Skip to content

Commit c54c10d

Browse files
authored
Merge pull request #293032 from cherylmc/vwan-azuread
VWAN Tenant
2 parents 9c05405 + 7539b56 commit c54c10d

File tree

4 files changed

+165
-3
lines changed

4 files changed

+165
-3
lines changed

articles/virtual-wan/TOC.yml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -208,7 +208,9 @@
208208
href: certificates-point-to-site.md
209209
- name: Microsoft Entra ID authentication
210210
items:
211-
- name: Configure a P2S VPN
211+
- name: Configure P2S - Microsoft-registered VPN client
212+
href: point-to-site-entra-gateway.md
213+
- name: Configure P2S - manually registered VPN client
212214
href: virtual-wan-point-to-site-azure-ad.md
213215
- name: Configure a tenant
214216
href: openvpn-azure-ad-tenant.md
Lines changed: 129 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,129 @@
1+
---
2+
title: 'Configure P2S User VPN for Microsoft Entra ID authentication: Microsoft-registered client'
3+
titleSuffix: Azure Virtual WAN
4+
description: Learn how to configure Virtual WAN P2S User VPN server settings for Microsoft Entra ID authentication using Microsoft-registered Azure VPN Client.
5+
services: virtual-wan
6+
author: cherylmc
7+
ms.service: azure-virtual-wan
8+
ms.topic: how-to
9+
ms.date: 01/14/2025
10+
ms.author: cherylmc
11+
12+
#Audience ID values are not sensitive data.
13+
14+
---
15+
# Configure P2S User VPN for Microsoft Entra ID authentication – Microsoft-registered app
16+
17+
This article helps you configure point-to-site User VPN connection to Virtual WAN that uses Microsoft Entra ID authentication and the new Microsoft-registered Azure VPN Client App ID.
18+
19+
> [!NOTE]
20+
> The steps in this article apply to Microsoft Entra ID authentication using the new Microsoft-registered Azure VPN Client App ID and associated Audience values. This article doesn't apply to the older, manually registered Azure VPN Client app for your tenant. For the manually registered Azure VPN Client steps, see [Configure P2S using manually registered VPN client](virtual-wan-point-to-site-azure-ad.md).
21+
22+
[!INCLUDE [About Microsoft-registered app](../../includes/virtual-wan-entra-app-id-descriptions.md)]
23+
24+
[!INCLUDE [OpenVPN note](../../includes/vpn-gateway-openvpn-auth-include.md)]
25+
26+
In this article, you learn how to:
27+
28+
* Create a virtual WAN
29+
* Create a User VPN configuration
30+
* Download a virtual WAN User VPN profile
31+
* Create a virtual hub
32+
* Edit a hub to add P2S gateway
33+
* Connect a virtual network to a virtual hub
34+
* Download and apply the User VPN client configuration
35+
* View your virtual WAN
36+
37+
:::image type="content" source="./media/virtual-wan-about/virtualwanp2s.png" alt-text="Screenshot of Virtual WAN diagram." lightbox="./media/virtual-wan-about/virtualwanp2s.png":::
38+
39+
## Before you begin
40+
41+
Verify that you've met the following criteria before beginning your configuration:
42+
43+
* You have a virtual network that you want to connect to. Verify that none of the subnets of your on-premises networks overlap with the virtual networks that you want to connect to. To create a virtual network in the Azure portal, see the [Quickstart](../virtual-network/quick-create-portal.md).
44+
45+
* Your virtual network doesn't have any virtual network gateways. If your virtual network has a gateway (either VPN or ExpressRoute), you must remove all gateways. The steps for this configuration help you connect your virtual network to the Virtual WAN virtual hub gateway.
46+
47+
* Obtain an IP address range for your hub region. The hub is a virtual network that is created and used by Virtual WAN. The address range that you specify for the hub can't overlap with any of your existing virtual networks that you connect to. It also can't overlap with your address ranges that you connect to on premises. If you're unfamiliar with the IP address ranges located in your on-premises network configuration, coordinate with someone who can provide those details for you.
48+
49+
* You need a Microsoft Entra ID tenant for this configuration. If you don't have one, you can create one by following the instructions in [Create a new tenant](/entra/fundamentals/create-new-tenant).
50+
51+
## <a name="wan"></a>Create a virtual WAN
52+
53+
From a browser, navigate to the [Azure portal](https://portal.azure.com) and sign in with your Azure account.
54+
55+
[!INCLUDE [Create a virtual WAN](../../includes/virtual-wan-create-vwan-include.md)]
56+
57+
## <a name="user-config"></a>Create a User VPN configuration
58+
59+
A User VPN configuration defines the parameters for connecting remote clients. It's important to create the User VPN configuration before configuring your virtual hub with P2S settings, as you must specify the User VPN configuration you want to use.
60+
61+
> [!IMPORTANT]
62+
> [!INCLUDE [Microsoft Entra ID note for portal pages](../../includes/vpn-gateway-entra-portal-note.md)]
63+
64+
