Skip to content

Commit c093cb1

Browse files
authored
Merge pull request #284431 from cherylmc/entra-permissions
New article
2 parents 14f677b + 94e5e81 commit c093cb1

File tree

4 files changed

+96
-145
lines changed

4 files changed

+96
-145
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4805,6 +4805,11 @@
48054805
"redirect_url": "/azure/vpn-gateway/about-site-to-site-tunneling",
48064806
"redirect_document_id": false
48074807
},
4808+
{
4809+
"source_path_from_root": "/articles/vpn-gateway/openvpn-azure-ad-tenant-multi-app.md",
4810+
"redirect_url": "/azure/vpn-gateway/point-to-site-entra-users-access",
4811+
"redirect_document_id": false
4812+
},
48084813
{
48094814
"source_path_from_root": "/articles/vpn-gateway/vpn-gateway-howto-multi-site-to-site-resource-manager-portal.md",
48104815
"redirect_url": "/azure/vpn-gateway/add-remove-site-to-site-connections",

articles/vpn-gateway/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -192,7 +192,7 @@
192192
- name: Create or modify custom audience app ID
193193
href: point-to-site-entra-register-custom-app.md
194194
- name: Configure access based on users and groups
195-
href: openvpn-azure-ad-tenant-multi-app.md
195+
href: point-to-site-entra-users-access.md
196196
- name: Configure Multi-Factor Authentication (MFA)
197197
href: openvpn-azure-ad-mfa.md
198198
- name: VPN client configuration

