Skip to content

Commit c79fd68

Browse files
major changes to align with other azure docs
1 parent c888a7c commit c79fd68

File tree

1 file changed

+12
-11
lines changed

1 file changed

+12
-11
lines changed

articles/bastion/kerberos-authentication-portal.md

Lines changed: 12 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -63,9 +63,9 @@ Once you have enabled Kerberos on your Bastion resource, you can verify that it'
6363
1. End the VM session.
6464
1. Connect to the target VM again using Bastion. Sign-in should succeed, indicating that Bastion used Kerberos (and not NTLM) for authentication.
6565

66-
## Setup
66+
## Quickstart: Setup Bastion with Kerberos - Resource Manager template
6767

68-
### Sample KerberosDeployment.json
68+
### Review the template
6969

7070
```
7171
{
@@ -406,22 +406,23 @@ Once you have enabled Kerberos on your Bastion resource, you can verify that it'
406406
]
407407
}
408408
```
409-
410-
To setup Kerberos, deploy the `KerberosDeployment.json` ARM template by running the following PS cmd:
411-
```
412-
New-AzResourceGroupDeployment -ResourceGroupName <your-rg-name> -TemplateFile "<path-to-template>\KerberosDeployment.json"`
413-
```
414-
This template does the following:
409+
The following resources have been defined in the template:
415410
- Deploys the following Azure resources:
416-
- Virtual Network
417-
- A Standard SKU Bastion with a public IP and Kerberos feature enabled
418-
- A Windows 10 ClientVM and a Windows Server 2019 ServerVM
411+
- [**Microsoft.Network/virtualNetworks**](/azure/templates/microsoft.network/virtualnetworks): create an Azure virtual network.
412+
- [**Microsoft.Network/bastionHosts**](/azure/templates/microsoft.network/bastionHosts): create a Standard SKU Bastion with a public IP and Kerberos feature enabled
413+
- Create a Windows 10 ClientVM and a Windows Server 2019 ServerVM
419414
- Have the DNS Server of the VNET point to the private IP address of the ServerVM (domain controller).
420415
- Runs a Custom Script Extension on the ServerVM to promote it to a domain controller with domain name: `bastionkrb.test`.
421416
- Runs a Custom Script Extension on the ClientVM to have it:
422417
- **Restrict NTLM: Incoming NTLM traffic** = Deny all domain accounts (this is to ensure Kerberos is used for authentication).
423418
- Domain-join the `bastionkrb.test` domain.
424419

420+
## Deploy the template
421+
To setup Kerberos, deploy the ARM template above by running the following PS cmd:
422+
```
423+
New-AzResourceGroupDeployment -ResourceGroupName <your-rg-name> -TemplateFile "<path-to-template>\KerberosDeployment.json"`
424+
```
425+
## Review deployed resources
425426
Now, login to ClientVM using Bastion with Kerberos authentication:
426427
- credentials: username = `[email protected]` and password = `<password-entered-during-deployment>`.
427428

0 commit comments

Comments
 (0)