1. Go to your Virtual WAN. In the left pane, expand **Connectivity** and select the **User VPN configurations** page. On the **User VPN configurations** page, click **+Create user VPN config**.
65+
1. On the **Basics** page, specify the following parameters.
66+
67+
* **Configuration name** - Enter the name you want to call your User VPN Configuration. For example, **TestConfig1**.
68+
* **Tunnel type** - Select OpenVPN from the dropdown menu.
69+
1. At the top of the page, click **Azure Active Directory**. You can view the necessary values on the Microsoft Entra ID page for Enterprise applications in the portal.
70+
71+
:::image type="content" source="./media/virtual-wan-point-to-site-azure-ad/values.png" alt-text="Screenshot of the Microsoft Entra ID page." lightbox="./media/virtual-wan-point-to-site-azure-ad/values.png"::: Configure the following values:
72+
73+
* **Azure Active Directory** - Select **Yes**.
74+
* **Audience** - Enter the corresponding value for the Microsoft-registered Azure VPN Client App ID, Azure Public: `c632b3df-fb67-4d84-bdcf-b95ad541b5c8`. [Custom audience](../vpn-gateway/point-to-site-entra-register-custom-app.md) is also supported for this field.
75+
* **Issuer** - Enter `https://sts.windows.net/<your Directory ID>/`.
76+
* **AAD Tenant** - Enter the TenantID for the Microsoft Entra tenant. Make sure there isn't an `/` at the end of the Microsoft Entra tenant URL.
77+
78+
1. Click **Create** to create the User VPN configuration. You'll select this configuration later in the exercise.
79+
80+
## <a name="site"></a>Create an empty hub
81+
82+
Next, create the virtual hub. The steps in this section create an empty virtual hub to which you can later add the P2S gateway. However, it's always much more efficient to combine creating the hub along with the gateway because each time you make a configuration change to the hub, you have to wait for the hub settings to build.
83+
84+
For demonstration purposes, we'll create an empty hub first, then add the P2S gateway in the next section. But, you can choose to incorporate the P2S gateway settings from the next section at the same time you configure the hub.
85+
86+
[!INCLUDE [Create an empty hub](../../includes/virtual-wan-hub-basics.md)]
87+
88+
After configuring the settings, click **Review + create** to validate, then **Create** the hub. It can take up to 30 minutes to create a hub.
89+
90+
## <a name="hub"></a>Add a P2S gateway to a hub
91+
92+
This section shows you how to add a gateway to an already existing virtual hub. It can take up to 30 minutes to update a hub.
93+
94+
1. Go to your Virtual WAN. In the left pane, expand **Settings** and select **Hubs**.
95+
1. Click the name of the hub that you want to edit.
96+
1. Click **Edit virtual hub** at the top of the page to open the **Edit virtual hub** page.
97+
1. On the **Edit virtual hub** page, check the checkboxes for **Include vpn gateway for vpn sites** and **Include point-to-site gateway** to reveal the settings. Then configure the values.
98+
99+
:::image type="content" source="./media/virtual-wan-point-to-site-azure-ad/hub.png" alt-text="Screenshot shows the Edit virtual hub." lightbox="./media/virtual-wan-point-to-site-azure-ad/hub.png":::
100+
101+
* **Gateway scale units**: Select the Gateway scale units. Scale units represent the aggregate capacity of the User VPN gateway. If you select 40 or more gateway scale units, plan your client address pool accordingly. For information about how this setting impacts the client address pool, see [About client address pools](about-client-address-pools.md). For information about gateway scale units, see the [FAQ](virtual-wan-faq.md#p2s-concurrent).
102+
* **User VPN configuration**: Select the configuration that you created earlier.
103+
* **User Groups to Address Pools Mapping**: Specify address pools. For information about this setting, see [Configure user groups and IP address pools for P2S User VPNs](user-groups-create.md).
104+
105+
1. After configuring the settings, click **Confirm** to update the hub. It can take up to 30 minutes to update a hub.
106+
107+
## <a name="connect-vnet"></a>Connect virtual network to hub
108+
109+
In this section, you create a connection between your virtual hub and your virtual network.
110+
111+
[!INCLUDE [Connect virtual network](../../includes/virtual-wan-connect-vnet-hub-include.md)]
112+
113+
## <a name="download-profile"></a>Download User VPN profile
114+
115+
All of the necessary configuration settings for the VPN clients are contained in a VPN client configuration zip file. The settings in the zip file help you easily configure the VPN clients. The VPN client configuration files that you generate are specific to the User VPN configuration for your gateway. You can download global (WAN-level) profiles, or a profile for a specific hub. For information and additional instructions, see [Download global and hub profiles](global-hub-profile.md). The following steps walk you through downloading a global WAN-level profile.
116+
117+
[!INCLUDE [Download profile](../../includes/virtual-wan-p2s-download-profile-include.md)]
118+
119+
