You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/virtual-wan/user-groups-about.md
+7-75Lines changed: 7 additions & 75 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ description: Learn about using user groups to assign IP addresses from specific
5
5
author: cherylmc
6
6
ms.service: virtual-wan
7
7
ms.topic: conceptual
8
-
ms.date: 05/29/2023
8
+
ms.date: 07/31/2023
9
9
ms.author: cherylmc
10
10
11
11
---
@@ -25,79 +25,7 @@ This article covers the following concepts:
25
25
* Configuration requirements and limitations
26
26
* Use cases
27
27
28
-
## Server configuration concepts
29
-
30
-
The following sections explain the common terms and values used for server configuration.
31
-
32
-
### User Groups (policy groups)
33
-
34
-
A **User Group** or policy group is a logical representation of a group of users that should be assigned IP addresses from the same address pool.
35
-
36
-
### Group members (policy members)
37
-
38
-
User groups consist of members. Members don't correspond to individual users but rather define the criteria used to determine which group a connecting user is a part of. A single group can have multiple members. If a connecting user matches the criteria specified for one of the group's members, the user is considered to be part of that group and can be assigned an appropriate IP address.
39
-
The types of member parameters that are available depend on the authentication methods specified in the VPN server configuration. For a full list of available criteria, see the [Available group settings](#available-group-settings) section of this article.
40
-
41
-
### Default user/policy group
42
-
43
-
For every P2S VPN server configuration, one group must be selected as default. Users who present credentials that don't match any group settings are considered to be part of the default group. Once a group is created, the default setting of that group can't be changed.
44
-
45
-
### Group priority
46
-
47
-
Each group is also assigned a numerical priority. Groups with lower priority are evaluated first. This means that if a user presents credentials that match the settings of multiple groups, they're considered part of the group with the lowest priority. For example, if user A presents a credential that corresponds to the IT Group (priority 3) and Finance Group (priority 4), user A is considered part of the IT Group for purposes of assigning IP addresses.
48
-
49
-
### Available group settings
50
-
51
-
The following section describes the different parameters that can be used to define which groups members are a part of. The available parameters vary based on selected authentication methods.
52
-
The following table summarizes the available setting types and acceptable values. For more detailed information on each type of Member Value, view the section corresponding to your authentication type.
53
-
54
-
|Authentication type|Member type |Member values|Example member value|
55
-
|---|---|---|---|
56
-
Azure Active Directory|AADGroupID|Azure Active Directory Group Object ID |0cf484f2-238e-440b-8c73-7bf232b248dc|
57
-
|RADIUS|AzureRADIUSGroupID|Vendor-specific Attribute Value (hexadecimal) (must begin with 6ad1bd)|6ad1bd23|
58
-
|Certificate|AzureCertificateID|Certificate Common Name domain name (CN=user@red.com)|red|
59
-
60
-
#### Azure Active Directory authentication (OpenVPN only)
61
-
62
-
Gateways using Azure Active Directory authentication can use **Azure Active Directory Group Object IDs** to determine which user group a user belongs to. If a user is part of multiple Azure Active Directory groups, they're considered to be part of the Virtual WAN user group that has the lowest numerical priority.
63
-
64
-
However, if you plan to have users who are external (users who aren't part of the Azure Active Directory domain configured on the VPN gateway) connect to the Virtual WAN Point-to-site VPN gateway, make sure that the user type of the external user is "Member" and **not** "Guest". Also, make sure that the "Name" of the user is set to the user's email address. If the user type and name of the connecting user isn't set correctly as described above or you can't set an external member to be a "Member" of your Azure Active Directory domain, that connecting user will be assigned to the default group and assigned an IP from the default IP address pool.
65
-
66
-
You can also identify whether or not a user is external by looking at the user's "User Principal Name." External users have **#EXT** in their "User Principal Name."
