Use Microsoft Entra ID

These instructions walk you through how to configure the Microsoft Entra ID integration allowing you to authenticate user accounts based on the information stored and managed there.

Local user accounts take precedence over Microsoft Entra ID accounts, meaning if you have an account in both for bob@example.com, the Microsoft Entra ID entry will be ignored.
Due to limitations of Azure, changes may take up to 24 hours to settle in and take effect.

Preflight (Checklist)

Command Line Tools

Login with your tool by running the following:

Azure CLI
az login
Azure PowerShell
if ((Get-ExecutionPolicy) -ne 'Unrestricted') { `
  Set-ExecutionPolicy -ExecutionPolicy RemoteSigned -Scope CurrentUser `
}
if (!(Get-Module -ListAvailable -Name Az)) { `
  Install-Module Az `
    -Repository PSGallery `
    -Scope CurrentUser `
    -Force `
}
Connect-AzAccount -UseDeviceAuthentication
You should be able to use your clipboard to copy and paste this command into it.

Azure Cloud Shell

  1. Click on the command prompt icon (a square box surrounding a ‘>_’) in the top right

  2. Select either ‘Bash’ (recommended) or ‘PowerShell’

  3. Select ‘No storage account required’ and choose the subscription you are working in

  4. Leave unchecked the option to ‘Use an existing private virtual network’</li>

  5. Click on the Apply button

You must run the login commands above even though it may seem unnecessary. This is because your Cloud Shell session does not initially start with access to Microsoft Graph which is needed to create an integration between RADNAC and Microsoft Entra ID.

Steps

Start by going to the managed application page, browse on the menu to the left through Resources (preview)  Microsoft Entra ID and then check ‘Configuration’ and click on the Edit button at the top.

Setup

Use the parameter values provided from RADNAC listed here and then run the command provided below whilst substituting the all in capitals placeholders with the parameter values:

  • SUBSCRIPTION_ID

  • LOCATION

  • MANAGED_APPLICATION_RID

az deployment sub create \
  --subscription SUBSCRIPTION_ID \
  --location LOCATION \
  --template-uri https://www.radnac.com/azuredeploy/msentraid-enrolment.json \
  --parameters managedApplicationResourceId=MANAGED_APPLICATION_RID \
  --query properties.outputs
Set-AzContext `
  -Subscription SUBSCRIPTION_ID
New-AzSubscriptionDeployment `
  -Location LOCATION `
  -TemplateUri https://www.radnac.com/azuredeploy/msentraid-enrolment.json `
  -managedApplicationResourceId MANAGED_APPLICATION_RID

This process has now created a Registered Application named after your managed application that you will need in later steps.

Application Exception for MFA

We now setup Microsoft Entra ID to skip multifactor authentication for requests from the RADNAC application in one of two ways:

For tenants of Microsoft Entra ID that use MFA, only a web based flow is supported which is incompatible with how your RADIUS (including your wireless service) needs to function. This is because to use a web browser you require a working network connection, but until you complete the authentication you have no network access. This is why we disable MFA for RADNAC when it authenticates users, but you may later enable push notification based MFA.
Conditional Access

This process describes moving from security defaults to Conditional Access.

Complete the following steps, though if you are already using and familiar with Conditional Access policies you may want to derive your own bespoke instructions for your own environment based upon the steps below:

  1. Go to the Microsoft Entra admin center

  2. From the left sidebar, navigate through Entra ID  Overview  Properties (tab)

  3. At the bottom of the page, under ‘Security defaults’, jump to the step below that matches the status of this setting and continue through all of the remaining steps of the list:

    Your organization is not protected by security defaults

    Click on ‘Managed security defaults’ and enable it; before doing this you should review the impact of forcing all your users to register for multifactor authentication

    Your organization is protected by security defaults

    To enabled Conditional Access click on ‘Managed security defaults’ and disable it but you must supply the reason of that ‘My organization is planning to use Conditional Access’ and then check the box to convert the default security policy into a set of Conditional Access policies.

