Тёмный

Techie introduction to Microsoft Entra Internet Access & Microsoft Entra Private Access 

John Craddock Identity and Access Training
Подписаться 2,9 тыс.
Просмотров 10 тыс.
50% 1

Опубликовано:

 

6 сен 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 47   
@alexanderhatlen5297
@alexanderhatlen5297 Год назад
Nobody explains anything as well you, John! Simply love it. Thanks for sharing, this made it worth to figure out what this is already 🙂
@john_craddock
@john_craddock Год назад
Thanks for your kind comment Alexander. It is always great to get feedback, I am really pleased you found it useful!
@ra-sal-ghul
@ra-sal-ghul Год назад
This session comes just at the right time. Great as always. Thank you so much!
@john_craddock
@john_craddock Год назад
Thanks for the feedback
@justinniotobias
@justinniotobias Год назад
Wow! Just found your video and I'm very impressed with the quality of the content! Looking forward to more :)
@john_craddock
@john_craddock Год назад
Many thanks for taking the time to leave a comment. I a glad you found it useful.
@supriyochatterjee4095
@supriyochatterjee4095 Год назад
The best explanations of the most complex terms and concepts in the most simple way, hats off Sir for all your videos, God bless you and your family, keep making lots and all kinds of technical videos on Azure, AD and everything, sending best wishes from Kolkata, West Bengal, India 🇮🇳
@john_craddock
@john_craddock Год назад
Many thanks for your comments - I really appreciate you letting me know the videos are useful for you - please keep watching!
@KostiantynSulema
@KostiantynSulema Год назад
Great session! Thank you so much! This is another powerful tech from Azure AD / Entra making our apps and data even more secure.
@john_craddock
@john_craddock Год назад
Thanks for the feedback - this is a real game changer from Microsoft!
@anoopsudheer9873
@anoopsudheer9873 Год назад
Thank You very much John for the awesome session...🙏🙏.
@john_craddock
@john_craddock Год назад
Thank you for watching and sharing your appreciation.
@AndyMaloneMVP
@AndyMaloneMVP Год назад
Awesome session John👍
@john_craddock
@john_craddock Год назад
Thanks Andy, always great to hear from you!
@mymemoi5619
@mymemoi5619 Год назад
Fantastic Video, thank you very much for this. Is there any further documentation on the Branch Office IPSEC connection to SSE other than the high level overview? I am particularly interested in this, may change our entire WAN strategy. Thanks again!
@john_craddock
@john_craddock Год назад
Hi, thanks for feedback - I will shortly be releasing a video on setting up a VNG in Azure for testing the branch office scenarios. It would give you a great test environment. At the moment branch office only works for M365
@mymemoi5619
@mymemoi5619 Год назад
@@john_craddock one point to cover on the Private Access and SSE will be how it behaves globally. Particularly in countries with minimal Microsoft coverage such as China. Will these types of countries be recommended to roll this out?
@muzamilahmed6868
@muzamilahmed6868 Год назад
i am new to your channel its Very impressive
@john_craddock
@john_craddock Год назад
Thanks @muzamilahmed6868, I am glad you like it. Thanks for the comment
@eakaratkaewoum9924
@eakaratkaewoum9924 Год назад
Thank you sir.😊
@john_craddock
@john_craddock Год назад
Thank you, I hope you found it useful
@kiranpeteru
@kiranpeteru Год назад
Excellent Any info regarding the license required to use this features?
@john_craddock
@john_craddock Год назад
Hi @kiranpeteru, thanks for your comment. The licensing will be something Microsoft announces in the future - I'd love to know too!
@warmonkey96
@warmonkey96 Год назад
Fantastic video John. Super helpful. Presumably for resources that are not on-prem, there will be another way to allow access? ie tunnelling to AWS VPCs. Unless the private access piece here also accepts public ips and public FQDNs.
@john_craddock
@john_craddock Год назад
Thanks for the feedback - you can deploy a proxy endpoint to any cloud service.
@warmonkey96
@warmonkey96 Год назад
ah interesting, this sounds very similar to Netskope. They use something called a publisher which also sits inside your AWS VPC or azure vnet.@@john_craddock
@gvoden
@gvoden Год назад
Is there a SASE element to the solution, for example SD-WAN support for the branch office scenario?
@john_craddock
@john_craddock Год назад
Hi @gvoden, I don't know the Microsoft answer to this, but you manage branch to branch connectivity using site-to-site Azure connectivity.
@artisticcheese
@artisticcheese Год назад
Wondering if this service will work with scenario where access needs to be provided to VNET in Azure to access private endpoints for various Azure services, did not see during the video this scenario being discussed as supported since this scenario does involve some DNS resolution modification and possible some SSL issues
@john_craddock
@john_craddock Год назад
Hello @artisticcheese, I haven't tried this scenario. However, if you can connect to those resources from a server on your VNET I think it should be possible.
@artisticcheese
@artisticcheese Год назад
