Skip to content

Commit f850d2f

Browse files
Merge pull request #295339 from cherylmc/managed-identity
add note - vpn gateway
2 parents 509114c + 6da5535 commit f850d2f

6 files changed

+23
-12
lines changed

articles/vpn-gateway/point-to-site-certificate-client-linux-azure-vpn-client.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,8 +6,10 @@ author: cherylmc
66
ms.service: azure-vpn-gateway
77
ms.custom: linux-related-content
88
ms.topic: how-to
9-
ms.date: 09/06/2024
9+
ms.date: 02/26/2025
1010
ms.author: cherylmc
11+
12+
# This disclaimer is in the "vpn-gateway-vwan-azure-vpn-client-certificate-linux" include file, so it doesn't need to be repeated in the article. "Microsoft recommends that you use the most secure authentication flow available. The authentication flow described in this procedure requires a very high degree of trust in the application, and carries risks that aren't present in other flows. You should only use this flow when other more secure flows, such as managed identities, aren't viable."
1113
---
1214

1315
# Configure Azure VPN Client – Certificate authentication OpenVPN – Linux (Preview)
@@ -27,7 +29,7 @@ Verify that you are on the correct article. The following table shows the config
2729
This article assumes that you've already performed the following prerequisites:
2830

2931
* The VPN gateway is configured for point-to-site certificate authentication and the OpenVPN tunnel type. See [Configure server settings for P2S VPN Gateway connections - certificate authentication](point-to-site-certificate-gateway.md) for steps.
30-
* VPN client profile configuration files have been generated and are available. See [Generate VPN client profile configuration files](point-to-site-certificate-gateway.md#profile-files) for steps.
32+
* VPN client profile configuration files are already generated and are available. See [Generate VPN client profile configuration files](point-to-site-certificate-gateway.md#profile-files) for steps.
3133

3234
[!INCLUDE [Configuration steps](../../includes/vpn-gateway-vwan-azure-vpn-client-certificate-linux.md)]
3335

articles/vpn-gateway/point-to-site-certificates-linux-openssl.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: cherylmc
66
ms.service: azure-vpn-gateway
77
ms.custom: linux-related-content
88
ms.topic: how-to
9-
ms.date: 06/24/2024
9+
ms.date: 02/26/2025
1010
ms.author: cherylmc
1111
---
1212
# Generate and export certificates - Linux - OpenSSL
@@ -36,6 +36,9 @@ This section helps you generate a self-signed root certificate. After you genera
3636

3737
## Client certificates
3838

39+
> [!NOTE]
40+
> Microsoft recommends that you use the most secure authentication flow available. The authentication flow described in this procedure requires a very high degree of trust in the application, and carries risks that are not present in other flows. You should only use this flow when other more secure flows, such as managed identities, aren't viable.
41+
3942
In this section, you generate the user certificate (client certificate). Certificate files are generated in the local directory in which you run the commands. You can use the same client certificate on each client computer, or generate certificates that are specific to each client. It's crucial that the client certificate is signed by the root certificate.
4043

4144
1. To generate a client certificate, use the following examples.

articles/vpn-gateway/point-to-site-vpn-client-configuration-radius-password.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,17 +7,19 @@ ms.custom: linux-related-content
77
ms.topic: how-to
88
author: cherylmc
99
ms.author: cherylmc
10-
ms.date: 05/23/2024
10+
ms.date: 02/26/2025
1111
---
1212
# Configure a VPN client for point-to-site: RADIUS - password authentication
1313

1414
To connect to a virtual network over point-to-site (P2S), you need to configure the client device that you'll connect from. You can create P2S VPN connections from Windows, macOS, and Linux client devices. This article helps you create and install the VPN client configuration for username/password RADIUS authentication.
1515

