Skip to content

Commit f75f470

Browse files
authored
Merge pull request #222631 from b-branco/aad-login-for-local-diags
Azure AD authentication for local monitoring tools
2 parents f2d2871 + cdc6660 commit f75f470

21 files changed

+316
-57
lines changed

articles/private-5g-core/collect-required-information-for-a-site.md

Lines changed: 16 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -69,6 +69,19 @@ For each data network that you want to configure, collect all the values in the
6969
| The Domain Name System (DNS) server addresses to be provided to the UEs connected to this data network. You identified this in [Allocate subnets and IP addresses](complete-private-mobile-network-prerequisites.md#allocate-subnets-and-ip-addresses). </br></br>This value may be an empty list if you don't want to configure a DNS server for the data network. In this case, UEs in this data network will be unable to resolve domain names. | **DNS Addresses** |
7070
|Whether Network Address and Port Translation (NAPT) should be enabled for this data network. NAPT allows you to translate a large pool of private IP addresses for UEs to a small number of public IP addresses. The translation is performed at the point where traffic enters the data network, maximizing the utility of a limited supply of public IP addresses.</br></br>If you want to use [UE-to-UE traffic](private-5g-core-overview.md#ue-to-ue-traffic) in this data network, keep NAPT disabled. |**NAPT**|
7171

72+
## Choose the authentication method for local monitoring tools
73+
74+
Azure Private 5G Core provides dashboards for monitoring your deployment and a web GUI for collecting detailed signal traces. You can access these tools using [Azure Active Directory (Azure AD)](/azure/active-directory/authentication/overview-authentication) or a local username and password. We recommend setting up Azure AD authentication to improve security in your deployment.
75+
76+
If you want to access your local monitoring tools using Azure AD, after creating a site you'll need to follow the steps in [Enable Azure Active Directory (Azure AD) for local monitoring tools](enable-azure-active-directory.md).
77+
78+
If you want to access your local monitoring tools using local usernames and passwords, you don't need to set any additional configuration. After deploying the site, set up your username and password by following [Access the distributed tracing web GUI](distributed-tracing.md#access-the-distributed-tracing-web-gui) and [Access the packet core dashboards](packet-core-dashboards.md#access-the-packet-core-dashboards).
79+
80+
You'll be able to change the authentication method later by following [Modify the local access configuration in a site](modify-local-access-configuration.md).
81+
82+
> [!NOTE]
83+
> While in [disconnected mode](disconnected-mode.md), you won't be able to change the local monitoring authentication method or sign in using Azure AD. If you expect to need access to your local monitoring tools while the ASE is disconnected, consider using the local username and password authentication method instead.
84+
7285
## Collect local monitoring values
7386

7487
You can use a self-signed or a custom certificate to secure access to the [distributed tracing](distributed-tracing.md) and [packet core dashboards](packet-core-dashboards.md) at the edge. We recommend that you provide your own HTTPS certificate signed by a globally known and trusted certificate authority (CA), as this provides additional security to your deployment and allows your browser to recognize the certificate signer.
@@ -97,7 +110,7 @@ If you want to provide a custom HTTPS certificate at site creation, follow the s
97110

98111
## Next steps
99112

100-
You can now use the information you've collected to create the site.
113+
Use the information you've collected to create the site:
101114

102-
- [Create a site - Azure portal](create-a-site.md)
103-
- [Create a site - ARM template](create-site-arm-template.md)
115+
- [Create a site - Azure portal](create-a-site.md)
116+
- [Create a site - ARM template](create-site-arm-template.md)

articles/private-5g-core/create-a-site.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -65,13 +65,13 @@ In this step, you'll create the mobile network site resource representing the ph
6565

6666
Once you've finished filling out the fields, select **Attach**.
6767

68-
1. Repeat the previous step for each additional data network you want to configure.
69-
1. If you decided you want to provide a custom HTTPS certificate in [Collect local monitoring values](collect-required-information-for-a-site.md#collect-local-monitoring-values), select **Next : Local access >**. If you decided not to provide a custom HTTPS certificate at this stage, you can skip this step.
70-
71-
1. Under **Provide custom HTTPS certificate?**, select **Yes**.
72-
1. Use the information you collected in [Collect local monitoring values](collect-required-information-for-a-site.md#collect-local-monitoring-values) to select a certificate.
68+
1. Repeat the previous step for each additional data network you want to configure, and then select **Next : Local access >**.
69+
1. In the **Local access** section, set the fields as follows:
7370

