You may also have to replace 'common' with your tenant ID in certain other cases as well. If you're using a global admin account that is not native to the Microsoft Entra tenant to provide consent, replace 'common' with the Microsoft Entra tenant ID in the URL. Copy and paste the URL that pertains to your deployment location in the address bar of your browser: This allows the Azure VPN application to sign in and read user profiles. Next, grant admin consent for your organization.
Sign in to the Azure portal as a user that is assigned the Global administrator role. For steps, see Assign administrator and non-administrator roles to users with Microsoft Entra ID. The user account can be used to test OpenVPN authentication.Īssign one of the accounts the Global administrator role. The global administrator account will be used to grant consent to the Azure VPN app registration. Note the following fields when creating your directory:Ĭreate two accounts in the newly created Microsoft Entra tenant. If you don't have a Microsoft Entra tenant, you can create one using the steps in the Create a new tenant article. The steps in this article require a Microsoft Entra tenant. Microsoft Entra authentication is supported only for OpenVPN® protocol connections and requires the Azure VPN Client.