articles/vpn-gateway/openvpn-azure-ad-tenant-multi-app.md

Lines changed: 0 additions & 144 deletions
This file was deleted.
Lines changed: 90 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,90 @@
1+
---
2+
title: Configure P2S access based on users and groups - Microsoft Entra ID authentication
3+
titleSuffix: Azure VPN Gateway
4+
description: Learn how to configure P2S access based on users and groups for Microsoft Entra ID authentication.
5+
author: cherylmc
6+
ms.service: azure-vpn-gateway
7+
ms.topic: how-to
8+
ms.date: 08/12/2024
9+
ms.author: cherylmc
10+
11+
---
12+
13+
# Scenario: Configure P2S access based on users and groups - Microsoft Entra ID authentication
14+
15+
This article walks you through a scenario to configure access based on users and groups for point-to-site (P2S) VPN connections that use Microsoft Entra ID authentication. This scenario, you configure this type of access using multiple custom audience app IDs with specified permissions, and multiple P2S VPN gateways. For more information about P2S protocols and authentication, see [About point-to-site VPN](point-to-site-about.md).
16+
17+
In this scenario, users have different access based on permissions to connect to specific P2S VPN gateways. At a high level, the workflow is as follows:
18+
19+
1. Create a custom app for each P2S VPN gateway that you want to configure for P2S VPN with Microsoft Entra ID authentication. Make a note of the custom app ID.
20+
1. Add the Azure VPN Client application to the custom app configuration.
21+
1. Assign user and group permissions per custom app.
22+
1. When you configure your gateway for P2S VPN Microsoft Entra ID authentication, specify the Microsoft Entra ID tenant and the custom app ID that's associated with the users that you want to allow to connect via that gateway.
23+
1. The Azure VPN Client profile on the client's computer is configured using the settings from the P2S VPN gateway to which the user has permissions to connect.
24+
1. When a user connects, they're authenticated and are able to connect only to the P2S VPN gateway for which their account has permissions.
25+
26+
Considerations:
27+
28+
* You can't create this type of granular access if you have only one VPN gateway.
29+
* Microsoft Entra ID authentication is supported only for OpenVPN® protocol connections and requires the Azure VPN Client.
30+
*Take care configure each Azure VPN Client with the correct client profile package configuration settings to ensure that the user connects to the corresponding gateway to which they have permissions.
31+
* When you use the configuration steps in this exercise, it might be easiest to run the steps for the first custom app ID and gateway all the way through, then repeat for each subsequent custom app ID and gateway.
32+
33+
## Prerequisites
34+
35+
* This scenario requires a Microsoft Entra tenant. If you don't already have a tenant, [Create a new tenant in Microsoft Entra ID](/entra/fundamentals/create-new-tenant). Make a note of the tenant ID. This value is needed when you configure your P2S VPN gateway for Microsoft Entra ID authentication.
36+
37+
* This scenario requires multiple VPN gateways. You can only assign one custom app ID per gateway.
38+
39+
* If you don't already have at least two functioning VPN gateways that are compatible with Microsoft Entra ID authentication, see [Create and manage a VPN gateway - Azure portal](tutorial-create-gateway-portal.md) to create your VPN gateways.
40+
* Some gateway options are incompatible with P2S VPN gateways that use Microsoft Entra ID authentication. Basic SKU and policy-based VPN types aren't supported. For more information about gateway SKUs, see [About gateway SKUs](about-gateway-skus.md). For more information about VPN types, see [VPN Gateway settings](vpn-gateway-about-vpn-gateway-settings.md#vpntype).
41+
42+
## Register an application
43+
44+
To create a custom audience app ID value, which is specified when you configure your VPN gateway, you must register an application. Register an application. For steps, see [Register an application](point-to-site-entra-register-custom-app.md#register-an-application).
45+
46+
* The **Name** field is user-facing. Use something intuitive that describes the users or groups that are connecting via this custom application.
47+
* For the rest of the settings, use the settings shown in the article.
48+
49+
## Add a scope
50+
51+
Add a scope. Adding a scope is part of the sequence to configure permissions for users and groups. For steps, see [Expose an API and add a scope](point-to-site-entra-register-custom-app.md#expose-an-api-and-add-a-scope). Later, you assign users and groups permissions to this scope.
52+
53+
* Use something intuitive for the **Scope Name** field, such as Marketing-VPN-Users. Fill out the rest of the fields as necessary.
54+
* For **State**, select **Enable**.
55+
56+
## Add the Azure VPN Client application
57+
58+
Add the Azure VPN Client application **Client ID** and specify the **Authorized scope**. When you add the application, we recommend that you use the **Microsoft-registered** Azure VPN Client app ID for Azure Public, `c632b3df-fb67-4d84-bdcf-b95ad541b5c8` when possible. This app value has global consent, which means you don't need to manually register it. For steps, see [Add the Azure VPN Client application](point-to-site-entra-register-custom-app.md#add-the-azure-vpn-client-application).
59+
60+
After you add the Azure VPN Client application, go to the **Overview** page and copy and save the **Application (client) ID**. You'll need this information to configure your P2S VPN gateway.
61+
62+
## Assign users and groups
63+
64+
Assign permissions to the users and/or groups that connect to the gateway. If you're specifying a group, the user must be a direct member of the group. Nested groups aren't supported.
65+
66+
1. Go to your Microsoft Entra ID and select **Enterprise applications**.
67+
1. From the list, locate the application you registered and click to open it.
68+
1. Expand **Manage**, then select **Properties**. On the **Properties** page, verify that **Enabled for users to sign in** is set to **Yes**. If not, change the value to **Yes**.
69+
1. For **Assignment required**, change the value to **Yes**. For more information about this setting, see [Application properties](/entra/identity/enterprise-apps/application-properties#enabled-for-users-to-sign-in).
70+
1. If you've made changes, select **Save** at the top of the page.
71+
1. In the left pane, select **Users and groups**. On the **Users and groups** page, select **+ Add user/group** to open the **Add Assignment** page.
72+
1. Click the link under **Users and groups** to open the **Users and groups** page. Select the users and groups that you want to assign, then click **Select**.
73+
1. After you finish selecting users and groups, select **Assign**.
74+
75+
## Configure a P2S VPN
76+
77+
After you've completed the steps in the previous sections, continue to [Configure P2S VPN Gateway for Microsoft Entra ID authentication – Microsoft-registered app](point-to-site-entra-gateway.md).
78+
79+
* When you configure each gateway, associate the appropriate custom audience App ID.
80+
* Download the Azure VPN Client configuration packages to configure the Azure VPN Client for the users that have permissions to connect to the specific gateway.
81+
82+
## Configure the Azure VPN Client
83+
84+
Use the Azure VPN Client profile configuration package to configure the Azure VPN Client on each user's computer. Verify that the client profile corresponds to the P2S VPN gateway to which you want the user to connect.
85+
86+
## Next steps
87+
88+
* [Configure P2S VPN Gateway for Microsoft Entra ID authentication – Microsoft-registered app](point-to-site-entra-gateway.md).
89+
* To connect to your virtual network, you must configure the Azure VPN client on your client computers. See [Configure a VPN client for P2S VPN connections](point-to-site-entra-vpn-client-windows.md).
90+
* For frequently asked questions, see the **Point-to-site** section of the [VPN Gateway FAQ](vpn-gateway-vpn-faq.md#P2S).

0 commit comments

Comments
 (0)