Skip to content

Commit 8d46e1a

Browse files
committed
new article
1 parent ccbcb64 commit 8d46e1a

20 files changed

+172
-106
lines changed

articles/virtual-wan/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -258,6 +258,8 @@
258258
href: openvpn-azure-ad-client.md
259259
- name: macOS clients
260260
href: openvpn-azure-ad-client-mac.md
261+
- name: Linux clients
262+
href: point-to-site-entra-vpn-client-linux.md
261263
- name: VPN client profiles
262264
items:
263265
- name: Download global and hub profiles
Lines changed: 63 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,63 @@
1+
---
2+
title: Configure Azure VPN Client - P2S Microsoft Entra ID authentication - Linux
3+
titleSuffix: Azure Virtual WAN
4+
description: Learn how to configure the Azure VPN Client for Virtual WAN P2S configurations that use Microsoft Entra ID authentication.
5+
ms.service: azure-virtual-wan
6+
ms.custom: linux-related-content
7+
ms.topic: how-to
8+
ms.date: 02/10/2025
9+
ms.author: cherylmc
10+
author: cherylmc
11+
---
12+
13+
# Configure Azure VPN Client – Microsoft Entra ID authentication – Linux (Preview)
14+
15+
This article helps you configure the Azure VPN Client on a Linux computer (Ubuntu) to connect to a virtual network using a Virtual WAN User VPN (point-to-site) and Microsoft Entra ID authentication.
16+
17+
The steps in this article apply to Microsoft Entra ID authentication using the Microsoft-registered Azure VPN Client app with associated App ID and Audience values. This article doesn't apply to the older, manually registered Azure VPN Client app for your tenant. For more information, see [Point-to-site User VPN for Microsoft Entra ID authentication: Microsoft-registered app](point-to-site-entra-gateway.md).
18+
19+
## Before you begin
20+
21+
Verify that you are on the correct article. The following table shows the configuration articles available for Azure Virtual WAN point-to-site (P2S) VPN clients. Steps differ, depending on the authentication type, tunnel type, and the client OS.
22+
23+
[!INCLUDE [P2S client configuration articles](../../includes/virtual-wan-vpn-client-install-articles.md)]
24+
25+
## Prerequisites
26+
27+
This article assumes that you've already performed the following prerequisites:
28+
29+
* You configured a virtual WAN according to the steps in the [Configure a User VPN (P2S) gateway for Microsoft Entra ID authentication](point-to-site-entra-gateway.md) article. Your User VPN configuration must use Microsoft Entra ID (Azure Active Directory) authentication and the OpenVPN tunnel type.
30+
* You generated and downloaded the VPN client configuration files. For steps to generate a VPN client profile configuration package, see [Download global and hub profiles](global-hub-profile.md).
31+
32+
### Workflow
33+
34+
After your Virtual WAN server configuration is complete, your next steps are as follows:
35+
36+
1. Download and install the Azure VPN Client for Linux.
37+
1. Import the client profile settings to the VPN client.
38+
1. Create a connection.
39+
40+
## Install the Azure VPN Client
41+
42+
[!INCLUDE [Download the Azure VPN Client for Linux](../../includes/virtual-wan-download-azure-vpn-client-linux.md)]
43+
44+
## Extract the VPN client profile configuration package
45+
46+
To configure your Azure VPN Client profile, you download a VPN Client profile configuration package from the Azure P2S gateway. This package contains the necessary settings to configure the VPN client.
47+
48+
If your P2S gateway configuration was previously configured to use the older, manually registered App ID versions, your P2S configuration doesn't support the Linux VPN client. You'll need to change your P2S configuration to use the Microsoft-registered App ID version. For more information, see [Configure P2S User VPN for Microsoft Entra ID authentication – Microsoft-registered app](point-to-site-entra-gateway-update.md).
49+
50+
1. Locate and extract the zip file that contains the VPN client profile configuration package. The zip file contains the **AzureVPN** folder.
51+
1. In the AzureVPN folder, you'll see either the **azurevpnconfig_aad.xml** file, or the **azurevpnconfig.xml** file, depending on whether your P2S configuration includes multiple authentication types. The .xml file contains the settings you use to configure the VPN client profile.
52+
53+
## Modify VPN profile configuration files
54+
55+
[!INCLUDE [custom audience steps](../../includes/vpn-gateway-entra-vpn-client-custom.md)]
56+
57+
## Import VPN client profile configuration settings
58+
59+
[!INCLUDE [Import Azure VPN Client settings for Linux](../../includes/virtual-wan-import-azure-vpn-client-settings-linux.md)]
60+
61+
## Next steps
62+
63+
For more information about Microsoft-registerd Azure VPN Client, see [Configure P2S User VPN for Microsoft Entra ID authentication](point-to-site-entra-gateway.md).
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.

