Skip to content

Commit a333216

Browse files
committed
format links
1 parent ec6fcbd commit a333216

File tree

4 files changed

+12
-12
lines changed

4 files changed

+12
-12
lines changed

articles/virtual-wan/point-to-site-entra-gateway.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: 'Configure P2S User VPN for Microsoft Entra ID authentication: Microsoft-registered client'
2+
title: Configure P2S User VPN for Microsoft Entra ID authentication - Microsoft-registered client
33
titleSuffix: Azure Virtual WAN
44
description: Learn how to configure Virtual WAN P2S User VPN server settings for Microsoft Entra ID authentication using Microsoft-registered Azure VPN Client.
55
services: virtual-wan
@@ -73,7 +73,7 @@ A User VPN configuration defines the parameters for connecting remote clients. I
7373
:::image type="content" source="./media/virtual-wan-point-to-site-azure-ad/values.png" alt-text="Screenshot of the Microsoft Entra ID page." lightbox="./media/virtual-wan-point-to-site-azure-ad/values.png"::: Configure the following values:
7474

7575
* **Azure Active Directory** - Select **Yes**.
76-
* **Audience** - Enter the corresponding value for the Microsoft-registered Azure VPN Client App ID, Azure Public: `c632b3df-fb67-4d84-bdcf-b95ad541b5c8`. [Custom audience](../vpn-gateway/point-to-site-entra-register-custom-app.md) is also supported for this field.
76+
* **Audience** - Enter the corresponding value for the Microsoft-registered Azure VPN Client App ID, Azure Public: `c632b3df-fb67-4d84-bdcf-b95ad541b5c8`. [Custom audience](point-to-site-entra-register-custom-app.md) is also supported for this field.
7777
* **Issuer** - Enter `https://sts.windows.net/<your Directory ID>/`.
7878
* **AAD Tenant** - Enter the TenantID for the Microsoft Entra tenant. Make sure there isn't an `/` at the end of the Microsoft Entra tenant URL.
7979

articles/vpn-gateway/point-to-site-about.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: 'About Azure Point-to-Site VPN connections'
2+
title: About Azure Point-to-Site VPN connections
33
titleSuffix: Azure VPN Gateway
44
description: Learn about Point-to-Site VPN.
55
author: cherylmc
@@ -43,7 +43,7 @@ When you configure your P2S gateway for certificate authentication, you upload t
4343

4444
To authenticate, each client that connects must have an installed client certificate that's generated from the trusted root certificate. This is in addition to VPN client software. The validation of the client certificate is performed by the VPN gateway and happens during establishment of the P2S VPN connection.
4545

46-
#### <a name='certificate-workflow'></a>Certificate authentication workflow
46+
#### <a name="certificate-workflow"></a>Certificate authentication workflow
4747

4848
At a high level, you need to perform the following steps to configure Certificate authentication:
4949

@@ -53,13 +53,13 @@ At a high level, you need to perform the following steps to configure Certificat
5353
1. Configure the VPN client on the client computer using the settings found in the VPN profile configuration package.
5454
1. Connect.
5555

56-
### <a name='entra-id'></a>Microsoft Entra ID authentication
56+
### <a name="entra-id"></a>Microsoft Entra ID authentication
5757

5858
You can configure your P2S gateway to allow VPN users to authenticate using Microsoft Entra ID credentials. With Microsoft Entra ID authentication, you can use Microsoft Entra Conditional Access and multifactor authentication (MFA) features for VPN. Microsoft Entra ID authentication is supported only for the OpenVPN protocol. To authenticate and connect, clients must use the Azure VPN Client.
5959

6060
[!INCLUDE [entra app id descriptions](../../includes/vpn-gateway-entra-app-id-descriptions.md)]
6161

62-
#### <a name='entra-workflow'></a>Microsoft Entra ID authentication workflow
62+
#### <a name="entra-workflow"></a>Microsoft Entra ID authentication workflow
6363

6464
At a high level, you need to perform the following steps to configure Microsoft Entra ID authentication:
6565

@@ -69,7 +69,7 @@ At a high level, you need to perform the following steps to configure Microsoft
6969
1. Download, install, and configure the Azure VPN Client on the client computer.
7070
1. Connect.
7171

72-
### <a name='active-directory'></a>RADIUS - Active Directory (AD) Domain Server authentication
72+
### <a name="active-directory"></a>RADIUS - Active Directory (AD) Domain Server authentication
7373

7474
AD Domain authentication allows users to connect to Azure using their organization domain credentials. It requires a RADIUS server that integrates with the AD server. Organizations can also use their existing RADIUS deployment.
7575

articles/vpn-gateway/point-to-site-entra-vpn-client-linux.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: 'Configure Azure VPN Client - Microsoft Entra ID authentication - Linux'
2+
title: Configure Azure VPN Client - Microsoft Entra ID authentication - Linux
33
description: Learn how to configure the Linux Azure VPN Client for Microsoft Entra ID authentication for gateways configured to use the Microsoft-registered Azure VPN Client App ID.
44
titleSuffix: Azure VPN Gateway
55
author: cherylmc

includes/vpn-gateway-entra-app-id-descriptions.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
author: cherylmc
33
ms.author: cherylmc
4-
ms.date: 08/06/2024
4+
ms.date: 01/16/2025
55
ms.service: azure-vpn-gateway
66
ms.custom: linux-related-content
77
ms.topic: include
@@ -14,17 +14,17 @@ When possible, we recommend that you configure new P2S gateways using the Micros
1414

1515
If you have an existing P2S gateway that you want to update to use a new Audience value, see [Change Audience for a P2S VPN gateway](../articles/vpn-gateway/point-to-site-entra-gateway-update.md). If you want to create or modify a custom Audience value, see [Create a custom audience app ID for P2S VPN](../articles/vpn-gateway/point-to-site-entra-register-custom-app.md). If you want to configure or restrict access to P2S based on users and groups, see [Scenario: Configure P2S VPN access based on users and groups](../articles/vpn-gateway/point-to-site-entra-users-access.md).
1616

17-
**Considerations and limitations**
17+
**Considerations**
1818

1919
* A P2S VPN gateway can only support one Audience value. It can't support multiple Audience values simultaneously.
2020

2121
* At this time, the newer Microsoft-registered App ID doesn't support as many Audience values as the older, manually registered app. If you need an Audience value for anything other than Azure Public or Custom, use the older manually registered method and values.
2222

23-
* The Azure VPN Client for Linux isn't backward compatible with P2S gateways configured to use the older Audience values that align with the manually registered app. The Azure VPN Client for Linux does support Custom Audience values.
23+
* The Azure VPN Client for Linux isn't backward compatible with P2S gateways configured to use the older Audience values that align with the manually registered app. However, the Azure VPN Client for Linux does support Custom Audience values.
2424

2525
* [!INCLUDE [Supported versions](vpn-gateway-azure-vpn-client-linux-supported-releases.md)]
2626

27-
* The Azure VPN Client for macOS and Windows is backward compatible with P2S gateways configured to use the older Audience values that align with the manually registered app. You can also use Custom Audience values with these clients.
27+
* The Azure VPN Clients for macOS and Windows are backward compatible with P2S gateways configured to use the older Audience values that align with the manually registered app. These clients also support Custom Audience values.
2828

2929
**Azure VPN Client Audience values**
3030

0 commit comments

Comments
 (0)