You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: docs/architecture/auth-remote-desktop-gateway.md
+11-10
Original file line number
Diff line number
Diff line change
@@ -10,11 +10,12 @@ ms.date: 03/01/2023
10
10
ms.author: jricketts
11
11
ms.reviewer: ajburnle
12
12
---
13
+
13
14
# Remote Desktop Gateway Services
14
15
15
16
A standard Remote Desktop Services (RDS) deployment includes various [Remote Desktop role services](/windows-server/remote/remote-desktop-services/desktop-hosting-logical-architecture) running on Windows Server. The RDS deployment with Microsoft Entra application proxy has a permanent outbound connection from the server that is running the connector service. Other deployments leave open inbound connections through a load balancer.
16
17
17
-
This authentication pattern allows you to offer more types of applications by publishing onpremises applications through Remote Desktop Services. It reduces the attack surface of their deployment by using Microsoft Entra application proxy.
18
+
This authentication pattern allows you to offer more types of applications by publishing on-premises applications through Remote Desktop Services. It reduces the attack surface of their deployment by using Microsoft Entra application proxy.
18
19
19
20
## When to use Remote Desktop Gateway Services
20
21
@@ -24,22 +25,22 @@ Use Remote Desktop Gateway Services when you need to provide remote access and p
24
25
25
26
## System components
26
27
27
-
***User**: Accesses RDS served by Application Proxy.
28
-
***Web browser**: The component that the user interacts with to access the external URL of the application.
29
-
***Microsoft Entra ID**: Authenticates the user.
30
-
***Application Proxy service**: Acts as reverse proxy to forward request from the user to RDS. Application Proxy can also enforce any Conditional Access policies.
31
-
***Remote Desktop Services**: Acts as a platform for individual virtualized applications, providing secure mobile and remote desktop access. It provides end users with the ability to run their applications and desktops from the cloud.
28
+
-**User:** Accesses RDS served by Application Proxy.
29
+
-**Web browser:** The component that the user interacts with to access the external URL of the application.
30
+
-**Microsoft Entra ID:** Authenticates the user.
31
+
-**Application Proxy service:** Acts as reverse proxy to forward request from the user to RDS. Application Proxy can also enforce any Conditional Access policies.
32
+
-**Remote Desktop Services:** Acts as a platform for individual virtualized applications, providing secure mobile and remote desktop access. It provides end users with the ability to run their applications and desktops from the cloud.
## Implement Remote Desktop Gateway services with Microsoft Entra ID
36
37
37
38
Explore the following resources to learn more about implementing Remote Desktop Gateway services with Microsoft Entra ID.
38
39
39
-
*[Publish Remote Desktop with Microsoft Entra application proxy](~/identity/app-proxy/application-proxy-integrate-with-remote-desktop-services.md) describes how Remote Desktop Service and Microsoft Entra application proxy work together to improve productivity of workers who are away from the corporate network.
40
-
* The [Tutorial - Add an on-premises app - Application Proxy in Microsoft Entra ID](~/identity/app-proxy/application-proxy-add-on-premises-application.md) helps you to prepare your environment for use with Application Proxy.
40
+
-[Publish Remote Desktop with Microsoft Entra application proxy](~/identity/app-proxy/application-proxy-integrate-with-remote-desktop-services.md) describes how Remote Desktop Service and Microsoft Entra application proxy work together to improve productivity of workers who are away from the corporate network.
41
+
- The [Tutorial - Add an on-premises app - Application Proxy in Microsoft Entra ID](~/identity/app-proxy/application-proxy-add-on-premises-application.md) helps you to prepare your environment for use with Application Proxy.
41
42
42
43
## Next steps
43
44
44
-
*[Microsoft Entra authentication and synchronization protocol overview](auth-sync-overview.md) describes integration with authentication and synchronization protocols. Authentication integrations enable you to use Microsoft Entra ID and its security and management features with little or no changes to your applications that use legacy authentication methods. Synchronization integrations enable you to sync user and group data to Microsoft Entra ID and then user Microsoft Entra management capabilities. Some sync patterns enable automated provisioning.
