Skip to content

Commit ea37903

Browse files
authored
Merge pull request #76981 from jaszperez/patch-41
Cleaned up final edits
2 parents 5edaf69 + 4e595e5 commit ea37903

File tree

1 file changed

+27
-22
lines changed

1 file changed

+27
-22
lines changed

articles/active-directory/manage-apps/application-proxy-deployment-plan.md

Lines changed: 27 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,9 @@ ms.reviewer:
2020
---
2121
# Plan an Azure AD Application Proxy deployment
2222

23-
Azure Active Directory (Azure AD) Application Proxy is a secure and cost-effective remote access solution for on-premises applications. It provides an immediate transition path for “Cloud First” organizations to manage access to legacy on-premises applications that aren’t yet capable of using modern protocols. For additional introductory information, see [What is Application Proxy](https://docs.microsoft.com/azure/active-directory/manage-apps/application-proxy) and [How Application Proxy Works](https://docs.microsoft.com/azure/active-directory/manage-apps/application-proxy).
23+
Azure Active Directory (Azure AD) Application Proxy is a secure and cost-effective remote access solution for on-premises applications. It provides an immediate transition path for “Cloud First” organizations to manage access to legacy on-premises applications that aren’t yet capable of using modern protocols. For additional introductory information, see [What is Application Proxy](https://docs.microsoft.com/azure/active-directory/manage-apps/application-proxy).
24+
25+
Application Proxy is recommended for giving remote users access to internal resources. Application Proxy replaces the need for a VPN or reverse proxy for these remote access use cases. It is not intended for users who are on the corporate network. These users who use Application Proxy for intranet access may experience undesirable performance issues.
2426

2527
This article includes the resources you need to plan, operate, and manage Azure AD Application Proxy.
2628

@@ -37,26 +39,31 @@ You need to meet the following prerequisites before beginning your implementatio
3739
* A VM hosted within any hypervisor solution
3840
* A VM hosted in Azure to enable outbound connection to the Application Proxy service.
3941

40-
See [Understand Azure AD App Proxy Connectors](application-proxy-connectors.md) for a more detailed overview.
42+
* See [Understand Azure AD App Proxy Connectors](application-proxy-connectors.md) for a more detailed overview.
4143

42-
* Connector hosts must [be enabled for TLS 1.2](application-proxy-add-on-premises-application.md) before installing the connectors.
44+
* Connector machines must [be enabled for TLS 1.2](application-proxy-add-on-premises-application.md) before installing the connectors.
4345

44-
* If possible, deploy connectors in the [same network](application-proxy-network-topology.md) and segment as the back-end web application servers. It's best to deploy connector hosts after you complete a discovery of applications.
46+
* If possible, deploy connectors in the [same network](application-proxy-network-topology.md) and segment as the back-end web application servers. It's best to deploy connectors after you complete a discovery of applications.
47+
* We recommend that each connector group has at least two connectors to provide high availability and scale. Having three connectors is optimal in case you may need to service a machine at any point. Review the [connector capacity table](https://docs.microsoft.com/azure/active-directory/manage-apps/application-proxy-connectors#capacity-planning) to help with deciding what type of machine to install connectors on. The larger the machine the more buffer and performant the connector will be.
4548

46-
* **Network access settings**: Azure AD Application Proxy connectors [attempt to connect to Azure via HTTPS (TCP Port 443) and HTTP (TCP Port 80)](application-proxy-add-on-premises-application.md).
49+
* **Network access settings**: Azure AD Application Proxy connectors [connect to Azure via HTTPS (TCP Port 443) and HTTP (TCP Port 80)](application-proxy-add-on-premises-application.md).
4750

4851
* Terminating connector TLS traffic isn't supported and will prevent connectors from establishing a secure channel with their respective Azure App Proxy endpoints.
4952

5053
* Avoid all forms of inline inspection on outbound TLS communications between connectors and Azure. Internal inspection between a connector and backend applications is possible, but could degrade the user experience, and as such, isn't recommended.
5154

