Microsoft Global Secure Access proof-of-concept guidance: Configure Microsoft Entra Private Access
The proof-of-concept (PoC) guidance in this series of articles helps you to learn, deploy, and test Microsoft Global Secure Access with Microsoft Entra Internet Access, Microsoft Entra Private Access, and the Microsoft traffic profile.
Detailed guidance begins with Introduction to Microsoft Global Secure Access proof-of-concept guidance and continues after this article with Configure Microsoft Entra Internet Access.
This article helps you to test Microsoft Entra Private Access and configure at least one private network connector. For detailed guidance, see How to configure connectors for Microsoft Entra Private Access.
Install the Microsoft Entra private network connector
Install and configure the latest version of the Microsoft Entra private network connector from the Microsoft Entra admin center.
Configure use cases
Configure and test your Microsoft Entra Private Access use cases. The following sections provide example use cases with specific guidance.
Replace VPN
You can use VPN replacement to open Microsoft Entra Private Access for traffic destined to all private network locations for all users. Follow these steps to seamlessly transition from full network access to Zero Trust network access:
- Configure Quick Access for Global Secure Access.
- Add private Domain Name System (DNS) suffixes.
- Manage user and group assignment to an application.
- Apply Conditional Access policies to Microsoft Entra Private Access apps.
Provide access to specific apps
If your goal is to move to a Zero Trust posture, configure per-app access to all your apps. This scenario can be a daunting undertaking because many companies don't have a full inventory of all IP addresses and fully qualified domain names (FQDNs) that users access on the private network.
To move to per-app access, configure Global Secure Access applications with app segments that limit access to specific IP addresses, IP ranges, FQDNs, protocols, and ports. You can create these configurations manually or by using tools such as PowerShell and App Discovery. Ensure that your Global Secure Access application includes in its app segments all IPs, ports, and protocols that the application uses.
Note
Any Global Secure Access applications with app segments that overlap with Quick Access take precedence. In other words, Global Secure Access doesn't route any traffic to those destinations over Quick Access. To avoid service disruption, assign users correctly to your Global Secure Access applications. If you need a slower onboarding to a Zero Trust posture, consider moving subsets of IP ranges and ports rather than entire enterprise applications at one time.
These articles provide detailed guidance:
- Configure per-app access by using Global Secure Access applications
- Application discovery (preview) for Global Secure Access
Use Kerberos SSO to Active Directory resources
Microsoft Entra Private Access uses Kerberos to provide single sign-on (SSO) for on-premises resources. You can use cloud Kerberos trust in Windows Hello for Business to allow SSO for users. To enable this scenario, you must publish your domain controllers and DNS suffixes in Microsoft Entra Private Access. For detailed guidance, see Use Kerberos for single sign-on (SSO) with Microsoft Entra Private Access.
Protect privileged access with PIM
You can use Microsoft Entra Privileged Identity Management (PIM) to control access to specific critical resources. This feature adds an extra layer of security to enforce just-in-time (JIT) privileged access on top of private access.
To configure Microsoft Entra Private Access to use PIM, configure and assign groups, activate privileged access, and follow compliance guidance. For details, refer to Secure private application access with Privileged Identity Management (PIM) and Global Secure Access.
Use PowerShell to manage Microsoft Entra Private Access
Several Global Secure Access commands are available in the Microsoft Entra PowerShell module. For detailed guidance, refer to Install the Microsoft Entra PowerShell module.
Protect on-premises resources
To help protect on-premises resources like domain controllers by enabling multifactor authentication (MFA), see Microsoft Entra Private Access for on-premises users.
Coexist with a partner
When customers deploy the 3P solution, they might want to use the Environmental Protection Agency (EPA) while using other solutions for internet access. For guidance, see Partner ecosystem overview.
Troubleshoot
If you have problems with your PoC, these articles can help you with troubleshooting, logging, and monitoring:
- Global Secure Access FAQ
- Troubleshoot problems installing the Microsoft Entra private network connector
- Troubleshoot the Global Secure Access client: Diagnostics
- Troubleshoot the Global Secure Access client: Health check tab
- Troubleshoot a Distributed File System issue with Global Secure Access
- Global Secure Access logs and monitoring
- How to use workbooks with Global Secure Access
Related content
- Introduction to Microsoft Global Secure Access proof-of-concept guidance
- Configure Microsoft Entra Internet Access
- Introduction to the Microsoft Global Secure Access deployment guide
- Microsoft Global Secure Access deployment guide for Microsoft Entra Private Access
- Microsoft Global Secure Access deployment guide for Microsoft Entra Internet Access
- Microsoft Global Secure Access deployment guide for Microsoft traffic