Microsoft Entra On-Premises Application Proxy Deployment Guide: Secure Exposure of Internal Services Under Zero Trust Architecture

I. What is Microsoft Entra On-Premises Application Proxy?

Microsoft Entra On-Premises Application Proxy is a Zero Trust Architecture (ZTA) solution for exposing internal services securely. As a component of Microsoft Entra Global Secure Access, it enables secure access without public IPs or exposed internal ports through a combination of cloud proxies and on-premises connectors. It integrates with Microsoft Entra ID for identity authentication (e.g., SSO, Conditional Access), providing enterprise-grade security for internal applications like Vaultwarden or corporate internal systems.

It addresses the subnet access issues of traditional Mesh VPNs and the security risks of public reverse proxies, while leveraging Microsoft Entra ID’s enterprise identity and security capabilities. This allows rapid, secure exposure of internal applications (e.g., Vaultwarden) to the public internet with "no public IP, no port forwarding" convenience.

II. Why Choose Microsoft On-Premises Application Proxy?

Compared to traditional Mesh VPNs (e.g., Tailscale, Nebula) or public reverse proxies (e.g., Cloudflare Tunnel), Microsoft’s solution better aligns with enterprise/individual security and convenience needs:

1. No Public IP or Subnet Access Required

2. More Secure Public Exposure

3. Better Domestic Network Stability

4. Integrated Enterprise-Grade Identity and Security

III. Architecture and Workflow

The core logic of Microsoft’s On-Premises Application Proxy is bidirectional communication between cloud proxies and on-premises connectors. Below is the detailed authentication and access flow (refer to Microsoft’s official diagram):

Microsoft Entra On-Premises Application Proxy Authentication Flow: User → Cloud Authentication → On-Premises Connector → Internal App
Microsoft Entra On-Premises Application Proxy Authentication Flow: User → Cloud Authentication → On-Premises Connector → Internal App

Flow Explanation:

IV. License Requirements

Microsoft On-Premises Application Proxy requires one of the following Microsoft Entra ID licenses:

Note: This guide uses a Microsoft Entra ID P2 license, which meets the above requirements.

Microsoft Entra License Types: P1/P2 licenses support On-Premises Application Proxy
Microsoft Entra License Types: P1/P2 licenses support On-Premises Application Proxy

V. Deployment Steps (Using Vaultwarden as an Example)

1. Prerequisites

2. Create a Dedicated Connector Group

A connector group is a logical grouping of on-premises connectors, used to manage internal apps for different regions or purposes (e.g., "Asia Connector Group" for handling requests from Asian users).

Steps:

3. Install the On-Premises Connector Client

The connector is a lightweight client deployed internally to establish communication between the cloud proxy and internal apps.

Steps:

4. Publish On-Premises Applications

(1) Configure Local DNS Resolution (Required for Internal URL)

The Internal URL (access address of the internal app) does not support direct IP addresses—it must use a local domain (e.g., 192.168.12.86.local.changjiu365.com). Therefore, you need to resolve the local domain to the internal app’s IP address (e.g., 192.168.12.86) via an internal DNS server (or router DNS settings, hosts file).

Example (Router DNS Settings):

(2) Configure Public DNS Resolution (Required for External URL)

The External URL is the custom domain used by users to access the internal app from the public internet (e.g., vw.changjiu365.com). It needs to point to the default domain of Microsoft’s On-Premises Application Proxy (format: *.msappproxy.net, available after creating the app).

Steps:

Key Notes:

(3) Create Application Proxy

Steps:

(4) Assign User/Group Access Permissions

By default, all users cannot access the newly created application proxy—you need to assign permissions manually:

(5) Upload SSL Certificate (Required for Custom Domain)

If using a custom domain (e.g., vw.changjiu365.com), you need to upload a PFX-formatted SSL certificate (including private key) for HTTPS encryption:

5. Post-Deployment Configuration and Verification

(1) Conditional Access Policy (Optional)

To enhance security, you can set up Conditional Access policies (e.g., only allow access from Intune-managed devices):

(2) Verify Access

Reference Documents:

你可能也感兴趣

加载评论…