You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: website/docs/Entra Private Access/OnPremSSO.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ title: "Kerberos SSO to AD resources"
6
6
This article details the minimum configuration required to enable Kerberos single sign on to on-premises resources protected by Active Directory.
7
7
It includes making Domain Controllers available through Private Access and configuring Private DNS to enable DNS resolution to on-premises names.
8
8
9
-
[Use Kerberos for single sign-on (SSO) to your resources with Microsoft Entra Private Access](https://learn.microsoft.com/en-us/entra/global-secure-access/how-to-configure-kerberos-sso)
9
+
[Use Kerberos for single sign-on (SSO) to your resources with Microsoft Entra Private Access](https://learn.microsoft.com/entra/global-secure-access/how-to-configure-kerberos-sso)
10
10
11
11
12
12
### Tips for avoiding SSO issues
@@ -28,4 +28,4 @@ To avoid these kind of issues, that happen to be hard to troubleshoot and discov
28
28
- Type: `REG_DWORD`
29
29
- Default value: `0 (minutes)`
30
30
31
-
More info: https://learn.microsoft.com/entra/global-secure-access/how-to-configure-kerberos-sso#option-1-change-the-default-farkdctimeout-time-on-the-registry
31
+
More info: https://learn.microsoft.com/entra/global-secure-access/how-to-configure-kerberos-sso#option-1-change-the-default-farkdctimeout-time-on-the-registry
Copy file name to clipboardExpand all lines: website/docs/Entra Private Access/PrivAccessPIM.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,4 +6,4 @@ title: "Protect privileged access with PIM"
6
6
Private Access can be combined with Privileged Identity Management to add an extra security layer to protect critical resources.
7
7
This article explains how to configure PIM to enable just-in-time access to critical resources so elevation of access is required and access expires after a certain time.
8
8
9
-
[Secure private application access with Privileged Identity Management (PIM) and Global Secure Access](https://learn.microsoft.com/en-us/entra/global-secure-access/how-to-configure-global-access-with-pim)
9
+
[Secure private application access with Privileged Identity Management (PIM) and Global Secure Access](https://learn.microsoft.com/entra/global-secure-access/how-to-configure-global-access-with-pim)
Copy file name to clipboardExpand all lines: website/docs/Entra Private Access/VPNReplacement.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -49,7 +49,7 @@ You can view the properties from **Quick Access** or navigate to **Enterprise ap
49
49
50
50
1. Select **Users and groups** from the side menu.
51
51
2. Add users and groups as needed.
52
-
- For more information, see [Assign users and groups to an application](https://learn.microsoft.com/en-us/entra/identity/enterprise-apps/assign-user-or-group-access-portal?pivots=portal).
52
+
- For more information, see [Assign users and groups to an application](https://learn.microsoft.com/entra/identity/enterprise-apps/assign-user-or-group-access-portal?pivots=portal).
53
53
54
54
> [!NOTE]
55
55
> Users must be directly assigned to the app or to the group assigned to the app. Nested groups are not supported.
@@ -61,9 +61,9 @@ As Quick Access provides access to a wide range of resources, assign access to a
61
61
62
62
Conditional Access policies can be applied to your Quick Access app. To enforce more strict controls for certain applications, you will need to segment access and create specific Enterprise Applications representing those apps.
63
63
64
-
Creating a Conditional Access policy is covered in detail in [How to create a Conditional Access policy for Private Access apps](https://learn.microsoft.com/en-us/entra/global-secure-access/how-to-target-resource-private-access-apps).
64
+
Creating a Conditional Access policy is covered in detail in [How to create a Conditional Access policy for Private Access apps](https://learn.microsoft.com/entra/global-secure-access/how-to-target-resource-private-access-apps).
65
65
66
66
## Enable Microsoft Entra Private Access
67
67
68
-
Once you have your Quick Access app configured, your private resources added, users assigned to the app, you can enable the Private access profile from the **Traffic forwarding** area of Global Secure Access. You can enable the profile before configuring Quick Access, but without the app and profile configured, there's no traffic to forward. To learn how to enable the Private Access traffic forwarding profile, see [How to manage the Private Access traffic forwarding profile](https://learn.microsoft.com/en-us/entra/global-secure-access/how-to-manage-private-access-profile).
