
}
7883
]
7984
}
Lines changed: 102 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,102 @@
1+
---
2+
title: Using Azure Front Door to provide geo-acceleration
3+
description: How to optimize performance for global connectivity scenarios using Azure Front Door (for Geo-Acceleration) with Azure Active Directory Application Proxy.
4+
services: active-directory
5+
author: dhruvinshah
6+
ms.service: active-directory
7+
ms.subservice: app-proxy
8+
ms.workload: identity
9+
ms.topic: how-to
10+
ms.date: 08/22/2022
11+
ms.author: dhruvinshah
12+
ms.reviewer: ashishj
13+
---
14+
15+
# Using Azure Front Door to achieve geo-acceleration
16+
17+
This article explains how to configure Azure Active Directory (Azure AD) Application Proxy to work with Azure Front Door (AFD) to achieve reduce latency and better performance.
18+
19+
## What is Azure Front Door?
20+
21+
Azure Front Door helps deliver low-latency, high-throughput content at scale from the cloud or on-premises infrastructure to users anywhere. Accelerate static and dynamic content delivery with a unified platform built on the massively scalable Microsoft private global network. For more information about Azure Front Door, see [What is Azure Front Door?][front-door-overview].
22+
23+
## Deployment steps
24+
25+
This article guides you through the steps to securely expose a web application on the Internet, by integrating the Azure AD Application Proxy with Azure Front Door. In this guide we'll be using the Azure portal. The reference architecture for this deployment is represented below.
26+
27+
:::image type="content" source="./media/application-proxy-azure-front-door/azure-front-door.png" alt-text="Diagram of deployment described." lightbox="./media/application-proxy-azure-front-door/azure-front-door.png":::
28+
29+
## Prerequisites
30+
31+
- A Front Door Service – Standard or Classic tier
32+
- Apps that exist in a single region.
33+
- A custom domain to use for the application.
34+
- For licensing information, Application Proxy is available through an Azure AD Premium subscription. Refer here for a full listing of licensing options and features: [Azure Active Directory Pricing](https://www.microsoft.com/security/business/identity-access-management/azure-ad-pricing)
35+
36+
### Application Proxy Configuration
37+
38+
Follow these steps to configure Application Proxy for Front Door:
39+
1. Install connector for the location that your app instances will be in (For example US West). For the connector group assign the connector to the right region (For example North America).
40+
2. Set up your app instance with Application Proxy as follows:
41+
- Set the Internal URL to the address users access the app from the internal network, for example contoso.org
42+
- Set the External URL to the domain address you want the users to access the app from. For this you must configure a custom domain for our application here, for example, contoso.org. Reference: [Custom domains in Azure Active Directory Application Proxy][appproxy-custom-domain]
43+
- Assign the application to the appropriate connector group (For example: North America)
44+
- Note down the URL generated by Application Proxy to access the application. For example, contoso.msappproxy.net
45+
- For the application configure a CNAME Entry in your DNS provider which points the external URL to the Front Door’s endpoint, for example ‘contoso.org’ to contoso.msappproxy.net
46+
3. In the Front Door service, utilize the URL generated for the app by Application Proxy as a backend for the backend pool. For example, contoso.msappproxy.net
47+
48+
#### Sample Application Proxy Configuration
49+
The following table shows a sample Application Proxy configuration. The sample scenario uses the sample application domain www.contoso.org as the External URL.
50+
51+
| | Configuration | Additional Information |
52+
|---- | ----------------------- | ---------------------- |
53+
| **Internal URL** | nam.contoso.com | |
54+
| **External URL** | contoso.org | Configure a custom domain for users to access the app from.|
55+
| **Connector group** | North America | Select the connector group in the geo closest to where the app instance will be in for optimized performance.|
56+
57+
### Front Door Configuration
58+
59+
Azure Front Door is offered in different tiers including Standard, Premium and Classic. Select a tier based on the preference. For more information on tier comparison, refer here: [Azure Front Door tier comparison][front-door-tier]
60+
61+
For Front Door Standard Tier
62+
The configuration steps that follow refer to the following definitions:
63+
- Endpoint name: A globally unique name for the endpoint. You can onboard custom domains as well. For example, front door endpoint name: contoso-nam that will generate the Endpoint host name contoso-nam.azurefd.net and utilize custom domain host name: contoso.org