16+
> [!NOTE]
17+
> Microsoft recommends that you use the most secure authentication flow available. The authentication flow described in this procedure requires a very high degree of trust in the application, and carries risks that aren't present in other flows. You should only use this flow when other more secure flows, such as managed identities, aren't viable.
18+
1619
When you're using RADIUS authentication, there are multiple authentication instructions: [certificate authentication](point-to-site-vpn-client-configuration-radius-certificate.md), [password authentication](point-to-site-vpn-client-configuration-radius-password.md), and [other authentication methods and protocols](point-to-site-vpn-client-configuration-radius-other.md). The VPN client configuration is different for each type of authentication. To configure a VPN client, you use client configuration files that contain the required settings.
1720

1821
> [!NOTE]
1922
> [!INCLUDE [TLS](../../includes/vpn-gateway-tls-change.md)]
20-
>
2123
2224
## Workflow
2325

articles/vpn-gateway/vpn-gateway-certificates-point-to-site-linux.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,8 +6,10 @@ author: cherylmc
66
ms.service: azure-vpn-gateway
77
ms.custom: linux-related-content
88
ms.topic: how-to
9-
ms.date: 06/24/2024
9+
ms.date: 02/26/2025
1010
ms.author: cherylmc
11+
12+
# The note "Microsoft recommends that you use the most secure authentication flow available. The authentication flow described in this procedure requires a very high degree of trust in the application, and carries risks that aren't present in other flows. You should only use this flow when other more secure flows, such as managed identities, aren't viable." is in the vpn-gateway-strongswan-certificates-include file.
1113
---
1214
# Generate and export certificates - Linux (strongSwan)
1315

includes/vpn-gateway-strongswan-certificates-include.md

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,9 @@
11
---
2-
title: include file
3-
description: include file
4-
services: vpn-gateway
52
author: cherylmc
63
ms.service: azure-vpn-gateway
74
ms.topic: include
8-
ms.date: 09/12/2019
5+
ms.date: 02/26/2025
96
ms.author: cherylmc
10-
ms.custom: include file
117
---
128

139
Generate the CA certificate.
@@ -17,14 +13,17 @@ Generate the CA certificate.
1713
ipsec pki --self --in caKey.pem --dn "CN=VPN CA" --ca --outform pem > caCert.pem
1814
```
1915

20-
Print the CA certificate in base64 format. This is the format that is supported by Azure. You upload this certificate to Azure as part of the [P2S configuration steps](../articles/vpn-gateway/vpn-gateway-howto-point-to-site-resource-manager-portal.md).
16+
Print the CA certificate in base64 format, the format that Azure supports. You upload this certificate to Azure as part of the [P2S configuration steps](../articles/vpn-gateway/vpn-gateway-howto-point-to-site-resource-manager-portal.md).
2117

2218
```
2319
openssl x509 -in caCert.pem -outform der | base64 -w0 ; echo
2420
```
2521

2622
Generate the user certificate.
2723

24+
> [!NOTE]
25+
> Microsoft recommends that you use the most secure authentication flow available. The authentication flow described in this procedure requires a very high degree of trust in the application, and carries risks that aren't present in other flows. You should only use this flow when other more secure flows, such as managed identities, aren't viable.
26+
2827
```
2928
export PASSWORD="password"
3029
export USERNAME=$(hostnamectl --static)

includes/vpn-gateway-vwan-azure-vpn-client-certificate-linux.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -30,6 +30,9 @@ For certificate authentication, a client certificate must be installed on each c
3030

3131
Generate the client public certificate data and private key in **.pem** format using the following commands. To run the commands, you need to have the public Root certificate **caCert.pem** and the private key of Root certificate **caKey.pem**. For more information, see [Generate and export certificates - Linux - OpenSSL](../articles/vpn-gateway/point-to-site-certificates-linux-openssl.md).
3232

33+
> [!NOTE]
34+
> Microsoft recommends that you use the most secure authentication flow available. The authentication flow described in this procedure requires a very high degree of trust in the application, and carries risks that aren't present in other flows. You should only use this flow when other more secure flows, such as managed identities, aren't viable.
35+
3336
```
3437
export PASSWORD="password"
3538
export USERNAME=$(hostnamectl --static)

0 commit comments

Comments
 (0)