68
+
Once you have your Quick Access app configured, your private resources added, users assigned to the app, you can enable the Private access profile from the **Traffic forwarding** area of Global Secure Access. You can enable the profile before configuring Quick Access, but without the app and profile configured, there's no traffic to forward. To learn how to enable the Private Access traffic forwarding profile, see [How to manage the Private Access traffic forwarding profile](https://learn.microsoft.com/entra/global-secure-access/how-to-manage-private-access-profile).
Copy file name to clipboardExpand all lines: website/docs/Entra Private Access/per-appAccess.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,7 +31,7 @@ To create a new app, you provide a name, select a connector group, and then add
31
31
1. Enter a name for the app.
32
32
1. Select a Connector group from the dropdown menu.
33
33
> [!IMPORTANT]
34
-
> You must have at least one active connector in order to create an application. To learn more about connectors, see [Understand the Microsoft Entra private network connector](https://learn.microsoft.com/en-us/entra/global-secure-access/concept-connectors).
34
+
> You must have at least one active connector in order to create an application. To learn more about connectors, see [Understand the Microsoft Entra private network connector](https://learn.microsoft.com/entra/global-secure-access/concept-connectors).
35
35
1. Select the **Save** button at the bottom of the page to create your app without adding private resources.
36
36
37
37
### Add application segment
@@ -88,7 +88,7 @@ You can add fully qualified domain names (FQDN), IP addresses, and IP address ra
88
88
89
89
## Assign users and groups
90
90
91
-
You need to grant access to the app you created by assigning users and/or groups to the app. For more information, see [Assign users and groups to an application.](https://learn.microsoft.com/en-us/entra/identity/enterprise-apps/assign-user-or-group-access-portal?pivots=portal)
91
+
You need to grant access to the app you created by assigning users and/or groups to the app. For more information, see [Assign users and groups to an application.](https://learn.microsoft.com/entra/identity/enterprise-apps/assign-user-or-group-access-portal?pivots=portal)
92
92
93
93
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com).
@@ -123,5 +123,5 @@ Conditional Access policies for per-app access are configured at the application
123
123
- Go to **Global Secure Access** > **Applications** > **Enterprise applications**. Select an application and then select **Conditional Access** from the side menu.
124
124
- Go to **Protection** > **Conditional Access** > **Policies**. Select **+ Create new policy**.
125
125
126
-
For more information, see [Apply Conditional Access policies to Private Access apps](https://learn.microsoft.com/en-us/entra/global-secure-access/how-to-target-resource-private-access-apps).
126
+
For more information, see [Apply Conditional Access policies to Private Access apps](https://learn.microsoft.com/entra/global-secure-access/how-to-target-resource-private-access-apps).
Copy file name to clipboardExpand all lines: website/docs/Entra Private Access/powershell.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,12 +3,12 @@ sidebar_position: 60
3
3
title: "Using PowerShell to manage Private Access"
4
4
---
5
5
6
-
This is a community-supported PowerShell module which simplifies managing Entra Private Access apps. The module calls the Graph API endpoints to perform common operations.
6
+
This is a community-supported PowerShell module which simplifies managing Microsoft Entra Private Access apps. The module calls the Graph API endpoints to perform common operations.
NOTE: The commands in this module are being created into Microsoft's Entra PowerShell Beta module https://learn.microsoft.com/en-us/powershell/entra-powershell/installation
11
+
NOTE: The commands in this module are being created in the Microsoft Entra PowerShell Beta module https://learn.microsoft.com/powershell/entra-powershell/installation
12
12
Once I finish, I'll flag this module as deprecated.
