Use Conditional Access with Microsoft Tunnel in Intune
If your Microsoft Intune environment uses both Azure Active Directory (AD) and Conditional Access, you can use Conditional Access policies to gate device access to your Microsoft Tunnel VPN gateway.
To support integration of Conditional Access and Microsoft Tunnel, you’ll use Azure AD PowerShell to enable your tenant to support Microsoft Tunnel. After enabling your tenant to support Microsoft Tunnel, you can then create Conditional Access policies that apply to the Microsoft Tunnel app.
Provision your tenant
Before you can configure Conditional Access policies for the tunnel, you must enable your tenant to support Microsoft Tunnel for Conditional Access. Use the Azure Active Directory PowerShell module and run a PowerShell script to modify your tenant to add Microsoft Tunnel Gateway as a cloud app. After the tunnel is added as a cloud app, you can select it as part of a Conditional Access policy.
Download and install the AzureAD PowerShell module.
Download the PowerShell script named mst-ca-provisioning.ps1 from aka.ms/mst-ca-provisioning.
Using credentials that have the Azure Role permissions equivalent to Global Administrator, run the script from any location in your environment, to provision your tenant.
The script modifies your tenant by creating a service principal with the following details:
- App ID: 3678c9e9-9681-447a-974d-d19f668fcd88
- Name: Microsoft Tunnel Gateway
The addition of this service principal is required so you can select the tunnel cloud app while configuring Conditional Access policies. It's also possible to use Graph to add the service principal information to your tenant.
After the script completes, you can use your normal process to create Conditional Access policies.
Conditional Access to limit access to Microsoft Tunnel
If you'll use Conditional Access policy to limit user access, we recommend configuring this policy after you provision your tenant to support the Microsoft Tunnel Gateway cloud app, but before you install the Tunnel Gateway.
Sign in to Microsoft Endpoint Manager admin center > Endpoint Security > Conditional access > New policy.
Specify a name for this policy.
To configure user and group access, below Assignments, select Users and groups.
- Select Include > All users.
- Next, select Exclude and configure the groups you want to grant access to, and then save the user and Group configuration.
Under Cloud apps or actions > Select apps, select the Microsoft Tunnel Gateway app.
Below Access controls, select Grant, select Block access, and then save the configuration.
Set Enable policy to On.
For more information about creating policies for Conditional Access, see Create a device-based Conditional Access policy.