Implementing Microsoft Private Access -- A Technical Guide
I previously discussed the Global Secure Access (GSA) : The future of secure corporate Internet browsing --- A Technical Guide ,Now, I will present the Step-by-Step Guide for Implementing Global Secure Access (Private Access) in Microsoft Entra ID.
I - What is Global Secure Access ?
Microsoft Private Access is an advanced security solution from Microsoft Entra that dramatically improves the way users access private applications and resources within an organization. The main aim is to replace traditional virtual private networks (VPNs) with a more modern, more secure and easier-to-manage solution.
II - Key features of Microsoft Private Access :
In short, Microsoft Private Access is a key component of Microsoft's Zero Trust security strategy, offering enhanced protection against modern threats while facilitating flexible, secure access to corporate resources.
III - Prerequisites for Microsoft Private Access :
IV - Mindmap to setup Microsoft Private Access :
here is mindmap to implement GSA Private Access :
V - Start Microsoft Private Access Configuration :
if you have followed my previous article "Global Secure Access (GSA) : The future of secure corporate Internet browsing --- A Technical Guide" , Global Secure Access will be enabled but you just need to enable Private Access Profile.
Step 1 : Activate and configure Global Secure Access in your tenant :
Second Feature that we need to enable is Access signaling in conditional access.
Adaptive access settings allow admins to enable features used by Microsoft Entra Conditional Access and Microsoft Entra Identity Protection.
After enabling Global Secure Access and Access signaling in conditional access :
Now that we have Enabled and configured Global Secure Access, we can move to the next phase : Installing Application Proxy Connector.
Step 2 : Downloading and Installing Application Proxy Connector
To install connector, I'll use an Azure VM :
For Microsoft Entra ID Private Access, install an Application Proxy Connector on a local/Cloud Windows server (I'll use my azure cloud server):
Download Connector from :
Now that we've finished installing the connector, let's move on to the enterprise application creation stage.
Step 3 : Create Entreprise Application and publish ports
Before starting Create Entreprise Application, let's take server local IP address , because we gonna use it in the following configuration steps.
As you can see here, my local IP address is : 10.0.0.4
Now let's move to Entreprise Application creation :
In the “Create application segment” fly-out pane, specify the Destination type, its corresponding values, and the ports you wish to grant access to.
The available options for the destination type field include:
Once you have configured all the fields accordingly, click “Apply” to save the application segment.
I have created two Ports with same address (you can add "," in port section and create them in a single line) :
Now that we have created Entreprise Application, we can move to the next phase : specify which users or groups should have access to the Enterprise Application.
领英推荐
Step 4 : specify which users or groups should have access to the Enterprise Application
We must now specify which users or groups should have access to the Enterprise Application.
To do this :
Now that we have specify which users or groups should have access to the Enterprise Application, we can move to the next phase : Create Conditional Access Policy for Private Access.
Step 5 : Create Conditional Access Policy for Private Access
in this part, I will apply a “Conditional Access Policy” with the basic values (you can adjust this rule by adding locatlions, device types and Compliance...etc, according to yourcompany needs).
To do this :
Now, let's move to next step Download and install Windows Client on user machine.
step 6 : Download and install Windows Client on user machine
I have already make this steps on my first article of "Internet Access", so if you have already installed the client app so no need to install it again.
In the Microsoft Entra portal :
After finishing program setup :
After Installing client agent in my VM, I should see Office 365 authentication window , but here in my case, my machine is already joined to Intune, so no need to re-authenticate again, that's way I can't see it, but you can see it in your side, just authenticate with your office 365 user account.
Step 7 : Test Connection to server
We'll start by testing the RDP connection on the 10.0.0.4 server we added from the beginning.
Now, let's try SMB connexion.
I have created Shared folder on the server, let's try to connect :
You must check every opened port on the server before trying remote connection.
Conclusion :
Microsoft Private Access is a powerful and flexible solution for improving the security and simplicity of access to private resources. If you're looking to modernize your access infrastructure, Microsoft Private Access is a solution you should seriously consider.
Thanks
Aymen EL JAZIRI
System Aministrator