articles/vpn-gateway/point-to-site-entra-vpn-client-linux.md

Lines changed: 6 additions & 99 deletions
Original file line numberDiff line numberDiff line change
@@ -6,11 +6,11 @@ author: cherylmc
66
ms.service: azure-vpn-gateway
77
ms.custom: linux-related-content
88
ms.topic: how-to
9-
ms.date: 10/15/2024
9+
ms.date: 02/10/2025
1010
ms.author: cherylmc
1111
---
1212

13-
# Configure Azure VPN Client – Microsoft Entra ID authentication – Linux (Preview)
13+
# Configure the Azure VPN Client – Microsoft Entra ID authentication – Linux (Preview)
1414

1515
This article helps you configure the Azure VPN Client on a Linux computer (Ubuntu) to connect to a virtual network using a VPN Gateway point-to-site (P2S) VPN and Microsoft Entra ID authentication. For more information about point-to-site connections, see [About Point-to-Site connections](point-to-site-about.md).
1616

@@ -30,34 +30,9 @@ After your Azure VPN Gateway P2S server configuration is complete, your next ste
3030
1. Import the client profile settings to the VPN client.
3131
1. Create a connection.
3232

33-
## Download and install the Azure VPN Client
33+
## Install the Azure VPN Client
3434

35-
Use the following steps to download and install the latest version of the Azure VPN Client for Linux.
36-
37-
> [!NOTE]
38-
> Add only the repository list of your Ubuntu version 20.04 or 22.04.
39-
> For more information, see the [Linux Software Repository for Microsoft Products](/linux/packages).
40-
41-
```CLI
42-
# install curl utility
43-
sudo apt-get install curl
44-
45-
# Install Microsoft's public key
46-
curl -sSl https://packages.microsoft.com/keys/microsoft.asc | sudo tee /etc/apt/trusted.gpg.d/microsoft.asc
47-
48-
# Install the production repo list for focal
49-
# For Ubuntu 20.04
50-
curl https://packages.microsoft.com/config/ubuntu/20.04/prod.list | sudo tee /etc/apt/sources.list.d/microsoft-
51-
ubuntu-focal-prod.list
52-
53-
# Install the production repo list for jammy
54-
# For Ubuntu 22.04
55-
curl https://packages.microsoft.com/config/ubuntu/22.04/prod.list | sudo tee /etc/apt/sources.list.d/microsoft-
56-
ubuntu-jammy-prod.list
57-
58-
sudo apt-get update
59-
sudo apt-get install microsoft-azurevpnclient
60-
```
35+
[!INCLUDE [Download the Azure VPN Client for Linux](../../includes/virtual-wan-download-azure-vpn-client-linux.md)]
6136

6237
## Extract the VPN client profile configuration package
6338

@@ -69,83 +44,15 @@ If your P2S gateway configuration was previously configured to use the older, ma
6944

7045
Locate and extract the zip file that contains the VPN client profile configuration package. The zip file contains the **AzureVPN** folder. In the AzureVPN folder, you'll see either the **azurevpnconfig_aad.xml** file, or the **azurevpnconfig.xml** file, depending on whether your P2S configuration includes multiple authentication types. The .xml file contains the settings you use to configure the VPN client profile.
7146

72-
### Modify profile configuration files
73-
74-
If your P2S configuration uses a custom audience with your Microsoft-registered App ID, you might receive error message **AADSTS650057** when you try to connect. Retrying authentication usually resolves the issue. This happens because the VPN client profile needs both the custom audience ID and the Microsoft application ID. To prevent this, modify your profile configuration .xml file to include both the custom application ID and the Microsoft application ID.
47+
## Modify profile configuration files
7548

7649
[!INCLUDE [custom audience steps](../../includes/vpn-gateway-entra-vpn-client-custom.md)]
7750