7471
:::image type="content" source="media/create-a-site/create-site-local-access-tab.png" alt-text="Screenshot of the Azure portal showing the Local access configuration tab for a site resource.":::
72+
73+
- Under **Authentication type**, select the authentication method you decided to use in [Choose the authentication method for local monitoring tools](collect-required-information-for-a-site.md#choose-the-authentication-method-for-local-monitoring-tools).
74+
- under **Provide custom HTTPS certificate?**, select **Yes** or **No** based on whether you decided to provide a custom HTTPS certificate in [Collect local monitoring values](collect-required-information-for-a-site.md#collect-local-monitoring-values). If you selected **Yes**, use the information you collected in [Collect local monitoring values](collect-required-information-for-a-site.md#collect-local-monitoring-values) to select a certificate.
7575

7676
1. Select **Review + create**.
7777
1. Azure will now validate the configuration values you've entered. You should see a message indicating that your values have passed validation.
@@ -96,6 +96,6 @@ In this step, you'll create the mobile network site resource representing the ph
9696

9797
## Next steps
9898

99-
If you haven't already done so, you should now design the policy control configuration for your private mobile network. This allows you to customize how your packet core instances apply quality of service (QoS) characteristics to traffic. You can also block or limit certain flows.
99+
If you decided to set up Azure AD for local monitoring access, follow the steps in [Enable Azure Active Directory (Azure AD) for local monitoring tools](enable-azure-active-directory.md).
100100

101-
- [Learn more about designing the policy control configuration for your private mobile network](policy-control.md)
101+
If you haven't already done so, you should now design the policy control configuration for your private mobile network. This allows you to customize how your packet core instances apply quality of service (QoS) characteristics to traffic. You can also block or limit certain flows. See [Policy control](policy-control.md) to learn more about designing the policy control configuration for your private mobile network.

articles/private-5g-core/create-site-arm-template.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -94,6 +94,6 @@ Four Azure resources are defined in the template.
9494

9595
## Next steps
9696

97-
If you haven't already done so, you should now design the policy control configuration for your private mobile network. This allows you to customize how your packet core instances apply quality of service (QoS) characteristics to traffic. You can also block or limit certain flows.
97+
If you decided to set up Azure AD for local monitoring access, follow the steps in [Modify the local access configuration in a site](modify-local-access-configuration.md) and [Enable Azure Active Directory (Azure AD) for local monitoring tools](enable-azure-active-directory.md).
9898

99-
- [Learn more about designing the policy control configuration for your private mobile network](policy-control.md)
99+
If you haven't already done so, you should now design the policy control configuration for your private mobile network. This allows you to customize how your packet core instances apply quality of service (QoS) characteristics to traffic. You can also block or limit certain flows. See [Policy control](policy-control.md) to learn more about designing the policy control configuration for your private mobile network.

articles/private-5g-core/disconnected-mode.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -27,11 +27,10 @@ The following functions aren't supported while in disconnected mode:
2727

2828
## Monitoring and troubleshooting during disconnects
2929

30-
<!-- TODO: add in paragraph once AAD feature is live and remove first sentence of existing paragraph.
31-
Azure Active Directory based sign on for distributed tracing and Grafana monitoring won't be available while in disconnected mode. However, you can configure username and password access to each of these tools if you plan to require access during periods of disconnect. -->
32-
Distributed tracing and packet core dashboards are accessible in disconnected mode. Once the disconnect ends, log analytics on Azure will update with the stored data, excluding rate and gauge type metrics.
30+
While in disconnected mode, you won't be able to change the local monitoring authentication method or sign in to the [distributed tracing](distributed-tracing.md) and [packet core dashboards](packet-core-dashboards.md) using Azure Active Directory. If you expect to need access to your local monitoring tools while the ASE is disconnected, you can change your authentication method to local usernames and passwords by following [Modify the local access configuration in a site](modify-local-access-configuration.md).
31+
32+
Once the disconnect ends, log analytics on Azure will update with the stored data, excluding rate and gauge type metrics.
3333