52-
* Load balancing of the Proxy connectors themselves is also not supported, or even necessary.
55+
* Load balancing of the connectors themselves is also not supported, or even necessary.
5356

5457
### Important considerations before configuring Azure AD Application Proxy
5558

5659
The following core requirements must be met in order to configure and implement Azure AD Application Proxy.
5760

5861
* **Azure onboarding**: Before deploying application proxy, user identities must be synchronized from an on-premises directory or created directly within your Azure AD tenants. Identity synchronization allows Azure AD to pre-authenticate users before granting them access to App Proxy published applications and to have the necessary user identifier information to perform single sign-on (SSO).
5962

63+
* **Conditional access requirements**: We do not recommend using Application Proxy for intranet access because this adds latency that will impact users. We recommend using Application Proxy with pre-authentication and conditional access policies for remote access from the internet. An approach to provide conditional access for intranet use is to modernize applications so they can diretly authenticate with AAD. Refer to [Resources for migrating applications to AAD](https://docs.microsoft.com/azure/active-directory/manage-apps/migration-resources) for more information.
64+
65+
* **Service limits**: To protect against overconsumption of resources by individual tenants there are throttling limits set per application and tenant. To see these limits refer to [Azure AD service limits and restrictions](https://docs.microsoft.com/azure/active-directory/users-groups-roles/directory-service-limits-restrictions). These throttling limits are based on a benchmark far above typical usage volume and provides ample buffer for a majority of deployments.
66+
6067
* **Public certificate**: If you are using custom domain names, you must procure a public certificate issued by a non-Microsoft trusted certificate authority. Depending on your organizational requirements, getting a certificate can take some time and we recommend beginning the process as early as possible. Azure Application Proxy supports standard, [wildcard](application-proxy-wildcard.md), or SAN-based certificates.
6168

6269
* **Domain requirements**: Single sign-on to your published applications using Kerberos Constrained Delegation (KCD) requires that a connector host is domain-joined to the same AD domain as the applications being publishing. For detailed information on the topic, see [KCD for single sign-on](application-proxy-configure-single-sign-on-with-kcd.md) with Application Proxy. The connector service runs in the context of the local system and should not be configured to use a custom identity.
@@ -69,13 +76,11 @@ The following core requirements must be met in order to configure and implement
6976

7077
* **Administrative rights and roles**
7178

72-
* **Connector installation** requires local admin rights to the Windows server that it's being installed on. It also requires a minimum of an Application Admin role to authenticate and register the connector instance to your Azure AD tenant.
79+
* **Connector installation** requires local admin rights to the Windows server that it's being installed on. It also requires a minimum of an *Application Administrator* role to authenticate and register the connector instance to your Azure AD tenant.
7380

7481
* **Application publishing and administration** require the *Application Administrator* role. Application Administrators can manage all applications in the directory including registrations, SSO settings, user and group assignments and licensing, Application Proxy settings, and consent. It doesn't grant the ability to manage conditional access. The *Cloud Application Administrator* role has all the abilities of the Application Administrator, except that it does not allow management of Application Proxy settings.
7582

76-
* **Licensing**: Application Proxy is available through the Azure AD Basic subscription. Refer to the [Azure Active Directory Pricing page](https://azure.microsoft.com/pricing/details/active-directory/) for a full list of licensing options and features.
77-
78-
* A role elevation may be required to obtain Application Administrator rights through [Privileged Identity Manager](https://docs.microsoft.com/azure/active-directory/privileged-identity-management/pim-configure) (PIM), so make sure your account is eligible.
83+
* **Licensing**: Application Proxy is available through the Azure AD Basic subscription. Refer to the [Azure Active Directory Pricing page](https://azure.microsoft.com/pricing/details/active-directory/) for a full list of licensing options and features.
7984

8085
### Application Discovery
8186

@@ -103,9 +108,9 @@ The following are areas for which you should define your organization’s busine
103108