7851
## Import client profile configuration settings
7952

80-
In this section, you configure the Azure VPN client for Linux.
81-
82-
1. On the Azure VPN Client page, select **Import**.
83-
84-
:::image type="content" source="media/point-to-site-entra-vpn-client-linux/import.png" alt-text="Screenshot of Azure VPN Client import selection." lightbox="media/point-to-site-entra-vpn-client-linux/import.png":::
85-
86-
1. Select **Import Profile** and browse to find the profile xml file. Select the file. With the file selected, select **OK**.
87-
88-
:::image type="content" source="media/point-to-site-entra-vpn-client-linux/select-file.png" alt-text="Screenshot of Azure VPN Client showing the file to be imported." lightbox="media/point-to-site-entra-vpn-client-linux/select-file.png":::
89-
90-
1. View the connection profile information. Change the **Certificate Information** value to show the default **DigiCert_Global_Root G2.pem** or **DigiCert_Global_Root_CA.pem**. Don't leave blank.
91-
92-
1. If your VPN client profile contains multiple client authentications, for **Client Authentication, Authentication Type** select the option for **Microsoft Entra ID**.
93-
94-
:::image type="content" source="media/point-to-site-entra-vpn-client-linux/server-validation.png" alt-text="Screenshot Server Validation and Client Authentication fields." lightbox="media/point-to-site-entra-vpn-client-linux/server-validation.png":::
95-
96-
1. For the **Tenant** field, specify the URL of your Microsoft Entra Tenant. Make sure the Tenant URL doesn't have a `\` (backslash) at the end. Forward slash is permissible.
97-
98-
The Tenant ID has the following structure:
99-
`https://login.microsoftonline.com/{Entra TenantID}`
100-
101-
1. For the **Audience** field, specify the Application ID (App ID).
102-
103-
The App ID for Azure Public is: `c632b3df-fb67-4d84-bdcf-b95ad541b5c8`. We also support custom App ID for this field.
104-
105-
1. For the **Issuer** field, specify the URL of the Secure Token Service. Include a trailing slash at the end of the Issuer value. Otherwise, the connection might fail.
106-
107-
**Example:** `https://sts.windows.net/{AzureAD TenantID}/`
108-
109-
1. When the fields are filled in, click **Save**.
110-
111-
1. In the **VPN Connections** pane, select the connection profile that you saved. Then, from the dropdown, click **Connect**.
112-
113-
:::image type="content" source="media/point-to-site-entra-vpn-client-linux/connect.png" alt-text="Screenshot showing the connection profile and the area to find connect in the dropdown." lightbox="media/point-to-site-entra-vpn-client-linux/connect.png":::
114-
115-
1. The web browser automatically appears. Fill in the username/password credentials for Microsoft Entra ID authentication, then connect.
116-
117-
:::image type="content" source="media/point-to-site-entra-vpn-client-linux/credentials.png" alt-text="Screenshot of authentication credential sign in page." lightbox="media/point-to-site-entra-vpn-client-linux/credentials.png":::
118-
119-
1. If the connection is completed successfully, the client shows a green icon and the **Status Logs** window shows **Status = Connected**.
120-
121-
:::image type="content" source="media/point-to-site-entra-vpn-client-linux/status-connected.png" alt-text="Screenshot of the vpn client with the status logs window showing connected." lightbox="media/point-to-site-entra-vpn-client-linux/status-connected.png":::
122-
123-
1. Once connected, the status changes to **Connected**. To disconnect from the session, from the dropdown, select **Disconnect**.
124-
125-
## Delete a VPN client profile
126-
127-
1. On the Azure VPN client, select the connection you want to remove. Then, from the dropdown, select **Remove**.
128-
129-
:::image type="content" source="media/point-to-site-entra-vpn-client-linux/remove.png" alt-text="Screenshot of the vpn client with the dropdown showing three options: Connect, Configure, Remove." lightbox="media/point-to-site-entra-vpn-client-linux/remove.png":::
130-
131-
1. On **Remove VPN Connection?**, select **OK**.
132-
133-
:::image type="content" source="media/point-to-site-entra-vpn-client-linux/remove-connection.png" alt-text="Screenshot of the vpn client with the Remove VPN Connection popup open." lightbox="media/point-to-site-entra-vpn-client-linux/remove-connection.png":::
134-
135-
## Check logs
136-
137-
To diagnose issues, you can use the Azure VPN Client **Logs**.
138-
139-
1. In the Azure VPN Client, go to **Settings**. In the right pane, select **Show Logs Directory**.
140-
141-
:::image type="content" source="media/point-to-site-entra-vpn-client-linux/show-logs.png" alt-text="Screenshot of the vpn client showing the Show logs directory option." lightbox="media/point-to-site-entra-vpn-client-linux/show-logs.png":::
142-
143-
1. To access the log file, go to the **/var/log/azurevpnclient** folder and locate the **AzureVPNClient.log** file.
144-
145-
:::image type="content" source="media/point-to-site-entra-vpn-client-linux/client-log.png" alt-text="Screenshot of the location of the Azure VPN Client log file." lightbox="media/point-to-site-entra-vpn-client-linux/client-log.png":::
53+
[!INCLUDE [Import Azure VPN Client settings for Linux](../../includes/virtual-wan-import-azure-vpn-client-settings-linux.md)]
14654

14755
## Next steps
14856

14957
* For more information about VPN Gateway, see the [VPN Gateway FAQ](vpn-gateway-vpn-faq.md).
150-
15158
* For more information about point-to-site connections, see [About Point-to-Site connections](point-to-site-about.md).

0 commit comments

Comments
 (0)