3434
## Next steps
3535

36-
- [Configure username and password for Grafana](packet-core-dashboards.md)
37-
- [Configure username and password for distributed tracing](distributed-tracing.md)
36+
- [Change the authentication method for local monitoring tools](modify-local-access-configuration.md)

articles/private-5g-core/distributed-tracing-share-traces.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ Azure Private 5G Core Preview offers a distributed tracing web GUI, which you ca
3333

3434
In this step, you'll export the trace from the distributed tracing web GUI and save it locally.
3535

36-
1. Sign in to the distributed tracing web GUI at https://*\<LocalMonitoringIP\>*/sas, where *\<LocalMonitoringIP\>* is the IP address you set up for accessing local monitoring tools.
36+
1. Sign in to the distributed tracing web GUI as described in [Access the distributed tracing web GUI](distributed-tracing.md#access-the-distributed-tracing-web-gui).
3737
1. In the **Search** tab, specify the SUPI and time for the event you're interested in and select **Search**.
3838

3939
:::image type="content" source="media\distributed-tracing-share-traces\distributed-tracing-search.png" alt-text="Screenshot of the Search display in the distributed tracing web G U I, showing the S U P I search field and date and time range options.":::

articles/private-5g-core/distributed-tracing.md

Lines changed: 14 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -16,14 +16,23 @@ Azure Private 5G Core Preview offers a *distributed tracing web GUI*, which you
1616

1717
## Access the distributed tracing web GUI
1818

19-
To sign in to the distributed tracing web GUI:
19+
> [!TIP]
20+
> When signing in, if you see a warning in your browser that the connection isn't secure, you may be using a self-signed certificate to attest access to your local monitoring tools. We recommend following [Modify the local access configuration in a site](modify-local-access-configuration.md) to configure a custom HTTPS certificate signed by a globally known and trusted certificate authority.
2021
21-
1. In your browser, enter https://*\<LocalMonitoringIP\>*/sas, where *\<LocalMonitoringIP\>* is the IP address for accessing the local monitoring tools that you set up in [Management network](complete-private-mobile-network-prerequisites.md#management-network).
22+
### Azure Active Directory
2223

23-
:::image type="content" source="media\distributed-tracing\distributed-tracing-sign-in.png" alt-text="Screenshot of the distributed tracing web G U I sign in page, with fields for the username and password.":::
24+
To sign in to the distributed tracing web GUI if you enabled Azure Active Directory authentication:
25+
26+
1. In your browser, enter https://*\<local monitoring domain\>*/sas, where *\<local monitoring domain\>* is the domain name for your local monitoring tools that you set up in [Configure domain system name (DNS) for local monitoring IP](enable-azure-active-directory.md#configure-domain-system-name-dns-for-local-monitoring-ip).
27+
1. Follow the prompts to sign in with your account credentials.
28+
29+
### Local username and password
2430

25-
> [!TIP]
26-
> If you see a warning in your browser that the connection isn't secure, you may be using a self-signed certificate to attest access to your local monitoring tools. We recommend following [Modify the local access configuration in a site](modify-local-access-configuration.md) to configure a custom HTTPS certificate signed by a globally known and trusted certificate authority.
31+
To sign in to the distributed tracing web GUI if you enabled local username and password authentication:
32+
33+
1. In your browser, enter https://*\<local monitoring IP\>*/sas, where *\<local monitoring IP\>* is the IP address for accessing the local monitoring tools that you set up in [Management network](complete-private-mobile-network-prerequisites.md#management-network).
34+
35+
:::image type="content" source="media\distributed-tracing\distributed-tracing-sign-in.png" alt-text="Screenshot of the distributed tracing web G U I sign in page, with fields for the username and password.":::
2736

2837
1. Sign in using your credentials.
2938

0 commit comments

Comments
 (0)