64+
- Origin: Origins are your application servers. Front door will route your client requests to origins, based on the type, ports, priority, and weight you specify here
65+
- Origin Type: The type of resource you want to add. Front Door supports auto-discovery of your application backends from App Service, Cloud Service, or Storage. If you want a different resource in Azure or even a non-Azure backend, select Custom host. For example Custom host for have a backend of an Application Proxy service
66+
- Origin host name: This represents the backend origin host name. For example, contoso.msappproxy.net
67+
- Origin host header: This represented the host header value being sent to the backend for each request. For example, contoso.org. For more information refer here: [Origins and origin groups – Azure Front Door][front-door-origin]
68+
69+
Follow these steps to configure the Front Door Service (Standard):
70+
1. Create a Front Door (Standard) with the configuration below:
71+
- Add an Endpoint name for generating the Front Door’s default domain i.e. azurefd.net. For example, contoso-nam that generated the Endpoint hostname contoso-nam.azurefd.net
72+
- Add an Origin Type for the type of backend resource. For example Custom here for the Application Proxy resource
73+
- Add an Origin host name to represent the backend host name. For example, contoso.msappproxy.net
74+
- Optional: Enable Caching for the routing rule for Front Door to cache your static content.
75+
2. Verify if the deployment is complete and the Front Door Service is ready
76+
3. To give your Front Door service a user-friendly domain host name URL, create a CNAME record with your DNS provider for your Application Proxy External URL that points to Front Door’s domain host name (generated by the Front Door service). For example, contoso.org points to contoso.azurefd.net Reference: [How to add a custom domain - Azure Front Door][front-door-custom-domain]
77+
4. As per the reference, on the Front Door Service Dashboard navigate to Front Door Manager and add a Domain with the Custom Hostname. For example, contoso.org
78+
5. Navigate to the Origin groups in the Front Door Service Dashboard, select the origin name and validate the Origin host header matches the domain of the backend. For example here the Origin host header should be: contoso.org
79+
80+
| | Configuration | Additional Information |
81+
|---- | ----------------------- | ---------------------- |
82+
| **Endpoint Name** | • Endpoint name: contoso-nam <br /> • Front door generated Hostname: <br /> contoso-nam.azurefd.net <br /> • Custom Domain Hostname: contoso.org| A custom domain host name must be utilized here.|
83+
| **Origin hostname** | contoso.msappproxy.net | The URL generated for the app by Application Proxy must be utilized here.|
84+
| **Connector group** | North America | Select the connector group in the geo closest to where the app instance will be in for optimized performance.|
85+
86+
:::image type="content" source="./media/application-proxy-azure-front-door/azure-front-door-profile-1.png" alt-text="Screenshot of Azure Front Door Configuration 1." lightbox="./media/application-proxy-azure-front-door/azure-front-door-profile-1.png":::
87+
88+
:::image type="content" source="./media/application-proxy-azure-front-door/azure-front-door-profile-2.png" alt-text="Screenshot of Azure Front Door Configuration 2." lightbox="./media/application-proxy-azure-front-door/azure-front-door-profile-2.png":::
89+
90+
:::image type="content" source="./media/application-proxy-azure-front-door/azure-front-door-profile-3.png" alt-text="Screenshot of Azure Front Door Configuration 3." lightbox="./media/application-proxy-azure-front-door/azure-front-door-profile-3.png":::
91+
92+
## Next steps
93+
94+
To prevent false positives, learn how to [Customize Web Application Firewall rules](../../web-application-firewall/ag/application-gateway-customize-waf-rules-portal.md), configure [Web Application Firewall exclusion lists](../../web-application-firewall/ag/application-gateway-waf-configuration.md?tabs=portal), or [Web Application Firewall custom rules](../../web-application-firewall/ag/create-custom-waf-rules.md).
95+
96+
[front-door-overview]: ../../frontdoor/front-door-overview.md
97+
[front-door-origin]: ../../frontdoor/origin.md?pivots=front-door-standard-premium#origin-host-header
98+
[front-door-tier]: ../../frontdoor/standard-premium/tier-comparison.md
99+
[front-door-custom-domain]: ../../frontdoor/standard-premium/how-to-add-custom-domain.md
100+
[appproxy-custom-domain]: ./application-proxy-configure-custom-domain.md
101+
[private-dns]: ../../dns/private-dns-getstarted-portal.md
102+
[waf-logs]: ../../application-gateway/application-gateway-diagnostics.md#firewall-log
142 KB
Loading
145 KB
Loading
133 KB
Loading
301 KB
Loading

