Thanks for posting your question in the Microsoft Q&A forum.
Follow these steps:
Step 1: Create and Configure VPN Gateway
Create a Virtual Network Gateway in Azure Portal
- Select VPN as the gateway type
- Choose Route-based VPN type
- Select an appropriate SKU (e.g., VpnGw1 or higher for better performance)
Configure Point-to-Site settings
- Go to your VPN gateway's "Point-to-site configuration" page
- Click "Configure now"
- Set the Address pool for VPN clients
- For Tunnel type, select "OpenVPN (SSL)"
- For Authentication type, choose "Azure Active Directory"
Step 2: Set Up Azure AD Authentication
Register a new application in Azure AD
- Go to Azure Active Directory in the Azure Portal
- Navigate to "App registrations" and create a new application
- Note down the Application ID and Tenant ID
Configure the VPN gateway to use Azure AD authentication
- In the Point-to-site configuration, add the Azure AD tenant information
- Include the Application ID from the registered app
Step 3: Configure Client Settings
Download the VPN client configuration package
- On the Point-to-site configuration page, click "Download VPN client"
Set up AzureVPN Client for Windows and MacOS
- Download and install AzureVPN Client for respective operating systems
- Import the downloaded configuration into the AzureVPN Client
Step 4: Enable Multi-Factor Authentication
Configure Azure AD Conditional Access
- Create a new policy in Azure AD Conditional Access
- Set the policy to require MFA for VPN connections
Set up Microsoft Authenticator for users
- Guide users to install and configure Microsoft Authenticator app
Please don't forget to close up the thread here by upvoting and accept it as an answer if it is helpful