45
-
*[Remote Desktop Services architecture](/windows-server/remote/remote-desktop-services/desktop-hosting-logical-architecture) describes configurations for deploying Remote Desktop Services to host Windows apps and desktops for end-users.
45
+
-[Microsoft Entra authentication and synchronization protocol overview](auth-sync-overview.md) describes integration with authentication and synchronization protocols. Authentication integrations enable you to use Microsoft Entra ID and its security and management features with little or no changes to your applications that use legacy authentication methods. Synchronization integrations enable you to sync user and group data to Microsoft Entra ID and then user Microsoft Entra management capabilities. Some sync patterns enable automated provisioning.
46
+
-[Remote Desktop Services architecture](/windows-server/remote/remote-desktop-services/desktop-hosting-logical-architecture) describes configurations for deploying Remote Desktop Services to host Windows apps and desktops for end-users.
Copy file name to clipboardexpand all lines: docs/architecture/auth-saml.md
+13-14
Original file line number
Diff line number
Diff line change
@@ -14,41 +14,40 @@ ms.reviewer: ajburnle
14
14
15
15
# SAML authentication with Microsoft Entra ID
16
16
17
-
Security Assertion Markup Language (SAML) is an open standard for exchanging authentication and authorization data between an identity provider and a service provider. SAML is an XML-based markup language for security assertions, which are statements that service providers use to make access-control decisions.
17
+
Security Assertion Markup Language (SAML) is an open standard for exchanging authentication and authorization data between an identity provider (IdP) and a service provider. SAML is an XML-based markup language for security assertions, which are statements that service providers use to make access-control decisions.
18
18
19
19
The SAML specification defines three roles:
20
20
21
-
* The principal, generally a user
22
-
* The identity provider (IdP)
23
-
* The service provider (SP)
24
-
21
+
- The principal, generally a user
22
+
- The identity provider (IdP)
23
+
- The service provider (SP)
25
24
26
25
## Use when
27
26
28
27
There's a need to provide a single sign-on (SSO) experience for an enterprise SAML application.
29
28
30
-
While one of most important use cases that SAML addresses is SSO, especially by extending SSO across security domains, there are other use cases (called profiles) as well.
29
+
While one of most important use cases that SAML addresses is SSO, especially by extending SSO across security domains, there are other use cases (called profiles) as well.
31
30
32
31

33
32
34
33
## Components of system
35
34
36
-
***User**: Requests a service from the application.
35
+
-**User:** Requests a service from the application.
37
36
38
-
***Web browser**: The component that the user interacts with.
37
+
-**Web browser:** The component that the user interacts with.
39
38
40
-
***Web app**: Enterprise application that supports SAML and uses Microsoft Entra ID as IdP.
39
+
-**Web app:** Enterprise application that supports SAML and uses Microsoft Entra ID as IdP.
41
40
42
-
***Token**: A SAML assertion (also known as SAML tokens) that carries sets of claims made by the IdP about the principal (user). It contains authentication information, attributes, and authorization decision statements.
41
+
-**Token:** A SAML assertion (also known as SAML tokens) that carries sets of claims made by the IdP about the principal (user). It contains authentication information, attributes, and authorization decision statements.
43
42
44
-
***Microsoft Entra ID**: Enterprise cloud IdP that provides SSO and Multi-factor authentication for SAML apps. It synchronizes, maintains, and manages identity information for users while providing authentication services to relying applications.
43
+
-**Microsoft Entra ID:** Enterprise cloud IdP that provides SSO and multifactor authentication for SAML apps. It synchronizes, maintains, and manages identity information for users while providing authentication services to relying applications.
Copy file name to clipboardexpand all lines: docs/architecture/auth-ssh.md
+15-14
Original file line number
Diff line number
Diff line change
@@ -11,40 +11,41 @@ ms.date: 01/10/2023
11
11
ms.author: jricketts
12
12
ms.reviewer: ajburnle
13
13
---
14
-
# SSH authentication with Microsoft Entra ID
15
14
16
-
Secure Shell (SSH) is a network protocol that provides encryption for operating network services securely over an unsecured network. It's commonly used in systems like Unix and Linux. SSH replaces the Telnet protocol, which doesn't provide encryption in an unsecured network.
