Enable multifactor authentication (MFA) for P2S VPN - Microsoft Entra ID authentication
If you want users to be prompted for a second factor of authentication before granting access, you can configure Microsoft Entra multifactor authentication (MFA). You can configure MFA on a per user basis, or you can leverage MFA via Conditional Access.
- MFA per user can be enabled at no-additional cost. When you enable MFA per user, the user is prompted for second factor authentication against all applications tied to the Microsoft Entra tenant. See Option 1 for steps.
- Conditional Access allows for finer-grained control over how a second factor should be promoted. It can allow assignment of MFA to only VPN, and exclude other applications tied to the Microsoft Entra tenant. See Option 2 for configuration steps. For more information about Conditional Access, see What is Conditional Access?
Enable authentication
- Navigate to Microsoft Entra ID -> Enterprise applications -> All applications.
- On the Enterprise applications - All applications page, select Azure VPN.
Configure sign-in settings
On the Azure VPN - Properties page, configure sign-in settings.
- Set Enabled for users to sign-in? to Yes. This setting allows all users in the AD tenant to connect to the VPN successfully.
- Set User assignment required? to Yes if you want to limit sign-in to only users that have permissions to the Azure VPN.
- Save your changes.
Option 1 - Per User access
Open the MFA page
- Sign in to the Azure portal.
- Navigate to Microsoft Entra ID -> Users.
- On the Users - All users page, select Per-user MFA to open the Per-user multifactor authentication page.
Select users
- On the multi-factor authentication page, select the user(s) for whom you want to enable MFA.
- Select Enable MFA.
Option 2 - Conditional Access
The recommended way to enable and use Microsoft Entra multifactor authentication is with Conditional Access policies. For granular configuration steps, see the tutorial: Require multifactor authentication.
Sign in to the Microsoft Entra admin center as at least a Conditional Access Administrator.
Browse to Protection > Security Center>Conditional Access, select + New policy, and then select Create new policy.
On the New pane, enter a name for the policy, such as VPN Policy.
Complete the following fields:
Field Value What does this policy apply to? Users and groups Assignments Specific users included Include Select users and groups. Select the checkbox for Users and groups Select Select at least one user or group On the Select page, browse for and select the Microsoft Entra user or group to which you want this policy to apply. For example, VPN Users, then choose Select.
Next, configure conditions for multifactor authentication. In the following steps, you configure the Azure VPN Client app to require multifactor authentication when a user signs in. For more information, see Configure the conditions.
Select the current value under Cloud apps or actions, and then under Select what this policy applies to, verify that Cloud apps is selected.
Under Include, choose Select resources. Since no apps are yet selected, the list of apps opens automatically.
In the Select pane, select the Azure VPN Client app, then choose Select.
Next, configure the access controls to require multifactor authentication during a sign-in event.
Under Access controls, select Grant, and then select Grant access.
Select Require multifactor authentication.
For multiple controls, select Require all the selected controls.
Now, activate the policy.
Under Enable policy, select On.
To apply the Conditional Access policy, select Create.
Next steps
To connect to your virtual network, you must create and configure a VPN client profile. See Create a P2S User VPN connection using Azure Virtual WAN - Microsoft Entra authentication.