Edit

Share via


Understand Microsoft Entra Private DNS

Microsoft Entra Private Access provides a quick and easy way to replace legacy VPNs. It provides granular and secure access to internal resources without exposing your full network. DNS plays a vital role by enabling name resolution for critical internal resources, and remote users don't need to know the configuration of internal DNS systems. Microsoft Entra Private DNS with Quick Access offers a simple setup that uses Connector local resolvers to respond to DNS queries for internal resources.

Private DNS service allows you to add domain suffixes for the organization to the Quick Access configuration. This automatically updates the traffic forwarding profile for clients. Once configured, any DNS queries for a fully qualified domain name (FQDN) that ends with the matching suffixes from client devices are sent to the DNS proxy at a GSA edge for resolution. If a cached result is available, DNS responses are returned to the clients. Otherwise, the DNS proxy forwards the request to the Connector, which sends the DNS query to its DNS server for resolution. The Connector then passes the responses back to the edge, which returns the query to the client. The GSA client then assigns a synthetic IP address, and returns it back to the application. The synthetic IP is used to steer the application traffic to GSA edges.

A high-level Private DNS flow for Windows clients is shown in the following diagram.

Configuration

  • An admin enables Private DNS and adds a DNS suffix from Quick Access.

  • On the client, an entry in the Name Resolution Policy Table (NRPT) is generated for the suffix to resolve via the GSA client.

  • Client traffic forwarding profile is updated to send private DNS queries to the GSA edge.

Datapath

  1. User requests a DNS query for app.contoso.com. If not cached locally, the DNS query is sent to the DNS proxy at the GSA edge.
  2. DNS proxy either responds from its cache or forwards the query to the Connector Group defined in Quick Access.
    1.The connector server sends the DNS query to the DNS servers configured at operating system level.
  3. DNS proxy responds back to the client with the internal IP. The client stores the internal IP address and returns a synthetic IP to the application.

Screenshot of a diagram showing DNS queries resolved via Private DNS when a DNS suffix is configured in Quick Access.

When a DNS suffix is configured in Quick Access, all DNS queries for a fully qualified domain name (FQDN) that ends with the matching suffixes are resolved by Private DNS, including those used to define Enterprise Apps.

Single-label domain (SLD) resolution

The Private DNS provides name resolution for SLD without a domain suffix. An NRPT entry is created to send GSA suffix globalsecureaccess.local. to DNS proxy when Private DNS is configured. The client machine appends the <appid>.globalsecureaccess.local. suffix to the SLD and sends the DNS request to the DNS proxy. DNS proxy strips away the search suffix before sending the DNS query to the connector. The connector then uses its local search suffixes to resolve the SLD query. Resolved IP address for the resource is returned to the DNS proxy and passed along to the client.

Note

For some applications such as Kerberos authentication, it is important to have the correct SPN. GSA synthetic suffix may break Kerberos flow, so it's recommended to use FQDN for applications that require Kerberos authentication.

To learn how to enable Private DNS with Quick Access, see How to configure Quick Access.

To learn how Private DNS works with SSO, see Use Kerberos for single sign-on (SSO) to your resources with Microsoft Entra Private Access.

To learn tips on DNS troubleshooting, see Troubleshoot application access - Global Secure Access.

To learn hostname acquisition advanced diagnostics, see Troubleshoot the Global Secure Access client: diagnostics - Global Secure Access.