104109
**Access**
105110

106-
* Domain and Azure AD users can access published applications securely with seamless single sign-on (SSO) when using any domain joined or Azure AD joined devices.
111+
* Remote users with domain joined or Azure AD joined devices users can access published applications securely with seamless single sign-on (SSO).
107112

108-
* Users with approved personal devices can securely access published applications provided they are enrolled in MFA and have registered the Microsoft Authenticator app on their mobile phone as an authentication method.
113+
* Remote users with approved personal devices can securely access published applications provided they are enrolled in MFA and have registered the Microsoft Authenticator app on their mobile phone as an authentication method.
109114

110115
**Governance**
111116

@@ -117,7 +122,7 @@ The following are areas for which you should define your organization’s busine
117122

118123
**Performance**
119124

120-
* There is no degradation of application performance compared to accessing application from internal network.
125+
* There is no degradation of application performance compared to accessing application from the internal network.
121126

122127
**User Experience**
123128

@@ -162,7 +167,7 @@ Conduct basic functional testing after publishing an application to ensure that
162167

163168
### Deploy Application Proxy
164169

165-
The steps to deploy your Application Proxy are covered in this [tutorial for adding an on-premises application for remote access](application-proxy-add-on-premises-application.md). If the installation isn't successful, select **Troubleshoot Application Proxy** in the portal or use the troubleshooting guide[for Problems with installing the Application Proxy Agent Connector](application-proxy-connector-installation-problem.md).
170+
The steps to deploy your Application Proxy are covered in this [tutorial for adding an on-premises application for remote access](application-proxy-add-on-premises-application.md). If the installation isn't successful, select **Troubleshoot Application Proxy** in the portal or use the troubleshooting guide [for Problems with installing the Application Proxy Agent Connector](application-proxy-connector-installation-problem.md).
166171

167172
### Publish applications via Application Proxy
168173

@@ -172,7 +177,7 @@ You can also publish applications by using [PowerShell](https://docs.microsoft.c
172177

173178
Below are some best practices to follow when publishing an application:
174179

175-
* **Use Connector Groups**: Assign a connector group that has been designated for publishing each respective application.
180+
* **Use Connector Groups**: Assign a connector group that has been designated for publishing each respective application. We recommend that each connector group has at least two connectors to provide high availability and scale. Having three connectors is optimal in case you may need to service a machine at any point. Additionally, see [Publish applications on separate networks and locations using connector groups](application-proxy-connector-groups.md) to see how you can also use connector groups to segment your connectors by network or location.
176181

177182
* **Set Backend Application Timeout**: This setting is useful in scenarios where the application might require more than 75 seconds to process a client transaction. For example when a client sends a query to a web application that acts as a front end to a database. The front end sends this query to its back-end database server and waits for a response, but by the time it receives a response, the client side of the conversation times out. Setting the timeout to Long provides 180 seconds for longer transactions to complete.
178183

@@ -188,7 +193,7 @@ Below are some best practices to follow when publishing an application:
188193

189194
* **Translate URLs in Application Body**: Turn on Application Body link translation for an app when you want the links from that app to be translated in responses back to the client. If enabled, this function provides a best effort attempt at translating all internal links that App Proxy finds in HTML and CSS responses being returned to clients. It is useful when publishing apps that contain either hard-coded absolute or NetBIOS shortname links in the content, or apps with content that links to other on-premises applications.
190195

191-
For scenarios where a published app links to other published apps, enable link translation or each application so that you have control over the user experience at the per-app level.
196+
For scenarios where a published app links to other published apps, enable link translation for each application so that you have control over the user experience at the per-app level.
192197

193198
For example, suppose that you have three applications published through Application Proxy that all link to each other: Benefits, Expenses, and Travel, plus a fourth app, Feedback, that isn't published through Application Proxy.
194199

@@ -223,23 +228,23 @@ Once your application is published, it should be accessible by typing its extern
223228

224229
### Enable pre-authentication
225230

226-
Verify that your application is accessible through the Application Proxy.
231+
Verify that your application is accessible through Application Proxy accessing it via the external URL.
227232

