@tn57chgs-3733
Thank you for your detailed post and I apologize for the delayed response!
I understand that you have some questions regarding the Always-On-VPN, and when it comes to the Azure AD side of things, I'll do my best to answer these or point you in the right direction.
Where are these certificates stored and can Global Admins view and manage them
- VPN certificate information such as certificate thumbprint and certificate expiration information, are stored as a service principal named "VPN Server" in Azure AD.
- A user with least privileged role can view, but not modify service principal information.
- Only the Global Administrator, Application Administrator, Cloud Application Administrator, Hybrid Identity Administrator, Directory Synchronization Accounts and Service Principal owners are permitted to update or delete service principal information including "VPN Server". For more info.
Creating a new certificate from the conditional access blade makes a client app named "VPN Server." What behavior is when you go for a second certificate after the first expires? Will it create a new VPN Server client app or replace the expired one?
- The VPN Server client app that's created is a Service Principal object, so a second app won't be created when you create a second certificate after the first one expires. For more info.
Can the duration extend? Right now, it only shows 1, 2, and 3 years.
- As of right now, the only options when setting the certificate duration is 1, 2, and 3 years. However, if you'd like this duration to be changed, I'd recommend leveraging our User Voice forum and creating a feature request, so our engineering team can look into implementing this.
According to this article, the VPN root certificate (cloud root certificates) created from CA Blade should be added to the on-prem active directory Enterprise NTauth store. Is it a mandatory step? Without even doing so, I can connect to AOVPN without any issues.
- This step is mandatory. When it comes to deploying the conditional access root certificates to the on-premises AD, you're deploying the CA root certificate as trusted root certificate for VPN authentication to your on-premises AD.
I hope this helps!
If you have any other questions, please let me know.
Thank you for your time and patience throughout this issue.
----------
Please remember to "Accept Answer" if any answer/reply helped, so that others in the community facing similar issues can easily find the solution.