How to Setup Point-to-Site VPN with Azure AD Authentication Plus Conditional Access MFA

How to Setup Azure Point to Site VPN with AD Authentication Plus Conditional Access MFA
In this jam packed video I'll provide you the steps to complete a point to site vpn using azure gateways. I'll cover the setup process from creating the gateway to configuring your conditional access policy to enforce multi-factor authentication.
My mission is to help guide you through your cloud journey! My motto is always learning
Our goal is to get you from scholar to consultant and from consultant to expert.
See you next time!
Configure an Azure AD tenant and P2S configuration for VPN Gateway P2S connections
learn.microsoft.com/en-us/azu...
Configure P2S for access based on users and groups - Azure AD authentication
learn.microsoft.com/en-us/azu...
Configuring MFA
learn.microsoft.com/en-us/azu...
Azure VPN Download
apps.microsoft.com/store/deta...
#AzureLearning #Azure #CloudSecurity #CloudTraining #Office365 #LearnCloud #CloudScholars #alwaysgrowing #knowledgeispower #azuregateway #vpn

Пікірлер: 26

  • @timroberts4948
    @timroberts4948 Жыл бұрын

    Great video, thankyou very much! The default certificate worked for me on a windows 2022 server.

  • @cloudscholars

    @cloudscholars

    Жыл бұрын

    You're welcome!

  • @terpfen
    @terpfen7 ай бұрын

    This video is PERFECT. I just brought a P2S VPN online by following the video. Works as expected. One question: how can I see a list of which devices are connecting over the P2S VPN?

  • @cloudscholars

    @cloudscholars

    7 ай бұрын

    This link should point you in the right directions for viewing the connections learn.microsoft.com/en-us/azure/virtual-wan/monitor-point-to-site-connections

  • @beelikehoney
    @beelikehoney Жыл бұрын

    I found my mistake thanks to yours!

  • @cloudscholars

    @cloudscholars

    Жыл бұрын

    Happy to help! I hope you liked and subscribed!

  • @stevensnead4833
    @stevensnead48336 ай бұрын

    Thanks for the video. Do you know if you know how not have save the credentials? I have look all over to get it so it does save it. Nothing works. I can clear the sign-in just not get it not to save it.

  • @cloudscholars

    @cloudscholars

    6 ай бұрын

    Can you send me a screenshot to what you are referring to? You can send it directly to the email.

  • @diabolikr1852
    @diabolikr18526 ай бұрын

    I'm able to connect to VM. But I'm not able to connect to azure services like azure sql or storage accounts. Please create a video for that too. Thanks.

  • @cloudscholars

    @cloudscholars

    6 ай бұрын

    I’ll add this to my video list.

  • @fbifido2
    @fbifido2 Жыл бұрын

    Can we limit what the VPN users have access to? on the client side, how does the DNS work for the VPN?

  • @cloudscholars

    @cloudscholars

    Жыл бұрын

    I believe there is a number of ways to do this. You can put your users into Azure AD groups and control access to the Azure VPN application using Conditional Access policies. I would also look into NSG rules from the VPN ip address.

  • @fbifido2
    @fbifido2 Жыл бұрын

    Thanks, but why do you skip over all the different options/choices? even if they are not needed, you could explain why/when you would use said options!!!

  • @cloudscholars

    @cloudscholars

    Жыл бұрын

    thanks for your response. I never used all the other options. I'll take that into consideration.

  • @TheRealJLucas

    @TheRealJLucas

    5 ай бұрын

    MAKE YOU OWN VIDEO!!!! w o w

  • @martinmistik4015
    @martinmistik40159 ай бұрын

    Nice, thx for video! Can I ask you - it's some way to connect via P2S VPN to other vNet in same subscriptions? (and different RG's). For example - if I enable communication on the given ports in NSG, in the same vnet as the P2S VPN server, everything works OK, but if I enable communication via NSG in another vNet, communication via P2S VPN just don't work (I had vNet peering turned on between vnet). It's that I have a DC(DNS) in Tier0 vNet and a file server in Tier1 vNet (there is also a VPN server here), but DNS translation doesn't work for P2S VPN clients (DNS queries to Tier0 - another vNet). I tried also "Additional routes" in Point-to-site configuration. Thx for your reply.

  • @cloudscholars

    @cloudscholars

    9 ай бұрын

    Additional routes didn't work for you? I was going to suggest that. I will have to set this up in my lab and let you know. any way you can send me some screenshots of your configuration?

  • @jimcopeland4011
    @jimcopeland40112 ай бұрын

    Is there a way to set this up and use a client other than the Azure VPN Client? The client is awful!

  • @cloudscholars

    @cloudscholars

    2 ай бұрын

    lol there are other clients but I've only used the Azure one.

  • @Jay4kingdom
    @Jay4kingdom10 ай бұрын

    How do you connect to the VM after setting up the Azure VPN Client? When i try mapping to the drive it still asks for a login

  • @cloudscholars

    @cloudscholars

    10 ай бұрын

    What subnet is the VM on? Is it the same as the subnet you land on when you connect via vpn?

  • @shawn8362
    @shawn8362 Жыл бұрын

    Hey man I keep getting the error message: Failed to connect to server. Connection dropped. Session State: Key Material sent. I get this while using the DigiCert Global Root G2. Any advice?

  • @cloudscholars

    @cloudscholars

    Жыл бұрын

    Hey can you try using the CA certificate? Also, have you tried it from another device?

  • @shawn8362

    @shawn8362

    Жыл бұрын

    @@cloudscholars when I tried the CA cert I got the same error message you did in the video. I will try it from another device though.

  • @shawn8362

    @shawn8362

    Жыл бұрын

    @@cloudscholars I tried it on a Windows machine and I'm getting the error: Dialing VPN connection leon-gateway, Status = VPN Platform did not trigger connection.

  • @cloudscholars

    @cloudscholars

    Жыл бұрын

    Do you mind emailing us at cloudscholarslearning@gmail.com. I don't mind jumping on a session with you to see how things are going on your end.