Archive
Configure P2S access based on users and groups

Configure P2S access based on users and groups

2024-11-13 Scenario: Configure P2S access based on users and groups - Microsoft Entra ID authentication Article08/12/2024 article This article

Related articles

有些人不会告诉你:PrivadoVPN的协议选择 MUBVIEW C8 Security Camera User Manual Maximilian

Scenario: Configure P2S access based on users and groups – Microsoft Entra ID authentication

  • Article

This article walks you through a scenario to configure access based on users and groups for point-to-site (P2S) VPN connections that use Microsoft Entra ID authentication. This scenario, you configure this type of access using multiple custom audience app IDs with specified permissions, and multiple P2S VPN gateways. Formore information about P2S protocols and authentication, see About point-to-site VPN.

In this scenario, users have different access based on permissions to connect to specific P2S VPN gateways. At a high level, the workflow is as follows:

  1. Create custom app P2S VPN gateway want configure P2S VPN Microsoft Entra ID authentication . note custom app ID .
  2. Add the Azure VPN Client application to the custom app configuration.
  3. Assign user and group permissions per custom app.
  4. When you configure your gateway for P2S VPN Microsoft Entra ID authentication, specify the Microsoft Entra ID tenant and the custom app ID that’s associated with the users that you want to allow to connect via that gateway.
  5. The Azure VPN Client profile on the client’s computer is configured using the settings from the P2S VPN gateway to which the user has permissions to connect.
  6. user connects , authenticated able connect P2S VPN gateway account permissions .

Considerations:

  • You can’t create this type of granular access if you have only one VPN gateway.
  • Microsoft Entra ID authentication is supported only for OpenVPN® protocol connections and requires the Azure VPN Client.
    *Take care configure each Azure VPN Client with the correct client profile package configuration settings to ensure that the user connects to the corresponding gateway to which they have permissions.
  • use configuration steps exercise , it is be easiest run steps custom app ID gateway way , repeat subsequent custom app ID gateway .

Prerequisites

  • This scenario requires a Microsoft Entra tenant. If you don’t already have a tenant, Create a new tenant in Microsoft Entra ID. Make a note of the tenant ID. This value is needed when you configure your P2S VPN gateway for Microsoft Entra ID authentication.

  • This scenario requires multiple VPN gateways. You can only assign one custom app ID per gateway.

    • functioning VPN gateways compatible Microsoft Entra ID authentication , Create manage VPN gateway – Azure portal create VPN gateways .
    • Some gateway options are incompatible with P2S VPN gateways that use Microsoft Entra ID authentication. Basic SKU and policy-based VPN types aren’t supported. Formore information about gateway SKUs, see About gateway SKUs. Formore information about VPN types, see VPN Gateway settings.

Register an application

To create a custom audience app ID value, which is specified when you configure your VPN gateway, you must register an application. Register an application. Forsteps, see Register an application.

  • The Name field is user-facing. Use something intuitive that describes the users or groups that are connecting via this custom application.
  • rest settings , use settings shown article .

Add a scope

Add a scope. Adding a scope is part of the sequence to configure permissions for users and groups. Forsteps, see Expose an API and add a scope. Later, you assign users and groups permissions to this scope.

  • Use something intuitive for the Scope Name field , Marketing – VPN – Users . Fill rest fields necessary .
  • ForState, select Enable.

Add the Azure VPN Client application

Add the Azure VPN Client application Client ID and specify the Authorized scope. When you add the application, we recommend that you use the Microsoft-registered Azure VPN Client app ID for Azure Public, c632b3df - fb67 - 4d84 - bdcf - b95ad541b5c8 when possible. This app value has global consent, which means you don’t need to manually register it. Forsteps, see Add the Azure VPN Client application.

add Azure VPN Client application ,Overview page and copy and save the Application (client) ID. You’ll need this information to configure your P2S VPN gateway.

Assign users and groups

Assign permissions to the users and/or groups that connect to the gateway. If you’re specifying a group, the user must be a direct member of the group. Nested groups aren’t supported.

  1. Go to your Microsoft Entra ID and select Enterprise applications.
  2. list , locate application registered click open .
  3. Expand Manage, then select Properties. On the Properties page, verify that Enabled for users to sign in is set to Yes. , change valueYes.
  4. ForAssignment required, change the value to Yes. Formore information about this setting, see Application properties.
  5. If you’ve made changes, select Save at the top of the page.
  6. In the left pane, select Users groups. On the Users groups page , select+ Add user/group to open the Add Assignment page.
  7. Click the link under Users groups to open the Users groups page. Select the users and groups that you want to assign, then click Select.
  8. After you finish selecting users and groups, select Assign.

Configure a P2S VPN

After you’ve completed the steps in the previous sections, continue to Configure P2S VPN Gateway for Microsoft Entra ID authentication – Microsoft-registered app.

  • configure gateway , associate appropriate custom audience App ID .
  • Download the Azure VPN Client configuration packages to configure the Azure VPN Client for the users that have permissions to connect to the specific gateway.

Configure the Azure VPN Client

Use the Azure VPN Client profile configuration package to configure the Azure VPN Client on each user’s computer. Verify that the client profile corresponds to the P2S VPN gateway to which you want the user to connect.

Next steps