|
1 | 1 | ---
|
2 | 2 | ms.author: cherylmc
|
3 | 3 | author: cherylmc
|
4 |
| -ms.date: 09/24/2024 |
| 4 | +ms.date: 01/17/2025 |
5 | 5 | ms.service: azure-vpn-gateway
|
6 | 6 | ms.topic: include
|
7 | 7 |
|
8 | 8 | # this file is used for both virtual wan and vpn gateway. When modifying, make sure that your changes work for both environments.
|
9 | 9 | ---
|
| 10 | +The recommended way to enable and use Microsoft Entra multifactor authentication is with Conditional Access policies. For granular configuration steps, see the tutorial: [Require multifactor authentication](/entra/identity/authentication/tutorial-enable-azure-mfa). |
10 | 11 |
|
11 |
| -Conditional Access allows for fine-grained access control on a per-application basis. In order to use Conditional Access, you should have Microsoft Entra ID P1 or P2 or greater licensing applied to the users that will be subject to the Conditional Access rules. For more information, see [What is Conditional Access](/entra/identity/conditional-access/overview)? |
| 12 | +1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Conditional Access Administrator](/identity/role-based-access-control/permissions-reference#conditional-access-administrator). |
| 13 | +1. Browse to **Protection** > **Security Center**>**Conditional Access**, select **+ New policy**, and then select **Create new policy**. |
| 14 | +1. On the **New** pane, enter a name for the policy, such as VPN Policy. |
| 15 | +1. Complete the following fields: |
12 | 16 |
|
13 |
| -1. Go to the **Microsoft Entra ID - Enterprise applications - All applications** page and click **Azure VPN**. |
| 17 | + | Field | Value| |
| 18 | + |---|---| |
| 19 | + |What does this policy apply to?| Users and groups | |
| 20 | + | Assignments | Specific users included| |
| 21 | + | Include | Select users and groups. Select the checkbox for Users and groups | |
| 22 | + | Select | Select at least one user or group | |
14 | 23 |
|
15 |
| - - Click **Conditional Access**. |
16 |
| - - Click **New policy** to open the **New** pane. |
17 |
| -1. On the **New** pane, navigate to **Assignments -> Users and groups**. On the **Users and groups ->** **Include** tab: |
| 24 | +1. On the **Select** page, browse for and select the Microsoft Entra user or group to which you want this policy to apply. For example, VPN Users, then choose **Select**. |
18 | 25 |
|
19 |
| - - Click **Select users and groups**. |
20 |
| - - Check **Users and groups**. |
21 |
| - - Click **Select** to select a group or set of users to be affected by MFA. |
22 |
| - - Click **Done**. |
| 26 | +Next, configure conditions for multifactor authentication. In the following steps, you configure the Azure VPN Client app to require multifactor authentication when a user signs in. For more information, see [Configure the conditions](/entra/identity/authentication/tutorial-enable-azure-mfa#configure-the-conditions-for-multifactor-authentication). |
23 | 27 |
|
24 |
| - :::image type="content" source="./media/vpn-gateway-vwan-openvpn-mfa/mfa-ca-assignments.png" alt-text="Screenshot of assignments settings." lightbox="./media/vpn-gateway-vwan-openvpn-mfa/mfa-ca-assignments.png"::: |
25 |
| -1. On the **New** pane, navigate to the **Access controls -> Grant** pane: |
| 28 | +1. Select the current value under **Cloud apps or actions**, and then under **Select what this policy applies to**, verify that **Cloud apps** is selected. |
26 | 29 |
|
27 |
| - - Click **Grant access**. |
28 |
| - - Click **Require multi-factor authentication**. |
29 |
| - - Click **Require all the selected controls**. |
30 |
| - - Click **Select**. |
| 30 | +1. Under **Include**, choose **Select resources**. Since no apps are yet selected, the list of apps opens automatically. |
31 | 31 |
|
32 |
| - :::image type="content" source="./media/vpn-gateway-vwan-openvpn-mfa/mfa-ca-grant-mfa.png" alt-text="Screenshot of multifactor authentication access." lightbox="./media/vpn-gateway-vwan-openvpn-mfa/mfa-ca-grant-mfa.png"::: |
33 |
| -1. In the **Enable policy** section: |
| 32 | +1. In the **Select** pane, select the **Azure VPN Client** app, then choose **Select**. |
34 | 33 |
|
35 |
| - - Select **On**. |
36 |
| - - Click **Create** to create the policy. |
| 34 | +Next, configure the access controls to require multifactor authentication during a sign-in event. |
| 35 | + |
| 36 | +1. Under **Access controls**, select **Grant**, and then select **Grant access**. |
| 37 | + |
| 38 | +1. Select **Require multifactor authentication**. |
| 39 | + |
| 40 | +1. For multiple controls, select **Require all the selected controls**. |
| 41 | + |
| 42 | +Now, activate the policy. |
| 43 | + |
| 44 | +1. Under **Enable policy**, select **On**. |
| 45 | + |
| 46 | +1. To apply the Conditional Access policy, select **Create**. |
0 commit comments