228233
1. Navigate to **Azure Active Directory** > **Enterprise applications** > **All applications** and choose the app you want to manage.
229234

230235
2. Select **Application Proxy**.
231236

232237
3. In the **Pre-Authentication** field, use the dropdown list to select **Azure Active Directory**, and select **Save**.
233238

234-
With pre-authentication enabled, Azure AD will challenge you for authentication and then the back-end application should also challenge you if it requires authentication. Changing the pre-authentication from Passthrough to Azure AD also configures the external URL with HTTPS, so any application initially configured for HTTP will now be secured with HTTPS.
239+
With pre-authentication enabled, Azure AD will challenge users first for authentication and if single sign-on is configued then the back-end application will also verify the user before access to the application is granted. Changing the pre-authentication mode from Passthrough to Azure AD also configures the external URL with HTTPS, so any application initially configured for HTTP will now be secured with HTTPS.
235240

236241
### Enable Single Sign-On
237242

238243
SSO provides the best possible user experience and security because users only need to sign in once when accessing Azure AD. Once a user has pre-authenticated, SSO is performed by the Application Proxy connector authenticating to the on-premises application, on behalf of the user. The backend application processes the login as if it were the user themselves.
239244

240245
Choosing the **Passthrough** option allows users to access the published application without ever having to authenticate to Azure AD.
241246

242-
Performing SSO is only possible if Azure AD can identify the user requesting access to a resource, so your application must be configured to pre-authenticate users upon access for SSO to function, otherwise the SSO options will be disabled.
247+
Performing SSO is only possible if Azure AD can identify the user requesting access to a resource, so your application must be configured to pre-authenticate users with Azure AD upon access for SSO to function, otherwise the SSO options will be disabled.
243248

244249
Read [Single sign-on to applications in Azure AD](what-is-single-sign-on.md) to help you choose the most appropriate SSO method when configuring your applications.
245250

@@ -263,7 +268,7 @@ The following capabilities can be used to support Azure AD Application Proxy:
263268

264269
* Risk-based conditional access: Protect your data from malicious hackers with a [risk-based conditional access policy](https://www.microsoft.com/cloud-platform/conditional-access) that can be applied to all apps and all users, whether on-premises or in the cloud.
265270

266-
* Azure AD Application Panel: With your Application Proxy service deployed, and applications securely published, offer your users a simple hub to discover and access all their applications. Increase productivity with self-service capabilities, such as the ability to request access to new apps and groups or manage access to these resources on behalf of others, through the [Access Panel](https://aka.ms/AccessPanelDPDownload).
271+
* Azure AD Access Panel: With your Application Proxy service deployed, and applications securely published, offer your users a simple hub to discover and access all their applications. Increase productivity with self-service capabilities, such as the ability to request access to new apps and groups or manage access to these resources on behalf of others, through the [Access Panel](https://aka.ms/AccessPanelDPDownload).
267272

268273
## Manage your implementation
269274

@@ -288,7 +293,7 @@ Azure AD can provide additional insights into your organization’s user provisi
288293

289294
#### Application audit logs
290295

291-
These logs detail logins to applications configured with Application Proxy, as well as information about the device and the user accessing the application. They are located in the Azure portal and in Audit API.
296+
These logs provide detailed information about logins to applications configured with Application Proxy and the device and the user accessing the application. Audit logs are located in the Azure portal and in Audit API for export.
292297

293298
#### Windows event logs and performance counters
294299

@@ -298,7 +303,7 @@ Connectors have both admin and session logs. The admin logs include key events a
298303

299304
Learn more about common issues and how to resolve them with our guide to [troubleshooting](application-proxy-troubleshoot.md) error messages.
300305

301-
These articles cover common scenarios, but you can also create your own troubleshooting guides for your support organization.
306+
The following articles cover common scenarios that can also be used to create troubleshooting guides for your support organization.
302307

303308
* [Problem displaying app page](application-proxy-page-appearance-broken-problem.md)
304309
* [Application load is too long](application-proxy-page-load-speed-problem.md)

0 commit comments

Comments
 (0)