15
+
# SSH authentication with Microsoft Entra ID
16
+
17
+
Secure Shell (SSH) is a network protocol that provides encryption for operating network services securely over an unsecured network. It's commonly used in systems like Unix and Linux. SSH replaces the Telnet protocol, which doesn't provide encryption in an unsecured network.
17
18
18
19
Microsoft Entra ID provides a virtual machine (VM) extension for Linux-based systems that run on Azure. It also provides a client extension that integrates with the [Azure CLI](/cli/azure/) and the OpenSSH client.
19
20
20
21
You can use SSH authentication with Active Directory when you're:
21
22
22
-
* Working with Linux-based VMs that require remote command-line sign-in.
23
+
- Working with Linux-based VMs that require remote command-line sign-in.
23
24
24
-
* Running remote commands in Linux-based systems.
25
+
- Running remote commands in Linux-based systems.
25
26
26
-
* Securely transferring files in an unsecured network.
27
+
- Securely transferring files in an unsecured network.
27
28
28
-
## Components ofthe system
29
+
## Components ofthe system
29
30
30
-
The following diagram shows the process of SSH authentication with Microsoft Entra ID:
31
+
The following diagram shows the process of SSH authentication with Microsoft Entra ID:
31
32
32
33

33
34
34
35
The system includes the following components:
35
36
36
-
***User**: The user starts the Azure CLI and the SSH client to set up a connection with the Linux VMs. The user also provides credentials for authentication.
37
+
-**User:** The user starts the Azure CLI and the SSH client to set up a connection with the Linux VMs. The user also provides credentials for authentication.
37
38
38
-
***Azure CLI**: The user interacts with the Azure CLI to start a session with Microsoft Entra ID, request short-lived OpenSSH user certificates from Microsoft Entra ID, and start the SSH session.
39
+
-**Azure CLI:** The user interacts with the Azure CLI to start a session with Microsoft Entra ID, request short-lived OpenSSH user certificates from Microsoft Entra ID, and start the SSH session.
39
40
40
-
***Web browser**: The user opens a browser to authenticate the Azure CLI session. The browser communicates with the identity provider (Microsoft Entra ID) to securely authenticate and authorize the user.
41
+
-**Web browser:** The user opens a browser to authenticate the Azure CLI session. The browser communicates with the identity provider (Microsoft Entra ID) to securely authenticate and authorize the user.
41
42
42
-
***OpenSSH client**: The Azure CLI (or the user) uses the OpenSSH client to start a connection to the Linux VM.
43
+
-**OpenSSH client:** The Azure CLI (or the user) uses the OpenSSH client to start a connection to the Linux VM.
43
44
44
-
***Microsoft Entra ID**: Microsoft Entra authenticates the identity of the user and issues short-lived OpenSSH user certificates to the Azure CLI client.
45
+
-**Microsoft Entra ID:** Microsoft Entra authenticates the identity of the user and issues short-lived OpenSSH user certificates to the Azure CLI client.
45
46
46
-
***Linux VM**: The Linux VM accepts the OpenSSH user certificate and provides a successful connection.
47
+
-**Linux VM:** The Linux VM accepts the OpenSSH user certificate and provides a successful connection.
47
48
48
49
## Next steps
49
50
50
-
* To implementSSHwith Microsoft Entra ID for your users or guest users, see [Log in to a Linux VM by using Microsoft Entra credentials](~/identity/devices/howto-vm-sign-in-azure-ad-linux.md).
51
+
- To implementSSHwith Microsoft Entra ID for your users or guest users, see [Log in to a Linux VM by using Microsoft Entra credentials](~/identity/devices/howto-vm-sign-in-azure-ad-linux.md).
Copy file name to clipboardexpand all lines: docs/architecture/auth-sync-overview.md
+9-11
Original file line number
Diff line number
Diff line change
@@ -20,27 +20,25 @@ Microsoft Entra ID enables integration with many authentication protocols. The a
20
20
21
21
The following table presents authentication Microsoft Entra integration with legacy authentication protocols and their capabilities. Select the name of an authentication protocol to see
0 commit comments