## <a name="configure-client"></a>Configure the Azure VPN Client
120+
121+
Next, you examine the profile configuration package, configure the Azure VPN Client for the client computers, and connect to Azure. See the articles listed in the Next steps section.
122+
123+
## Next steps
124+
125+
Configure the Azure VPN Client. You can use the steps in the VPN Gateway client documentation to configure the Azure VPN Client for Virtual WAN.
126+
127+
* [Azure VPN Client for Linux](../vpn-gateway/point-to-site-entra-vpn-client-linux.md)
128+
* [Azure VPN Client for Windows](../vpn-gateway/point-to-site-entra-vpn-client-windows.md)
129+
* [Azure VPN Client for macOS](../vpn-gateway/point-to-site-entra-vpn-client-mac.md)
Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
---
2+
author: cherylmc
3+
ms.author: cherylmc
4+
ms.date: 01/14/2025
5+
ms.service: azure-vpn-gateway
6+
ms.custom: linux-related-content
7+
ms.topic: include
8+
---
9+
Virtual WAN now supports a new Microsoft-registered App ID and corresponding Audience values for the latest versions of the Azure VPN Client. When you configure a P2S User VPN VPN gateway using the new Audience values, you skip the Azure VPN Client app manual registration process for your Microsoft Entra tenant. The App ID is already created and your tenant is automatically able to use it with no extra registration steps. This process is more secure than manually registering the Azure VPN Client because you don't need to authorize the app or assign permissions via the Global administrator role.
10+
11+
Previously, you were required to manually register (integrate) the Azure VPN Client app with your Microsoft Entra tenant. Registering the client app creates an App ID representing the identity of the Azure VPN Client application and requires authorization using the Global Administrator role. To better understand the difference between the types of application objects, see [How and why applications are added to Microsoft Entra ID](/entra/identity-platform/how-applications-are-added).
12+
13+
When possible, we recommend that you configure new P2S User VPN gateways using the Microsoft-registered Azure VPN client App ID and its corresponding Audience values instead of manually registering the Azure VPN Client app with your tenant. If you have a previously configured a P2S User VPN gateway that uses Microsoft Entra ID authentication, you can update the gateway and clients to take advantage of the new Microsoft-registered App ID. Updating the P2S gateway with the new Audience value is required if you want Linux clients to connect. The Azure VPN Client for Linux isn't backward compatible with the older Audience values.
14+
15+
**Considerations and limitations**
16+
17+
* A P2S User VPN gateway can only support one Audience value. It can't support multiple Audience values simultaneously.
18+
19+
* At this time, the newer Microsoft-registered App ID doesn't support as many Audience values as the older, manually registered app. If you need an Audience value for anything other than Azure Public or Custom, use the older manually registered method and values.
20+
21+
* The Azure VPN Client for Linux isn't backward compatible with P2S gateways configured to use the older Audience values that align with the manually registered app. The Azure VPN Client for Linux does support Custom Audience values.
22+
23+
* [!INCLUDE [Supported versions](vpn-gateway-azure-vpn-client-linux-supported-releases.md)]
24+
25+
* The Azure VPN Client for macOS and Windows is backward compatible with P2S gateways configured to use the older Audience values that align with the manually registered app. You can also use Custom Audience values with these clients.
26+
27+
**Azure VPN Client Audience values**
28+
29+
The following table shows the versions of the Azure VPN Client that are supported for each App ID and the corresponding available Audience values.
30+
31+
[!INCLUDE [About the Microsoft-registered Azure VPN Client](vpn-gateway-entra-audience-values.md)]

includes/virtual-wan-hub-basics.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
ms.author: cherylmc
33
author: cherylmc
4-
ms.date: 07/28/2023
4+
ms.date: 01/14/2025
55
ms.service: azure-virtual-wan
66
ms.topic: include
77
---
@@ -18,4 +18,4 @@ ms.topic: include
1818
* **Name**: The name by which you want the virtual hub to be known.
1919
* **Hub private address space**: The hub's address range in CIDR notation. The minimum address space is /24 to create a hub.
2020
* **Virtual hub capacity**: Select from the dropdown. For more information, see [Virtual hub settings](/azure/virtual-wan/hub-settings).
21-
* **Hub routing preference**: Leave as default. For more information, see [Virtual hub routing preference](/azure/virtual-wan/about-virtual-hub-routing-preference).
21+
* **Hub routing preference**: Leave the setting as the default, **ExpressRoute** unless you have a specific need to change this field. For more information, see [Virtual hub routing preference](/azure/virtual-wan/about-virtual-hub-routing-preference).

0 commit comments

Comments
 (0)