articles/active-directory/app-proxy/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -83,6 +83,8 @@
8383
href: application-proxy-configure-connectors-with-proxy-servers.md
8484
- name: Add Traffic Manager
8585
href: application-proxy-integrate-with-traffic-manager.md
86+
- name: Geo-acceleration with Azure Front Door
87+
href: application-proxy-azure-front-door.md
8688
- name: Give mobile and desktop apps access to on-premises APIs
8789
href: application-proxy-secure-api-access.md
8890
- name: Configure custom home page

articles/active-directory/authentication/concepts-azure-multi-factor-authentication-prompts-session-lifetime.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,7 @@ When a user selects **Yes** on the *Stay signed in?* option during sign-in, a pe
6868

6969
If you have an Azure AD Premium 1 license, we recommend using Conditional Access policy for *Persistent browser session*. This policy overwrites the *Stay signed in?* setting and provides an improved user experience. If you don't have an Azure AD Premium 1 license, we recommend enabling the stay signed in setting for your users.
7070

71-
For more information on configuring the option to let users remain signed-in, see [Customize your Azure AD sign-in page](../fundamentals/customize-branding.md#learn-about-the-stay-signed-in-prompt).
71+
For more information on configuring the option to let users remain signed-in, see [Customize your Azure AD sign-in page](../fundamentals/active-directory-users-profile-azure-portal.md#learn-about-the-stay-signed-in-prompt).
7272

7373
### Remember Multi-Factor Authentication
7474

articles/active-directory/conditional-access/plan-conditional-access.md

Lines changed: 14 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,10 +30,23 @@ Microsoft provides [security defaults](../fundamentals/concept-fundamentals-secu
3030
### Prerequisites
3131

3232
* A working Azure AD tenant with Azure AD Premium or trial license enabled. If needed, [create one for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
33-
* An account with Conditional Access Administrator privileges.
33+
* An account with privileges to create Conditional Access policies.
3434
* A test user (non-administrator) that allows you to verify policies work as expected before you impact real users. If you need to create a user, see [Quickstart: Add new users to Azure Active Directory](../fundamentals/add-users-azure-active-directory.md).
3535
* A group that the non-administrator user is a member of. If you need to create a group, see [Create a group and add members in Azure Active Directory](../fundamentals/active-directory-groups-create-azure-portal.md).
3636

37+
#### Permissions
38+
39+
Conditional Access policies can be created or modified by anyone assigned the following roles:
40+
41+
- Conditional Access Administrator
42+
- Security Administrator
43+
- Global Administrator
44+
45+
Conditional Access policies can be read by anyone assigned the following roles:
46+
47+
- Security Reader
48+
- Global Reader
49+
3750
## Understand Conditional Access policy components
3851

3952
Policies answer questions about who should access your resources, what resources they should access, and under what conditions. Policies can be designed to grant access, limit access with session controls, or to block access. You [build a Conditional Access policy](concept-conditional-access-policies.md) by defining the if-then statements: **If an assignment is met, then apply the access controls**.

0 commit comments

Comments
 (0)