67
-
68
-
:::image type="content" source="./media/user-groups-about/groups.png" alt-text="Screenshot of an Azure Active Directory group." lightbox="./media/user-groups-about/groups.png":::
69
-
70
-
#### Azure Certificate (OpenVPN and IKEv2)
71
-
72
-
Gateways that use Certificate-based authentication use the **domain name** of user certificate Common Names (CN) to determine which group a connecting user is in. Common Names must be in one of the following formats:
73
-
74
-
* domain/username
75
-
*username@domain.com
76
-
77
-
Make sure that the **domain** is the input as a group member.
78
-
79
-
#### RADIUS server (OpenVPN and IKEv2)
80
-
81
-
Gateways that use RADIUS-based authentication use a new **Vendor-Specific Attribute (VSA)** to determine VPN user groups.
82
-
When RADIUS-based authentication is configured on the P2S gateway, the gateway serves as a Network Policy Server (NPS) proxy. This means that the P2S VPN gateway serves as a client to authenticate users with your RADIUS server using the RADIUS protocol.
83
-
84
-
After your RADIUS server has successfully verified the user's credentials, the RADIUS server can be configured to send a new Vendor-Specific Attribute (VSA) as part of Access-Accept packets. The P2S VPN gateway processes the VSA in the Access-Accept packets and assigns specific IP addresses to users based on the value of the VSAs.
85
-
86
-
Therefore, RADIUS servers should be configured to send a VSA with the same value for all users that are part of the same group.
87
-
88
-
>[!NOTE]
89
-
> The value of the VSA must be an octet hexadecimal string on the RADIUS server and the Azure. This octet string must begin with **6ad1bd**. The last two hexadecimal digits may be configured freely. For example, 6ad1bd98 is valid but 6ad12323 and 6a1bd2 would not be valid.
90
-
>
91
-
92
-
The new VSA is **MS-Azure-Policy-ID**.
93
-
94
-
The MS-Azure-Policy-ID VSA is used by the RADIUS server to send an identifier that is used by P2S VPN server to match an authenticated RADIUS user policy configured on Azure side. This policy is used to select the IP/ Routing configuration (assigned IP address) for the user.
95
-
96
-
The fields of MS-Azure-Policy-ID MUST be set as follows:
97
-
98
-
***Vendor-Type:** An 8-bit unsigned integer that MUST be set to 0x41 (integer: 65).
99
-
***Vendor-Length:** An 8-bit unsigned integer that MUST be set to the length of the octet string in the Attribute-Specific Value plus 2.
100
-
***Attribute-Specific Value:** An octet string containing Policy ID configured on Azure Point to Site VPN server.
28
+
[!INCLUDE [User groups configuration all](../../includes/virtual-wan-user-groups.md)]
101
29
102
30
For configuration information, see [RADIUS - configure NPS for vendor-specific attributes](user-groups-radius.md).
103
31
@@ -134,9 +62,13 @@ This section lists configuration requirements and limitations for user groups an
134
62
135
63
[!INCLUDE [User groups configuration considerations](../../includes/virtual-wan-user-groups-considerations.md)]
136
64
65
+
* Address pools can't overlap with address pools used in other connection configurations (same or different gateways) in the same virtual WAN.
66
+
67
+
* Address pools also can't overlap with virtual network address spaces, virtual hub address spaces, or on-premises addresses.
68
+
137
69
## Use cases
138
70
139
-
Contoso corporation is composed of multiple functional departments, such as Finance, Human Resources and Engineering. Contoso uses Virtual WAN to allow remote workers (users) to connect to Azure Virtual WAN and access resources hosted on-premises or in a Virtual Network connected to the Virtual WAN hub.
71
+
Contoso corporation is composed of multiple functional departments, such as Finance, Human Resources and Engineering. Contoso uses Azure Virtual WAN to allow remote workers (users) to connect to the virtual WAN and access resources hosted on-premises or in a virtual network connected to the virtual WAN hub.
140
72
141
73
However, Contoso has internal security policies where users from the Finance department can only access certain databases and virtual machines, and users from Human Resources have access to other sensitive applications.
