You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/dev-box/concept-dev-box-deployment-guide.md
+34-12Lines changed: 34 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -78,18 +78,40 @@ After you've defined the requirements, you can start the deployment of Microsoft
78
78
To deploy Microsoft Dev Box involves creating and configuring multiple services, across Azure, Intune, and your infrastructure. The following sections provide the different steps for deploying Microsoft Dev Box in your organization. Some steps are optional and depend on your specific organizational setup.
### Step x: Configure security groups for role-based access control
81
+
82
+
Subscriptions are a unit of management, billing, and scale within Azure. You can have one or more Azure subscriptions because of organization and governance design, resource quota and capacity, cost management, and more. Learn more about [considerations for creating Azure subscriptions](/azure/cloud-adoption-framework/ready/landing-zone/design-area/resource-org-subscriptions).
83
+
84
+
Each Azure subscription is linked to a single Microsoft Entra tenant, which acts as an identity provider (IdP) for your Azure subscription. The Microsoft Entra tenant is used to authenticate users, services, and devices.
85
+
86
+
Each Dev Box user needs a Microsoft Intune license. The Azure subscription that contains your Dev Box Azure resources (dev center, project, and more) needs to be in the same tenant as Microsoft Intune.
87
+
88
+
### Step 2: Configure network
89
+
90
+
Dev boxes require a network connection to access resources. You can choose between a Microsoft-hosted network connection, and an Azure network connection that you create in your own subscription. When you use an Azure network connection, you need to configure the corresponding networking components in Azure and potentially in your organization's network infrastructure.
91
+
92
+
Examples of networking components you might need to configure:
93
+
94
+
- Azure virtual networks (VNET)
95
+
- Configure virtual network peering
96
+
- Configure network security groups (NSGs)
97
+
- Configure firewalls, such as [Azure Firewall](/azure/firewall/overview), or other
98
+
- Configure Azure ExpressRoute
99
+
- Configure VPNs or gateways
100
+
101
+
When you have the following requirements, you need to use Azure network connections and configure your network accordingly:
102
+
103
+
- Access to on-premises resources from a dev box, such as a licensing server, printers, version control system, or other
104
+
- Access to other Azure resources, such as a Cosmos DB database, AKS cluster, and more
105
+
- Restrict access through firewalls or network security groups (NSGs)
106
+
- Define custom network routing rules
107
+
- User management not in Microsoft Entra ID
108
+
109
+
When connecting to resources on-premises through Microsoft Entra hybrid joins, work with your Azure network topology expert. Best practice is to implement a [hub-and-spoke network topology](/azure/cloud-adoption-framework/ready/azure-best-practices/hub-spoke-network-topology). The hub is the central point that connects to your on-premises network; you can use an Express Route, a site-to-site VPN, or a point-to-site VPN. The spoke is the virtual network that contains the dev boxes. You peer the dev box virtual network to the on-premises connected virtual network to provide access to on-premises resources. Hub and spoke topology can help you manage network traffic and security.
110
+
111
+
Learn more about [Microsoft Dev Box networking requirements](./concept-dev-box-network-requirements.md?tabs=W365).
112
+
113
+
### Step 3: Configure security groups for role-based access control
0 commit comments