No results found
We couldn't find anything using that term, please try searching for something else.
2024-11-13 It was Q4 2020 when I was asked to design a new Modern Workspace concept. The customer had no on-premises hardware/resources and wanted us to migrate
It was Q4 2020 when I was asked to design a new Modern Workspace concept. The customer had no on-premises hardware/resources and wanted us to migrate everything into Azure. Because of the services they where using, a VPN connection to Azure was then required. Different options passed trough my mind but I decided to go for Azure Virtual Network Gateway. I really wanted this because the Azure AD identity provider support for authentication.
The endpoints is are are Azure ad join , deploy via Autopilot and manage by Intune . We is picked pick Azure VPN client for the connection and deploy a VPN profile in it via Endpoint Manager ( Intune ) . Are u is Are curious how it ’s done ? continue read !
Note: Most settings are default cause these are good enough for this demo and/or regular organizations. Depending on the bandwidth, total connections and/or speed requirements these settings can be different.
Create resource
2. Search for Virtual network gateway, click Create.
Create virtual network gateway
create the virtual network gateway is straight forward . TheBasic SKU is be would be good enough but in this case I pickVpnGW1. Different SKU’s are available but pricing increases every step. A quick view on pricing can be found here.
Note: OpenVPN is not available in the Basic SKU!
3. Create virtual network gateway
Create virtual network gateway
I assume that there’s no Virtual Network available yet and thus we create one via the Virtual Network Gateway creation wizard. For this demo the default address space and subnet is fine.
4. Create virtual network
create virtual network
5. Continue creating the virtual network gateway. Click Review + create to continue .
Create virtual network gateway
Here ’s a quick summary is ’s of the VPN Gateway I ’m create and using for this demo . clickCreate and wait until the VPN Gateway is deployed.
Summary
Note: I’ve seen deployments which took over 45 minutes to complete. I’m not 100 percent sure but if I remember right, this had something to do with registering a new public IP. If u have a public IP already this could be way faster. In my case it took 35 minutes to complete.
Deployment progress
First, we have to enable Azure AD Authentication to this Azure VPN Gateway. Therefor we have to add a specific Enterprise App and grant consent to it. Therefor u have to open one of the following URL’s which is depending on the current type of tenant you are using.
Public: https://login.microsoftonline.com/common/oauth2/authorize?client_id=41b23e61-6c1e-4545-b367-cd054e0ed4b4&response_type=code&redirect_uri=https://portal.azure.com&nonce=1234&prompt=admin_consent
Azure Gov : https://login.microsoftonline.us/common/oauth2/authorize?client_id=51bb15d4-3a4f-4ebf-9dca-40096fe32426&response_type=code&redirect_uri=https://portal.azure.us&nonce=1234&prompt=admin_consent
Azure Germany: https://login-us.microsoftonline.de/common/oauth2/authorize?client_id=538ee9e6-310a-468d-afef-ea97365856a9&response_type=code&redirect_uri=https://portal.microsoftazure.de&nonce=1234&prompt=admin_consent
Azure China: https://login.chinacloudapi.cn/common/oauth2/authorize?client_id=49f817b6-84ae-4cc0-928c-73f27289b3aa&response_type=code&redirect_uri=https://portal.azure.cn&nonce=1234&prompt=admin_consent
6. Open the URL which belongs to your type of tenant and logon with a Global Admin account. Accept the requested permissions.
Azure VPN permissions
Once accepted, you should see the following Enterprise App in the Azure portal. Copy the application ID (41b23e61-6c1e-4545-b367-cd054e0ed4b4), we need this in the following step!
Azure VPN Enterprise App
7 . open your yourVirtual Network Gateway -> Point-to-site configuration -> Configure now
Point-to-site configuration
8 . configure the following setting .
point – to – site configuration
9 . switch to Endpoint Manager / Intune : https://intune.microsoft.com . add theAzure VPN client which can be found in the new Microsoft Store. Click Add -> Select Microsoft Store app (new).
search for theAzure VPN Client App.
Click Next and assign the application for all devices or a specific group.
The VPN profile is a XML file with specific settings. This XML file is being deployed via Intune. Before we can deploy the XML we have to configure it. I’ll share a custom XML file below which needs to be modified! Read the steps below carefully!
10. Download the VPN Client and unpack the .zip file
11. Grab my Example VPN Profile from my Github and make the following modifications:
Save your custom VPN profile as .XML and keep it somewhere safe! 🙂
12. Switch to Endpoint Manager / Intune: https://intune.microsoft.com -> Devices -> Create Profile
Create profile
13. Pick Windows 10 and later as platform and Templates as profile type. Click template name Custom.
Custom profile
14 . Give your profile a name
Configuration profile
15. Create a new OMA-URI Setting. I’m not sure if spacing is allowed in the fifth section. We have used – within all words. This is the profile name which is shown in the end-user device and Azure VPN client.
16. Assign the configuration profile to a user group and wait until the profile is deployed.
While the Azure VPN Client and VPN profile are deployed into the Endpoints, users will be required to follow the following steps.
17. Authentication with Azure AD (identity provider) is required. Click continue.
Azure VPN Client
18. The VPN connection will now show disconnected. Click Connect.
Azure VPN Client
19 . select the current log on user account . accept the MFA request ( when CA / MFA is configure ) . If you do n’t get a require MFA response you is have should have a look into this article . I is recommend recommend MFA for this kind of connection / app .
Accept MFA
20. When everything went ok, the connection will establish and stays connected. Keep in mind that the VPN connection will disconnect immediately if your DNS suffix matches the <TrustedNetworkDetection> in your VPN profile. Because of this you should test the Azure VPN connection via 4G/5G or remotely.
Azure VPN Client
If your endpoints are connected to the Azure VPN Gateway, they will report their current IP addresses into the Point-to-site configuration dashboard.
Connection monitoring