You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/virtual-wan/user-groups-about.md
+30-16Lines changed: 30 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,23 +5,25 @@ description: Learn about using user groups to assign IP addresses from specific
5
5
author: cherylmc
6
6
ms.service: virtual-wan
7
7
ms.topic: conceptual
8
-
ms.date: 10/21/2022
8
+
ms.date: 03/31/2023
9
9
ms.author: cherylmc
10
10
11
11
---
12
12
# About user groups and IP address pools for P2S User VPNs - Preview
13
13
14
-
You can configure P2S User VPNs to assign users IP addresses from specific address pools based on their identity or authentication credentials by creating **User Groups**. This article describes the different configurations and parameters the Virtual WAN P2S VPN gateway uses to determine user groups and assign IP addresses.
14
+
You can configure P2S User VPNs to assign users IP addresses from specific address pools based on their identity or authentication credentials by creating **User Groups**. This article describes the different configurations and parameters the Virtual WAN P2S VPN gateway uses to determine user groups and assign IP addresses. For configuration steps, see [Configure user groups and IP address pools for P2S User VPNs](user-groups-create.md).
15
15
16
-
## Use cases
17
-
18
-
Contoso corporation is composed of multiple functional departments, such as Finance, Human Resources and Engineering. Contoso uses Virtual WAN to allow remote workers (users) to connect to Azure Virtual WAN and access resources hosted on-premises or in a Virtual Network connected to the Virtual WAN hub.
19
-
20
-
However, Contoso has internal security policies where users from the Finance department can only access certain databases and Virtual Machines and users from Human Resources have access to other sensitive applications.
16
+
This article covers the following concepts:
21
17
22
-
Contoso can configure different user groups for each of their functional departments. This will ensure users from each department are assigned IP addresses from a department-level pre-defined address pool.
23
-
24
-
Contoso's network administrator can then configure Firewall rules, network security groups (NSG) or access control lists (ACLs) to allow or deny certain users access to resources based on their IP addresses.
18
+
* Server configuration concepts
19
+
* User groups
20
+
* Group members
21
+
* Default policy group
22
+
* Group priority
23
+
* Available group settings
24
+
* Gateway concepts
25
+
* Configuration requirements and limitations
26
+
* Use cases
25
27
26
28
## Server configuration concepts
27
29
@@ -42,12 +44,12 @@ For every P2S VPN server configuration, one group must be selected as default. U
42
44
43
45
### Group priority
44
46
45
-
Each group is also assigned a numerical priority. Groups with lower priority are evaluated first. This means that if a user presents credentials that match the settings of multiple groups, they'll be considered part of the group with the lowest priority. For example, if user A presents a credential that corresponds to the IT Group (priority 3) and Finance Group (priority 4), user A will be considered part of the IT Group for purposes of assigning IP addresses.
47
+
Each group is also assigned a numerical priority. Groups with lower priority are evaluated first. This means that if a user presents credentials that match the settings of multiple groups, they're considered part of the group with the lowest priority. For example, if user A presents a credential that corresponds to the IT Group (priority 3) and Finance Group (priority 4), user A is considered part of the IT Group for purposes of assigning IP addresses.
46
48
47
49
### Available group settings
48
50
49
51
The following section describes the different parameters that can be used to define which groups members are a part of. The available parameters vary based on selected authentication methods.
50
-
The table below summarizes the available setting types and acceptable values. For more detailed information on each type of Member Value, view the section corresponding to your authentication type.
52
+
The following table summarizes the available setting types and acceptable values. For more detailed information on each type of Member Value, view the section corresponding to your authentication type.
51
53
52
54
|Authentication type|Member type |Member values|Example member value|
53
55
|---|---|---|---|
@@ -59,9 +61,9 @@ Azure Active Directory|AADGroupID|Azure Active Directory Group Object ID |0cf484
59
61
60
62
Gateways using Azure Active Directory authentication can use **Azure Active Directory Group Object IDs** to determine which user group a user belongs to. If a user is part of multiple Azure Active Directory groups, they're considered to be part of the Virtual WAN user group that has the lowest numerical priority.
61
63
62
-
However, if you plan to have users who are external (users who are not part of the Azure Active Directory domain configured on the VPN Gateway) connect to the Virtual WAN Point-to-site VPN Gateway, please make sure that the user type of the external user is "Member" and **not** "Guest". Also, make sure that the "Name" of the user is set to the user's email address. If the user type and name of the connecting user is not set correctly as described above or you cannot set an external member to be a "Member" of your Azure Active Directory domain, that connecting user will be assigned to the default group and assigned an IP from the default IP address pool.
64
+
However, if you plan to have users who are external (users who aren't part of the Azure Active Directory domain configured on the VPN gateway) connect to the Virtual WAN Point-to-site VPN gateway, make sure that the user type of the external user is "Member" and **not** "Guest". Also, make sure that the "Name" of the user is set to the user's email address. If the user type and name of the connecting user isn't set correctly as described above or you can't set an external member to be a "Member" of your Azure Active Directory domain, that connecting user will be assigned to the default group and assigned an IP from the default IP address pool.
63
65
64
-
You can also identify whether or not a user is external by looking at the user's "User Principal Name." External users will have **#EXT** in their "User Principal Name."
66
+
You can also identify whether or not a user is external by looking at the user's "User Principal Name." External users have **#EXT** in their "User Principal Name."
65
67
66
68
:::image type="content" source="./media/user-groups-about/groups.png" alt-text="Screenshot of an Azure Active Directory group." lightbox="./media/user-groups-about/groups.png":::
67
69
@@ -128,8 +130,20 @@ The following result is:
128
130
129
131
## Configuration considerations
130
132
131
-
[!INCLUDE [User groups preview considerations](../../includes/virtual-wan-user-groups-considerations.md)]
133
+
This section lists configuration requirements and limitations for user groups and IP address pools.
134
+
135
+
[!INCLUDE [User groups configuration considerations](../../includes/virtual-wan-user-groups-considerations.md)]
136
+
137
+
## Use cases
138
+
139
+
Contoso corporation is composed of multiple functional departments, such as Finance, Human Resources and Engineering. Contoso uses Virtual WAN to allow remote workers (users) to connect to Azure Virtual WAN and access resources hosted on-premises or in a Virtual Network connected to the Virtual WAN hub.
140
+
141
+
However, Contoso has internal security policies where users from the Finance department can only access certain databases and virtual machines, and users from Human Resources have access to other sensitive applications.
142
+
143
+
* Contoso can configure different user groups for each of their functional departments. This ensures users from each department are assigned IP addresses from a department-level predefined address pool.
144
+
145
+
* Contoso's network administrator can then configure Firewall rules, network security groups (NSG) or access control lists (ACLs) to allow or deny certain users access to resources based on their IP addresses.
132
146
133
147
## Next steps
134
148
135
-
* To create User Groups, see [Create User Groups for P2S User VPN](user-groups-create.md).
149
+
* To create User Groups, see [Create user groups for P2S User VPN](user-groups-create.md).
0 commit comments