Skip to content

Commit aa346a7

Browse files
Merge pull request #232966 from cherylmc/Update-user-groups
Freshness update
2 parents 61ef3e3 + bfc82e9 commit aa346a7

File tree

4 files changed

+95
-58
lines changed

4 files changed

+95
-58
lines changed

articles/virtual-wan/user-groups-about.md

Lines changed: 30 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -5,23 +5,25 @@ description: Learn about using user groups to assign IP addresses from specific
55
author: cherylmc
66
ms.service: virtual-wan
77
ms.topic: conceptual
8-
ms.date: 10/21/2022
8+
ms.date: 03/31/2023
99
ms.author: cherylmc
1010

1111
---
1212
# About user groups and IP address pools for P2S User VPNs - Preview
1313

14-
You can configure P2S User VPNs to assign users IP addresses from specific address pools based on their identity or authentication credentials by creating **User Groups**. This article describes the different configurations and parameters the Virtual WAN P2S VPN gateway uses to determine user groups and assign IP addresses.
14+
You can configure P2S User VPNs to assign users IP addresses from specific address pools based on their identity or authentication credentials by creating **User Groups**. This article describes the different configurations and parameters the Virtual WAN P2S VPN gateway uses to determine user groups and assign IP addresses. For configuration steps, see [Configure user groups and IP address pools for P2S User VPNs](user-groups-create.md).
1515

16-
## Use cases
17-
18-
Contoso corporation is composed of multiple functional departments, such as Finance, Human Resources and Engineering. Contoso uses Virtual WAN to allow remote workers (users) to connect to Azure Virtual WAN and access resources hosted on-premises or in a Virtual Network connected to the Virtual WAN hub.
19-
20-
However, Contoso has internal security policies where users from the Finance department can only access certain databases and Virtual Machines and users from Human Resources have access to other sensitive applications.
16+
This article covers the following concepts:
2117

22-
Contoso can configure different user groups for each of their functional departments. This will ensure users from each department are assigned IP addresses from a department-level pre-defined address pool.
23-
24-
Contoso's network administrator can then configure Firewall rules, network security groups (NSG) or access control lists (ACLs) to allow or deny certain users access to resources based on their IP addresses.
18+
* Server configuration concepts
19+
* User groups
20+
* Group members
21+
* Default policy group
22+
* Group priority
23+
* Available group settings
24+
* Gateway concepts
25+
* Configuration requirements and limitations
26+
* Use cases
2527

2628
## Server configuration concepts
2729

@@ -42,12 +44,12 @@ For every P2S VPN server configuration, one group must be selected as default. U
4244

4345
### Group priority
4446

45-
Each group is also assigned a numerical priority. Groups with lower priority are evaluated first. This means that if a user presents credentials that match the settings of multiple groups, they'll be considered part of the group with the lowest priority. For example, if user A presents a credential that corresponds to the IT Group (priority 3) and Finance Group (priority 4), user A will be considered part of the IT Group for purposes of assigning IP addresses.
47+
Each group is also assigned a numerical priority. Groups with lower priority are evaluated first. This means that if a user presents credentials that match the settings of multiple groups, they're considered part of the group with the lowest priority. For example, if user A presents a credential that corresponds to the IT Group (priority 3) and Finance Group (priority 4), user A is considered part of the IT Group for purposes of assigning IP addresses.
4648

4749
### Available group settings
4850

4951
The following section describes the different parameters that can be used to define which groups members are a part of. The available parameters vary based on selected authentication methods.
50-
The table below summarizes the available setting types and acceptable values. For more detailed information on each type of Member Value, view the section corresponding to your authentication type.
52+
The following table summarizes the available setting types and acceptable values. For more detailed information on each type of Member Value, view the section corresponding to your authentication type.
5153

5254
|Authentication type|Member type |Member values|Example member value|
5355
|---|---|---|---|
@@ -59,9 +61,9 @@ Azure Active Directory|AADGroupID|Azure Active Directory Group Object ID |0cf484
5961

6062
Gateways using Azure Active Directory authentication can use **Azure Active Directory Group Object IDs** to determine which user group a user belongs to. If a user is part of multiple Azure Active Directory groups, they're considered to be part of the Virtual WAN user group that has the lowest numerical priority.
6163

62-
However, if you plan to have users who are external (users who are not part of the Azure Active Directory domain configured on the VPN Gateway) connect to the Virtual WAN Point-to-site VPN Gateway, please make sure that the user type of the external user is "Member" and **not** "Guest". Also, make sure that the "Name" of the user is set to the user's email address. If the user type and name of the connecting user is not set correctly as described above or you cannot set an external member to be a "Member" of your Azure Active Directory domain, that connecting user will be assigned to the default group and assigned an IP from the default IP address pool.
64+
However, if you plan to have users who are external (users who aren't part of the Azure Active Directory domain configured on the VPN gateway) connect to the Virtual WAN Point-to-site VPN gateway, make sure that the user type of the external user is "Member" and **not** "Guest". Also, make sure that the "Name" of the user is set to the user's email address. If the user type and name of the connecting user isn't set correctly as described above or you can't set an external member to be a "Member" of your Azure Active Directory domain, that connecting user will be assigned to the default group and assigned an IP from the default IP address pool.
6365

64-
You can also identify whether or not a user is external by looking at the user's "User Principal Name." External users will have **#EXT** in their "User Principal Name."
66+
You can also identify whether or not a user is external by looking at the user's "User Principal Name." External users have **#EXT** in their "User Principal Name."
6567

6668
:::image type="content" source="./media/user-groups-about/groups.png" alt-text="Screenshot of an Azure Active Directory group." lightbox="./media/user-groups-about/groups.png":::
6769

@@ -128,8 +130,20 @@ The following result is:
128130

129131
## Configuration considerations
130132

131-
[!INCLUDE [User groups preview considerations](../../includes/virtual-wan-user-groups-considerations.md)]
133+
This section lists configuration requirements and limitations for user groups and IP address pools.
134+
135+
[!INCLUDE [User groups configuration considerations](../../includes/virtual-wan-user-groups-considerations.md)]
136+
137+
## Use cases
138+
139+
Contoso corporation is composed of multiple functional departments, such as Finance, Human Resources and Engineering. Contoso uses Virtual WAN to allow remote workers (users) to connect to Azure Virtual WAN and access resources hosted on-premises or in a Virtual Network connected to the Virtual WAN hub.
140+
141+
However, Contoso has internal security policies where users from the Finance department can only access certain databases and virtual machines, and users from Human Resources have access to other sensitive applications.
142+
143+
* Contoso can configure different user groups for each of their functional departments. This ensures users from each department are assigned IP addresses from a department-level predefined address pool.
144+
145+
* Contoso's network administrator can then configure Firewall rules, network security groups (NSG) or access control lists (ACLs) to allow or deny certain users access to resources based on their IP addresses.
132146

133147
## Next steps
134148

135-
* To create User Groups, see [Create User Groups for P2S User VPN](user-groups-create.md).
149+
* To create User Groups, see [Create user groups for P2S User VPN](user-groups-create.md).

0 commit comments

Comments
 (0)