13
13
These are the commands already implemented in Entra PS Beta:
Disable IPv6 on your client machine (where GSA client runs) *AND* on your connector/s servers. *It's important to disable IPv6 on both.*
92
92
93
-
[Guidance on disabling IPv6 on Windows](https://learn.microsoft.com/en-us/troubleshoot/windows-server/networking/configure-ipv6-in-windows#:~:text=will%20be%20preferred.-,Disable%20IPv6,-Decimal%20255%0AHexadecimal)
93
+
[Guidance on disabling IPv6 on Windows](https://learn.microsoft.com/troubleshoot/windows-server/networking/configure-ipv6-in-windows#:~:text=will%20be%20preferred.-,Disable%20IPv6,-Decimal%20255%0AHexadecimal)
94
94
95
95
### Private Access resource access fails
96
96
There are multiple reasons Private Access resources might not work correctly. Here are some troubleshooting steps you can follow.
Copy file name to clipboardExpand all lines: website/docs/Pre-requisites/ConnectorPA.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,11 +10,11 @@ You can organize connectors into connector groups, with each group handling traf
10
10
11
11
Follow the steps in this article to plan and deploy your connectors in preparation for testing Private Access:
12
12
13
-
[Understand the Microsoft Entra private network connector](https://learn.microsoft.com/en-us/entra/global-secure-access/concept-connectors)
13
+
[Understand the Microsoft Entra private network connector](https://learn.microsoft.com/entra/global-secure-access/concept-connectors)
14
14
15
-
[How to configure private network connectors for Microsoft Entra Private Access and Microsoft Entra application proxy](https://learn.microsoft.com/en-us/entra/global-secure-access/how-to-configure-connectors)
15
+
[How to configure private network connectors for Microsoft Entra Private Access and Microsoft Entra application proxy](https://learn.microsoft.com/entra/global-secure-access/how-to-configure-connectors)
16
16
17
-
> The minimum version of connector required for Private Access is **1.5.3417.0**, however it's recommended to install the [latest available version](https://learn.microsoft.com/en-us/entra/global-secure-access/reference-version-history)
17
+
> The minimum version of connector required for Private Access is **1.5.3417.0**, however it's recommended to install the [latest available version](https://learn.microsoft.com/entra/global-secure-access/reference-version-history)
Copy file name to clipboardExpand all lines: website/docs/RunningPOCs.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,7 +18,7 @@ This guide assumes you are running a POC in a production environment. Running a
18
18
19
19
## Private Access
20
20
#### Are you using a VPN today? The best way to start is by testing our "VPN Replacement" scenario.
21
-
This gives you the ability to publish all the same resources that users access through the VPN, protected by Entra ID.
21
+
This gives you the ability to publish all the same resources that users access through the VPN, protected by Microsoft Entra ID.
22
22
From that point onwards, you can start "segmenting access" by creating Enterprise Apps that define access to specific resources that only selected users should access. For example, only administrators should be able to RDP servers.
23
23
24
24
Review the [VPN Replacement](./Entra%20Private%20Access/VPNReplacement.md) section to understand the recommended configuration for this scenario.
@@ -32,4 +32,4 @@ If you decide to only [publish certain resources using Private Access](./Entra%2
32
32
## Internet Access
33
33
34
34
There are several scenarios enabled by Internet Access and Microsoft Access that can be tested as part of a POC.
35
-
Alternatively, coexistence with other solutions can be tested using the guidance provided here: [Secure Access with Global Secure Access Partners](https://learn.microsoft.com/en-us/entra/global-secure-access/concept-cisco-coexistence)
35
+
Alternatively, coexistence with other solutions can be tested using the guidance provided here: [Secure Access with Global Secure Access Partners](https://learn.microsoft.com/entra/global-secure-access/concept-cisco-coexistence)
Copy file name to clipboardExpand all lines: website/docs/intro.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -42,7 +42,7 @@ Welcome to our community hub dedicated to Global Secure Access – the unifying
42
42
43
43
### Global Secure Access
44
44
45
-
[Visit the Global Secure Access licensing documentation](https://learn.microsoft.com/en-us/entra/global-secure-access/overview-what-is-global-secure-access#licensing-overview)
45
+
[Visit the Global Secure Access licensing documentation](https://learn.microsoft.com/entra/global-secure-access/overview-what-is-global-secure-access#licensing-overview)
46
46
47
47
48
48
## ⏩ Deployment Guides for Proof of Concepts (PoCs)
0 commit comments