Information
Enable only 'Azure Active Directory' (Microsoft Entra ID) authentication for Azure VPN Gateway point-to-site connections.
Microsoft Entra ID authentication provides strong security and centralized identity management, and reduces risks associated with static credentials and certificate management.
NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.
Solution
Remediate from Azure Portal
- Go to Virtual network gateways.
- Under VPN gateway, click VPN gateways.
- Click the name of a VPN gateway.
- Under Settings, click Point-to-site configuration.
- Ensure Authentication type click to expand the drop-down menu.
- Check the box next to Azure Active Directory, and uncheck the boxes next to Azure certificate and RADIUS authentication.
- Provide a Tenant, Audience, and Issuer for the Azure Active Directory configuration.
- Click Save.
- Repeat steps 1-8 for each VPN gateway requiring remediation.
Impact:
Azure VPN Gateways incur hourly charges, with additional costs for point-to-site connections and data transfer. Pricing varies by SKU and usage. Refer to https://azure.microsoft.com/en-us/pricing/details/vpn-gateway/ for details.