Skip to content

Commit b90fceb

Browse files
committed
Add deployment steps 1 & 2
1 parent 8e53b86 commit b90fceb

File tree

1 file changed

+34
-12
lines changed

1 file changed

+34
-12
lines changed

articles/dev-box/concept-dev-box-deployment-guide.md

Lines changed: 34 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -78,18 +78,40 @@ After you've defined the requirements, you can start the deployment of Microsoft
7878
To deploy Microsoft Dev Box involves creating and configuring multiple services, across Azure, Intune, and your infrastructure. The following sections provide the different steps for deploying Microsoft Dev Box in your organization. Some steps are optional and depend on your specific organizational setup.
7979

8080
### Step 1: Configure Azure subscription
81-
Needs to be same tenant as Intune
82-
https://learn.microsoft.com/en-us/azure/cloud-adoption-framework/ready/landing-zone/design-area/resource-org-subscriptions
83-
84-
### Step x: Configure network
85-
- vnets, vnet peering
86-
- firewalls
87-
- NSGs
88-
- gateways
89-
- expressroute
90-
- VPN
91-
92-
### Step x: Configure security groups for role-based access control
81+
82+
Subscriptions are a unit of management, billing, and scale within Azure. You can have one or more Azure subscriptions because of organization and governance design, resource quota and capacity, cost management, and more. Learn more about [considerations for creating Azure subscriptions](/azure/cloud-adoption-framework/ready/landing-zone/design-area/resource-org-subscriptions).
83+
84+
Each Azure subscription is linked to a single Microsoft Entra tenant, which acts as an identity provider (IdP) for your Azure subscription. The Microsoft Entra tenant is used to authenticate users, services, and devices.
85+
86+
Each Dev Box user needs a Microsoft Intune license. The Azure subscription that contains your Dev Box Azure resources (dev center, project, and more) needs to be in the same tenant as Microsoft Intune.
87+
88+
### Step 2: Configure network
89+
90+
Dev boxes require a network connection to access resources. You can choose between a Microsoft-hosted network connection, and an Azure network connection that you create in your own subscription. When you use an Azure network connection, you need to configure the corresponding networking components in Azure and potentially in your organization's network infrastructure.
91+
92+
Examples of networking components you might need to configure:
93+
94+
- Azure virtual networks (VNET)
95+
- Configure virtual network peering
96+
- Configure network security groups (NSGs)
97+
- Configure firewalls, such as [Azure Firewall](/azure/firewall/overview), or other
98+
- Configure Azure ExpressRoute
99+
- Configure VPNs or gateways
100+
101+
When you have the following requirements, you need to use Azure network connections and configure your network accordingly:
102+
103+
- Access to on-premises resources from a dev box, such as a licensing server, printers, version control system, or other
104+
- Access to other Azure resources, such as a Cosmos DB database, AKS cluster, and more
105+
- Restrict access through firewalls or network security groups (NSGs)
106+
- Define custom network routing rules
107+
- User management not in Microsoft Entra ID
108+
109+
When connecting to resources on-premises through Microsoft Entra hybrid joins, work with your Azure network topology expert. Best practice is to implement a [hub-and-spoke network topology](/azure/cloud-adoption-framework/ready/azure-best-practices/hub-spoke-network-topology). The hub is the central point that connects to your on-premises network; you can use an Express Route, a site-to-site VPN, or a point-to-site VPN. The spoke is the virtual network that contains the dev boxes. You peer the dev box virtual network to the on-premises connected virtual network to provide access to on-premises resources. Hub and spoke topology can help you manage network traffic and security.
110+
111+
Learn more about [Microsoft Dev Box networking requirements](./concept-dev-box-network-requirements.md?tabs=W365).
112+
113+
### Step 3: Configure security groups for role-based access control
114+
93115
- project admins
94116
- dev box users
95117

0 commit comments

Comments
 (0)