SSLVPN authentication with Microsoft Entra ID

Options
Zyxel_Kevin
Zyxel_Kevin Posts: 981 image  Zyxel Employee
Zyxel Certified Network Administrator - Security Zyxel Certified Sales Associate 100 Answers 500 Comments
edited January 15 in VPN

OpenID Connect (OIDC) is a modern authentication protocol built on OAuth 2.0. We now support OIDC integration with Microsoft Entra ID for SSLVPN authentication. This integration allows us to leverage their existing identity provider for a seamless login experience while centralizing account management and reducing the risks associated with traditional passwords. 

unknown.png

Before You Begin 

Before configuring the firewall, you must complete the required setup. 

  • Application Administrator role in your Microsoft Entra ID 
  • USG FLEX H Series firewall (Firmware in uOS1.37 or later) 
  • Valid licenses for your identity provider (Microsoft Entra ID) 
  • Network connectivity between your device and Microsoft Entra ID 

Authentication Proxy 

Navigate to User & Authentication > User Authentication > Advanced 

To prevent certificate warnings during the VPN client dial-up, this should be a commercial CA-signed certificate or your internal CA's certificate must be distributed to all client devices. And the Common Name (CN) or SAN (Subject Alternative Name) of the certificate should be a FQDN that can be resolve to the WAN IP of your firewall. 

image-df6ec93142f3b-600e.png image-b307037e4a57f8-9083.png

Register an Application in Microsoft Entra ID 

1.Go to Entra ID Portal > App registrations > New registration. 

unknown.png unknown.png

2.Enter a display name 

unknown.png

3.Navigate to Manage > API permissions > Add a permissions 

unknown.png

4.Please allow “email”, “offline_access”, “openid”, “profile” and “User.Read” 

unknown.png

5.Navigate to Manage > Certificate & secret > New client secret.  

unknown.png


6.Create a secret and copy the Secret Value immediately. You will need this for the Firewall setup. 

unknown.png image-b2d00a16897088-0c30.png

Create OIDC AAA Server 

1. Login to the USG FLEX H and navigate to User & Authentication > User Authentication > AAA Server. Add OIDC Server. 

image-a5629a52e7bd28-1939.png

Overview your Entra App, you need  “Client ID”, “Tenant ID”  for Firewall setup. 

unknown.png

2.Fill in Server details 

Issuer URL: https://login.microsoftonline.com/{Tenant ID}/v2.0 

Client ID: {Client ID} 

Client Secret: {You already have Secret at “Manage > Certificate & secrets”) 

Redirect Address: {FQDN} 

unknown.png unknown.png

3.Copy the above “Redirect URI” and back to Entra Portal Overview > Add a Redirect URI > Add a platform > Web. 

image-1265526400a2b8-8064.png image-e25b26571e9b08-a0c0.png

4. Paste the URI and Configure 

image-19ebd34d25dda-f17d.png

5. Go back to the USG FLEX H, OIDC Server page, at Configuration Validation.  

6. Click Test on the Firewall 

image-12aaefcf38cfe-5db9.png

7. You should see "OIDC Authentication Successful." 

image-0ca550e9b37bf-ada3.png

 

SSLVPN setting on USG FLEX H Series 

1.Configure SSLVPN and set OIDC as the Primary Server and Set Allowed User to oidc-users. 

Please note you cannot choose another Auth Server if you want to use OIDC.  

image-22e639aefeeec8-b1ad.png

 Verification 

1. Connected VPN via OpenVPN Connect Client 

2. A browser will automatically open the Microsoft login page.  

3. Authenticate with your Microsoft account 

image-343ccc105b1178-3987.png

 4. Check status at VPN Status > SSL VPN > Remote Access VPN.  

image-dafbfe4ec800e8-faaa.png