* The maximum number of groups that can be referenced by a single P2S VPN gateway is 90. The maximum number of policy/group members (criteria used to identify which group a connecting user is a part of) in groups assigned to a gateway is 390. However, if a group is assigned to multiple connection configurations on the same gateway, this group and its members are counted multiple times towards the limits. For example, if there's a policy group with 10 members that is assigned to three VPN connection configurations on the gateway. This configuration would count as three groups with 30 total members as opposed to one group with 10 members. The total number of concurrent users connecting to a gateway is limited by the gateway scale unit and the number of IP
10
-
addresses allocated to each user group and not the number of policy/group members associated with a gateway.
9
+
* The maximum number of groups that can be referenced by a single P2S VPN gateway is 90. The maximum number of policy/group members (criteria used to identify which group a connecting user is a part of) in groups assigned to a gateway is 390. However, if a group is assigned to multiple connection configurations on the same gateway, this group and its members are counted multiple times towards the limits. For example, if there's a policy group with 10 members that is assigned to three VPN connection configurations on the gateway. This configuration would count as three groups with 30 total members as opposed to one group with 10 members. The total number of concurrent users connecting to a gateway is limited by the gateway scale unit and the number of IP addresses allocated to each user group and not the number of policy/group members associated with a gateway.
11
10
12
11
* Once a group has been created as part of a VPN server configuration, the name and default setting of a group can't be modified.
13
12
@@ -18,5 +17,3 @@ addresses allocated to each user group and not the number of policy/group member
18
17
* Groups that are being used by existing point-to-site VPN gateways can't be deleted.
19
18
20
19
* You can reorder the priorities of your groups by clicking on the up-down arrow buttons corresponding to that group.
21
-
22
-
* Address pools can't overlap with address pools used in other connection configurations (same or different gateways) in the same virtual WAN. Address pools also can't overlap with virtual network address spaces, virtual hub address spaces, or on-premises addresses
#This article is used for both Virtual WAN and VPN Gateway. Any updates to the article must work for both of these services. Otherwise, update the VWAN or VPNGW article directly.
9
+
---
10
+
11
+
## Server configuration concepts
12
+
13
+
The following sections explain the common terms and values used for server configuration.
14
+
15
+
### User Groups (policy groups)
16
+
17
+
A **User Group** or policy group is a logical representation of a group of users that should be assigned IP addresses from the same address pool.
18
+
19
+
### Group members (policy members)
20
+
21
+
User groups consist of members. Members don't correspond to individual users but rather define the criteria used to determine which group a connecting user is a part of. A single group can have multiple members. If a connecting user matches the criteria specified for one of the group's members, the user is considered to be part of that group and can be assigned an appropriate IP address.
22
+
The types of member parameters that are available depend on the authentication methods specified in the VPN server configuration. For a full list of available criteria, see the [Available group settings](#available-group-settings) section of this article.
23
+
24
+
### Default user/policy group
25
+
26
+
For every P2S VPN server configuration, one group must be selected as default. Users who present credentials that don't match any group settings are considered to be part of the default group. Once a group is created, the default setting of that group can't be changed.
27
+
28
+
### Group priority
29
+
30
+
Each group is also assigned a numerical priority. Groups with lower priority are evaluated first. This means that if a user presents credentials that match the settings of multiple groups, they're considered part of the group with the lowest priority. For example, if user A presents a credential that corresponds to the IT Group (priority 3) and Finance Group (priority 4), user A is considered part of the IT Group for purposes of assigning IP addresses.
31
+
32
+
### Available group settings
33
+
34
+
The following section describes the different parameters that can be used to define which groups members are a part of. The available parameters vary based on selected authentication methods.
35
+
The following table summarizes the available setting types and acceptable values. For more detailed information on each type of Member Value, view the section corresponding to your authentication type.
