Skip to content

Commit c373dfa

Browse files
authored
Merge pull request #293224 from cherylmc/images-remove
update
2 parents cb1f6ac + 3a42732 commit c373dfa

File tree

5 files changed

+33
-23
lines changed

5 files changed

+33
-23
lines changed

articles/virtual-wan/openvpn-azure-ad-mfa.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: virtual-wan
55
author: cherylmc
66
ms.service: azure-virtual-wan
77
ms.topic: how-to
8-
ms.date: 09/24/2024
8+
ms.date: 01/17/2025
99
ms.author: cherylmc
1010

1111
---
@@ -31,4 +31,4 @@ ms.author: cherylmc
3131

3232
## Next steps
3333

34-
To connect to your virtual network, you must create and configure a VPN client profile. See [Configure Microsoft Entra authentication for Point-to-Site connection to Azure](virtual-wan-point-to-site-azure-ad.md).
34+
To connect to your virtual network, you must create and configure a VPN client profile. See [Create a P2S User VPN connection using Azure Virtual WAN - Microsoft Entra authentication](virtual-wan-point-to-site-azure-ad.md).

articles/vpn-gateway/openvpn-azure-ad-mfa.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: Learn how to enable multifactor authentication (MFA) for VPN users.
55
author: cherylmc
66
ms.service: azure-vpn-gateway
77
ms.topic: how-to
8-
ms.date: 09/24/2024
8+
ms.date: 01/17/2025
99
ms.author: cherylmc
1010

1111
---
Binary file not shown.
Binary file not shown.
Lines changed: 30 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -1,36 +1,46 @@
11
---
22
ms.author: cherylmc
33
author: cherylmc
4-
ms.date: 09/24/2024
4+
ms.date: 01/17/2025
55
ms.service: azure-vpn-gateway
66
ms.topic: include
77

88
# this file is used for both virtual wan and vpn gateway. When modifying, make sure that your changes work for both environments.
99
---
10+
The recommended way to enable and use Microsoft Entra multifactor authentication is with Conditional Access policies. For granular configuration steps, see the tutorial: [Require multifactor authentication](/entra/identity/authentication/tutorial-enable-azure-mfa).
1011

11-
Conditional Access allows for fine-grained access control on a per-application basis. In order to use Conditional Access, you should have Microsoft Entra ID P1 or P2 or greater licensing applied to the users that will be subject to the Conditional Access rules. For more information, see [What is Conditional Access](/entra/identity/conditional-access/overview)?
12+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Conditional Access Administrator](/identity/role-based-access-control/permissions-reference#conditional-access-administrator).
13+
1. Browse to **Protection** > **Security Center**>**Conditional Access**, select **+ New policy**, and then select **Create new policy**.
14+
1. On the **New** pane, enter a name for the policy, such as VPN Policy.
15+
1. Complete the following fields:
1216

13-
1. Go to the **Microsoft Entra ID - Enterprise applications - All applications** page and click **Azure VPN**.
17+
| Field | Value|
18+
|---|---|
19+
|What does this policy apply to?| Users and groups |
20+
| Assignments | Specific users included|
21+
| Include | Select users and groups. Select the checkbox for Users and groups |
22+
| Select | Select at least one user or group |
1423

15-
- Click **Conditional Access**.
16-
- Click **New policy** to open the **New** pane.
17-
1. On the **New** pane, navigate to **Assignments -> Users and groups**. On the **Users and groups ->** **Include** tab:
24+
1. On the **Select** page, browse for and select the Microsoft Entra user or group to which you want this policy to apply. For example, VPN Users, then choose **Select**.
1825

19-
- Click **Select users and groups**.
20-
- Check **Users and groups**.
21-
- Click **Select** to select a group or set of users to be affected by MFA.
22-
- Click **Done**.
26+
Next, configure conditions for multifactor authentication. In the following steps, you configure the Azure VPN Client app to require multifactor authentication when a user signs in. For more information, see [Configure the conditions](/entra/identity/authentication/tutorial-enable-azure-mfa#configure-the-conditions-for-multifactor-authentication).
2327

24-
:::image type="content" source="./media/vpn-gateway-vwan-openvpn-mfa/mfa-ca-assignments.png" alt-text="Screenshot of assignments settings." lightbox="./media/vpn-gateway-vwan-openvpn-mfa/mfa-ca-assignments.png":::
25-
1. On the **New** pane, navigate to the **Access controls -> Grant** pane:
28+
1. Select the current value under **Cloud apps or actions**, and then under **Select what this policy applies to**, verify that **Cloud apps** is selected.
2629

27-
- Click **Grant access**.
28-
- Click **Require multi-factor authentication**.
29-
- Click **Require all the selected controls**.
30-
- Click **Select**.
30+
1. Under **Include**, choose **Select resources**. Since no apps are yet selected, the list of apps opens automatically.
3131

32-
:::image type="content" source="./media/vpn-gateway-vwan-openvpn-mfa/mfa-ca-grant-mfa.png" alt-text="Screenshot of multifactor authentication access." lightbox="./media/vpn-gateway-vwan-openvpn-mfa/mfa-ca-grant-mfa.png":::
33-
1. In the **Enable policy** section:
32+
1. In the **Select** pane, select the **Azure VPN Client** app, then choose **Select**.
3433

35-
- Select **On**.
36-
- Click **Create** to create the policy.
34+
Next, configure the access controls to require multifactor authentication during a sign-in event.
35+
36+
1. Under **Access controls**, select **Grant**, and then select **Grant access**.
37+
38+
1. Select **Require multifactor authentication**.
39+
40+
1. For multiple controls, select **Require all the selected controls**.
41+
42+
Now, activate the policy.
43+
44+
1. Under **Enable policy**, select **On**.
45+
46+
1. To apply the Conditional Access policy, select **Create**.

0 commit comments

Comments
 (0)