Skip to content

Commit d4197fd

Browse files
committed
Update considerations
1 parent 4454b4c commit d4197fd

File tree

1 file changed

+18
-11
lines changed

1 file changed

+18
-11
lines changed

articles/vpn-gateway/openvpn-azure-ad-tenant-multi-app.md

Lines changed: 18 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -5,16 +5,20 @@ description: Learn how to set up a Microsoft Entra tenant for P2S OpenVPN authen
55
author: cherylmc
66
ms.service: vpn-gateway
77
ms.topic: conceptual
8-
ms.date: 05/15/2024
8+
ms.date: 07/09/2024
99
ms.author: cherylmc
1010
ms.custom: engagement-fy23
1111
---
1212

13-
# Configure P2S for access based on users and groups - Microsoft Entra ID authentication
13+
# Configure P2S for access based on users and groups - Microsoft Entra ID authentication - manual app registration
1414

15-
When you use Microsoft Entra ID as the authentication method for P2S, you can configure P2S to allow different access for different users and groups. If you want different sets of users to be able to connect to different VPN gateways, you can register multiple apps in AD and link them to different VPN gateways. This article helps you set up a Microsoft Entra tenant for P2S Microsoft Entra authentication and create and register multiple apps in Microsoft Entra ID for allowing different access for different users and groups. For more information about point-to-site protocols and authentication, see [About point-to-site VPN](point-to-site-about.md). These steps walk you through manually registering the Azure VPN Client App with your Microsoft Entra tenant.
15+
When you use Microsoft Entra ID as the authentication method for point-to-site (P2S), you can configure P2S to allow different access for different users and groups. This article helps you set up a Microsoft Entra tenant for P2S Microsoft Entra authentication and create and register multiple VPN apps in Microsoft Entra ID to allow different access for different users and groups. For more information about P2S protocols and authentication, see [About point-to-site VPN](point-to-site-about.md).
1616

17-
[!INCLUDE [OpenVPN note](../../includes/vpn-gateway-openvpn-auth-include.md)]
17+
Considerations:
18+
19+
* You can't create this type of granular access if you have only one VPN gateway.
20+
* To assign different users and groups different access, register multiple apps with Microsoft Entra ID and then link them to different VPN gateways.
21+
* Microsoft Entra ID authentication is supported only for OpenVPN® protocol connections and requires the Azure VPN Client.
1822

1923
<a name='azure-ad-tenant'></a>
2024

@@ -34,24 +38,27 @@ The steps in this article require a Microsoft Entra tenant. If you don't have a
3438
* Global administrator account
3539
* User account
3640

37-
The global administrator account will be used to grant consent to the Azure VPN app registration. The user account can be used to test OpenVPN authentication.
41+
The global administrator account is used to grant consent to the Azure VPN app registration. The user account can be used to test OpenVPN authentication.
3842

39-
1. Assign one of the accounts the **Global administrator** role. For steps, see [Assign administrator and non-administrator roles to users with Microsoft Entra ID](../active-directory/fundamentals/active-directory-users-assign-role-azure-portal.md).
43+
1. Assign one of the accounts the **Global administrator** role. For steps, see [Assign user roles with Microsoft Entra ID](/entra/fundamentals/users-assign-role-azure-portal).
4044

4145
## Authorize the Azure VPN application
4246

4347
[!INCLUDE [Steps to authorize the Azure VPN app](../../includes/vpn-gateway-vwan-azure-ad-tenant.md)]
4448

4549
## Register additional applications
4650

47-
In this section, you can register additional applications for various users and groups. Repeat the steps to create as many applications that are needed for your security requirements. Each application will be associated to a VPN gateway and can have a different set of users. Only one application can be associated to a gateway.
51+
In this section, you can register additional applications for various users and groups. Repeat the steps to create as many applications that are needed for your security requirements.
52+
53+
* You must have more than one VPN gateway to configure this type of granular access.
54+
* Each application is associated to a different VPN gateway and can have a different set of users.
4855

4956
### Add a scope
5057

5158
1. In the Azure portal, select **Microsoft Entra ID**.
5259
1. In the left pane, select **App registrations**.
5360
1. At the top of the **App registrations** page, select **+ New registration**.
54-
1. On the **Register an application** page, enter the **Name**. For example, MarketingVPN. You can always change the name later.
61+
1. On the **Register an application** page, enter the **Name**. For example, MarketingVPN or Group1. You can always change the name later.
5562
* Select the desired **Supported account types**.
5663
* At the bottom of the page, click **Register**.
5764
1. Once the new app has been registered, in the left pane, click **Expose an API**. Then click **+ Add a scope**.
@@ -83,7 +90,7 @@ When you enable authentication on the VPN gateway, you'll need the **Application
8390

8491
1. Go to the **Overview** page.
8592

86-
1. Copy the **Application (client) ID** from the **Overview** page and save it so that you can access this value later. You'll need this information to configure your VPN gateway(s).
93+
1. Copy the **Application (client) ID** from the **Overview** page and save it so that you can access this value later. You'll need this information to configure your VPN gateways.
8794

8895
:::image type="content" source="./media/openvpn-azure-ad-tenant-multi-app/client-id.png" alt-text="Screenshot showing Client ID value." lightbox="./media/openvpn-azure-ad-tenant-multi-app/client-id.png":::
8996

@@ -92,7 +99,7 @@ When you enable authentication on the VPN gateway, you'll need the **Application
9299
Assign the users to your applications. If you're specifying a group, the user must be a direct member of the group. Nested groups aren't supported.
93100

94101
1. Go to your Microsoft Entra ID and select **Enterprise applications**.
95-
1. From the list, locate the application you just registered and click to open it.
102+
1. From the list, locate the application you registered and click to open it.
96103
1. Click **Properties**. On the **Properties** page, verify that **Enabled for users to sign in** is set to **Yes**. If not, change the value to **Yes**.
97104
1. For **Assignment required**, change the value to **Yes**. For more information about this setting, see [Application properties](../active-directory/manage-apps/application-properties.md#enabled-for-users-to-sign-in).
98105
1. If you've made changes, click **Save** to save your settings.
@@ -120,7 +127,7 @@ In this step, you configure P2S Microsoft Entra authentication for the virtual n
120127
For **Microsoft Entra ID** values, use the following guidelines for **Tenant**, **Audience**, and **Issuer** values.
121128

122129
* **Tenant**: `https://login.microsoftonline.com/{TenantID}`
123-
* **Audience ID**: Use the value that you created in the previous section that corresponds to **Application (client) ID**. Don't use the application ID for "Azure VPN" Microsoft Entra Enterprise App - use application ID that you created and registered. If you use the application ID for the "Azure VPN" Microsoft Entra Enterprise App instead, this will grant all users access to the VPN gateway (which would be the default way to set up access), instead of granting only the users that you assigned to the application that you created and registered.
130+
* **Audience ID**: Use the value that you created in the previous section that corresponds to **Application (client) ID**. Don't use the application ID for "Azure VPN" Microsoft Entra Enterprise App - use application ID that you created and registered. If you use the application ID for the "Azure VPN" Microsoft Entra Enterprise App instead, this grants all users access to the VPN gateway (which would be the default way to set up access), instead of granting only the users that you assigned to the application that you created and registered.
124131
* **Issuer**: `https://sts.windows.net/{TenantID}` For the Issuer value, make sure to include a trailing **/** at the end.
125132

126133
1. Once you finish configuring settings, click **Save** at the top of the page.

0 commit comments

Comments
 (0)