@@john_craddock Well, the point of this setup is that end users from their desktop shall be able to connect to those resources (full VPN replacement), you fell this will not be possible in such scenarios?
@john_craddock
@john_craddock Год назад
@@artisticcheese all I saying is I haven't yet tried connecting to all Azure resources. If the preview is of interest to you I suggest you set up a test environment and evaluate it's capabilities.
@kirtivijaysingh3164
@kirtivijaysingh3164 Год назад
Thank you very much sir.
@john_craddock
@john_craddock Год назад
You are very welcome, I am pleased you found it useful
@sreekanthop3489
@sreekanthop3489 Год назад
How about non windows client access ? . We are only taking about windows 10 or 11
@john_craddock
@john_craddock Год назад
There will be other GSA clients made available by Microsoft, remember this is in preview and a work in progress. Today, for other clients, using the M365 Profile you can use the branch office setup.
@hennibadger5120
@hennibadger5120 Год назад
Great content! Appreciated! What I don't get: In private access setting: How does an remote client without any vpn connectivity or something even know under which IP a service is reachable? Would I have to put them into public DNS with their RFC1819 IP? Thank you very much!
@john_craddock
@john_craddock Год назад
Thanks for the feedback and your great question! The answer is that it's done through the power of cloud magic! The private access app is published via an Entra ID (Azure AD) Enterprise application. QuickAccess is one of those apps, and it is a temporary (transitional) app for providing access to multiple private apps. Eventually, you will want to end up with a one-to-one or selective one-to-many relationships. With one enterprise app representing one private app, you can have different CA policies and permissions for each private app. When you publish the private app, you publish the path FQDN or IP(s) and port(s), and those FQDNs and IPs are private to the environment where the private app resides. They must be resolvable by the proxy connection endpoint. The system then published the details of a private app into the private traffic profile. That profile is downloaded by the client, and the GSA client then knows to send traffic for the private IP or FQND to the Security Service Edge (SSE). After completing all the security checks, the SSE will send the traffic to the appropriate endpoint. Hopefully, after reading this, you know the answer to your second question is No!
@hennibadger5120
@hennibadger5120 Год назад
I see - great. Thank you so much 😊 Digging somewhat deeper there are more questions coming to my mind 😅: Does the whole private access setup work with a Windows Hello for business Cloudtrust / AzureAD Kerberos implementation? As there won't be line of sight for a remote device to the DC / DNS / KDC. Testing the private access functionality I was able to access an on-prem MS SQL server with Windows authentication just fine - but only when using password. The same test while using PIN / Fingerprint failed with some "SSPI context" error. I guess that might be because of the missing line of sight to necessary AD resources? But I'm not too sure on that. 😅 Any idea on that topic that would be very much appreciated. Great work! 😊
@john_craddock
@john_craddock Год назад
No Kerberos at the moment, I am talking with Microsoft this week to see what I can an can't say! Following the NDA for me is really important!
@hennibadger5120
@hennibadger5120 Год назад
Thanks - so helpful. 😊 A kerberos implementation would be really awesome - as the majority of on prem services to "publish" via private access might just depend on it. Please keep us up to date and keep up the great work!
@mattcauthen
@mattcauthen Год назад
We've been working to set this up for our users, and have beat our head against the wall for 2 days, we're not clear on what we are doing wrong. Do you offer any consulting services for business?
@john_craddock
@john_craddock Год назад
Hi Matt, I am sure we could help you out on this. Please pop me an email info@xtseminars.co.uk. john
@mattcauthen
@mattcauthen Год назад
@@john_craddock Thanks so much John! Will do now!
@matzegalaxy7470
@matzegalaxy7470 Год назад
HI, first of all: Thank you. In Privat Access what i dont get is how internal urls work. if i have app.contoso.local, do i have to use hosts file or similar or does the SSE client resolve the url to the ip?
@john_craddock
@john_craddock Год назад
H @matzegalaxy7470i, the private access network profile is picked up by the GSA client. The client then knows to send traffic for the published private apps to the SSE. The DNS fqdn is resolved by the private connector endpoint. - I hope that helps John
@matzegalaxy7470
@matzegalaxy7470 Год назад
@@john_craddock yes, that helped, thanks
Далее
Deep Dive on Microsoft Entra Private Access
1:01:08
Просмотров 39 тыс.
What is DNS? (and how it makes the Internet work)
24:22
Hacking Windows TrustedInstaller (GOD MODE)
31:07
Просмотров 596 тыс.
Why Cybersecurity Training is a SCAM
10:37
Просмотров 149 тыс.
Goodbye VPN! Hello Microsoft Global Secure Access
19:40
Azure AD Authentication Methods and Policies
1:00:46
Просмотров 8 тыс.
Deep Dive on Microsoft Entra Internet Access
48:45
Просмотров 28 тыс.