|
1 | 1 | ---
|
2 |
| - title: include file |
3 |
| - description: include file |
4 |
| - services: vpn-gateway |
5 |
| - author: cherylmc |
6 |
| - ms.service: azure-vpn-gateway |
7 |
| - ms.topic: include |
8 |
| - ms.date: 08/23/2023 |
9 |
| - ms.author: cherylmc |
10 |
| - ms.custom: include file |
| 2 | +ms.author: cherylmc |
| 3 | +author: cherylmc |
| 4 | +ms.date: 09/24/2024 |
| 5 | +ms.service: azure-vpn-gateway |
| 6 | +ms.topic: include |
11 | 7 |
|
12 | 8 | # this file is used for both virtual wan and vpn gateway. When modifying, make sure that your changes work for both environments.
|
13 | 9 | ---
|
14 |
| -Conditional Access allows for fine-grained access control on a per-application basis. In order to use Conditional Access, you should have Microsoft Entra ID P1 or P2 or greater licensing applied to the users that will be subject to the Conditional Access rules. |
15 | 10 |
|
16 |
| -1. Navigate to the **Enterprise applications - All applications** page and click **Azure VPN**. |
| 11 | +Conditional Access allows for fine-grained access control on a per-application basis. In order to use Conditional Access, you should have Microsoft Entra ID P1 or P2 or greater licensing applied to the users that will be subject to the Conditional Access rules. For more information, see [What is Conditional Access](https://learn.microsoft.com/entra/identity/conditional-access/overview)? |
| 12 | + |
| 13 | +1. Go to the **Microsoft Entra ID - Enterprise applications - All applications** page and click **Azure VPN**. |
17 | 14 |
|
18 | 15 | - Click **Conditional Access**.
|
19 | 16 | - Click **New policy** to open the **New** pane.
|
20 |
| -2. On the **New** pane, navigate to **Assignments -> Users and groups**. On the **Users and groups ->** **Include** tab: |
| 17 | +1. On the **New** pane, navigate to **Assignments -> Users and groups**. On the **Users and groups ->** **Include** tab: |
21 | 18 |
|
22 | 19 | - Click **Select users and groups**.
|
23 | 20 | - Check **Users and groups**.
|
24 | 21 | - Click **Select** to select a group or set of users to be affected by MFA.
|
25 | 22 | - Click **Done**.
|
26 | 23 |
|
27 |
| -  |
28 |
| -3. On the **New** pane, navigate to the **Access controls -> Grant** pane: |
| 24 | + :::image type="content" source="./media/vpn-gateway-vwan-openvpn-mfa/mfa-ca-assignments.png" alt-text="Screenshot of assignments settings." lightbox="./media/vpn-gateway-vwan-openvpn-mfa/mfa-ca-assignments.png"::: |
| 25 | +1. On the **New** pane, navigate to the **Access controls -> Grant** pane: |
29 | 26 |
|
30 | 27 | - Click **Grant access**.
|
31 | 28 | - Click **Require multi-factor authentication**.
|
32 | 29 | - Click **Require all the selected controls**.
|
33 | 30 | - Click **Select**.
|
34 |
| - |
35 |
| -  |
36 |
| -4. In the **Enable policy** section: |
37 | 31 |
|
38 |
| - - Select **On**. |
39 |
| - - Click **Create**. |
| 32 | + :::image type="content" source="./media/vpn-gateway-vwan-openvpn-mfa/mfa-ca-grant-mfa.png" alt-text="Screenshot of multifactor authentication access." lightbox="./media/vpn-gateway-vwan-openvpn-mfa/mfa-ca-grant-mfa.png"::: |
| 33 | +1. In the **Enable policy** section: |
40 | 34 |
|
41 |
| -  |
| 35 | + - Select **On**. |
| 36 | + - Click **Create** to create the policy. |
0 commit comments