36
+
37
+
|Authentication type|Member type |Member values|Example member value|
38
+
|---|---|---|---|
39
+
Azure Active Directory|AADGroupID|Azure Active Directory Group Object ID |0cf484f2-238e-440b-8c73-7bf232b248dc|
40
+
|RADIUS|AzureRADIUSGroupID|Vendor-specific Attribute Value (hexadecimal) (must begin with 6ad1bd)|6ad1bd23|
41
+
|Certificate|AzureCertificateID|Certificate Common Name domain name (CN=user@red.com)|red|
42
+
43
+
#### Azure Active Directory authentication (OpenVPN only)
44
+
45
+
Gateways using Azure Active Directory authentication can use **Azure Active Directory Group Object IDs** to determine which user group a user belongs to. If a user is part of multiple Azure Active Directory groups, they're considered to be part of the P2S VPN user group that has the lowest numerical priority.
46
+
47
+
However, if you plan to have users who are external (users who aren't part of the Azure Active Directory domain configured on the VPN gateway) connect to the point-to-site VPN gateway, make sure that the user type of the external user is "Member" and **not** "Guest". Also, make sure that the "Name" of the user is set to the user's email address. If the user type and name of the connecting user isn't set correctly as described above or you can't set an external member to be a "Member" of your Azure Active Directory domain, that connecting user will be assigned to the default group and assigned an IP from the default IP address pool.
48
+
49
+
You can also identify whether or not a user is external by looking at the user's "User Principal Name." External users have **#EXT** in their "User Principal Name."
50
+
51
+
:::image type="content" source="./media/virtual-wan-user-groups-about/groups.png" alt-text="Screenshot of an Azure Active Directory group." lightbox="./media/virtual-wan-user-groups-about/groups.png":::
52
+
53
+
#### Azure Certificate (OpenVPN and IKEv2)
54
+
55
+
Gateways that use Certificate-based authentication use the **domain name** of user certificate Common Names (CN) to determine which group a connecting user is in. Common Names must be in one of the following formats:
56
+
57
+
* domain/username
58
+
*username@domain.com
59
+
60
+
Make sure that the **domain** is the input as a group member.
61
+
62
+
#### RADIUS server (OpenVPN and IKEv2)
63
+
64
+
Gateways that use RADIUS-based authentication use a new **Vendor-Specific Attribute (VSA)** to determine VPN user groups.
65
+
When RADIUS-based authentication is configured on the P2S gateway, the gateway serves as a Network Policy Server (NPS) proxy. This means that the P2S VPN gateway serves as a client to authenticate users with your RADIUS server using the RADIUS protocol.
66
+
67
+
After your RADIUS server has successfully verified the user's credentials, the RADIUS server can be configured to send a new Vendor-Specific Attribute (VSA) as part of Access-Accept packets. The P2S VPN gateway processes the VSA in the Access-Accept packets and assigns specific IP addresses to users based on the value of the VSAs.
68
+
69
+
Therefore, RADIUS servers should be configured to send a VSA with the same value for all users that are part of the same group.
70
+
71
+
> [!NOTE]
72
+
> The value of the VSA must be an octet hexadecimal string on the RADIUS server and the Azure. This octet string must begin with **6ad1bd**. The last two hexadecimal digits may be configured freely. For example, 6ad1bd98 is valid but 6ad12323 and 6a1bd2 would not be valid.
73
+
>
74
+
75
+
The new VSA is **MS-Azure-Policy-ID**.
76
+
77
+
The MS-Azure-Policy-ID VSA is used by the RADIUS server to send an identifier that is used by P2S VPN server to match an authenticated RADIUS user policy configured on Azure side. This policy is used to select the IP/ Routing configuration (assigned IP address) for the user.
78
+
79
+
The fields of MS-Azure-Policy-ID MUST be set as follows:
80
+
81
+
***Vendor-Type:** An 8-bit unsigned integer that MUST be set to 0x41 (integer: 65).
82
+
***Vendor-Length:** An 8-bit unsigned integer that MUST be set to the length of the octet string in the Attribute-Specific Value plus 2.
83
+
***Attribute-Specific Value:** An octet string containing Policy ID configured on Azure point-to-site VPN server.
0 commit comments