    Your organization is currently using Conditional Access policies which prevents you from enabling security defaults

    This is state in which you want to get your Entra ID security state to be.

  4. From the left sidebar, navigate through Entra ID  Conditional Access  Policies (inner left bar).

  5. If you do not already have a bespoke policy (ie. without the ‘MICROSOFT-MANAGED’ labeling) you will need to duplicate (three dots to the right of it) at least the ‘Multifactor authentication for all users’ policy and depending if administrator accounts will be authenticated by the service then also ‘Require multifactor authentication for admins’ too.

  6. Edit the policy and amend the ‘Target resources’ by going to ‘Exclude’, pick ‘Select resources’ and then click on ‘Select’ and add ‘RADNAC’ to the exclusion list.

  7. Enable the policy (at the bottom of the page) by selecting ‘On’, apply it to also your account and select ‘Create’.

  8. If you duplicated any ‘MICROSOFT-MANAGED’ policies, you will need to disable them by clicking on the three dots to the right, then ‘Edit’ and marking it as ‘Off’.

Trusted IP

Complete the following steps:

  1. Go to the Microsoft Entra admin center.

  2. From the left sidebar, navigate through Entra ID  Users  All Users  Per-user MFA (tab).

  3. Click on the ‘Service settings’ tab

  4. Under ‘Trusted IPs’, into the multiline text box labeled ‘Skip multifactor authentication for requests from following range of IP address subnets’ copy into it the contents of the ‘Service CIDRs’ textbox in the RADNAC UI

  5. Click on the Save button at the bottom of the page

Application

You may now click the Next button at the bottom of this page to continue from the ‘Setup’ to the ‘Application’ step.

From here you are provided with a drop down box to select the application created by running the command line tooling above.

Find the application called ‘radnac’ (subtitle of ‘RADNAC’ all in capitals) and select in from the drop down.

Click the Next button at the bottom of this page to continue.

Policy

Here you configure the policy of which Microsoft Entra ID user accounts are able to authentication for:

Network Access

Used to provide networking and Internet access to workstations and phones connecting using for example a wireless network.

Device Access

May be used if you want to use the service to secure access to your networking equipment such as switches and other management interfaces.

This is not the same as workstations and phones connecting to a wireless network, if in doubt, leave this ‘Not used’ and enable ‘Network Access’ instead.

There are three settings for each:

Not used

Microsoft Entra ID will not be used to authenticate users.

Only (opens a dropdown to select a Microsoft Entra ID group)

Only users that are members of the selected group will be authenticated using Microsoft Entra ID.

You may use a dynamic group.
Except (opens a dropdown to select a Microsoft Entra ID group)

Members of the selected group will be excluded from authenticating with Microsoft Entra ID.

Use an empty group to set all accounts to be in scope for authentication with Microsoft Entra ID.

Initially it is recommended you start off by setting:

  • Network Access: ‘Except’ pointing to a group with no members

    • Alternatively use ‘Only’, starting with a group with no members and onboard each user into the group during your testing or migration process

  • Device Access: ‘Not used’

Click the Next button at the bottom of this page to continue.

Parameters

Skip this step and click on the Next button, it only exists to workaround limitations of the Azure UI.

Review + Create

Click the Submit button at the bottom of this page to complete the process.

After a short while you should see the ‘Configuration’ line item change to ‘OK’, if not consult the message on what action to take.

Realms

When you navigate to the Resources (preview)  Realms section of the managed application, you should see your Microsoft Entra ID domains listed.

You need to configure the relevant realms for EAP-TTLS/PAP authentication before users will be able to authentication.

Once configured, users will then log in using the username of ‘<username>@<domain>’, usually this matches their email address.

As an example, ‘bob’ in a domain ‘example.com’ would log in with the username bob@example.com.

bob’ (‘NULL’ realm) and ‘bob@example.com’ (‘example.com’ realm) are treated as different accounts.