-
Notifications
You must be signed in to change notification settings - Fork 121
NGINXaaS: Add private subnet OIDC with Microsoft Entra ID guide #1395
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
NGINXaaS: Add private subnet OIDC with Microsoft Entra ID guide #1395
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I've done a "light" writer edit
|
|
||
| Learn how to configure F5 NGINXaaS for Azure with OpenID Connect (OIDC) authentication using Microsoft Entra ID when your NGINXaaS deployment is in a private subnet. This guide addresses the networking requirements to enable authentication traffic to reach Microsoft Entra ID endpoints while maintaining security controls. | ||
|
|
||
| When NGINXaaS is deployed in a private subnet, authentication traffic must reach external Microsoft Entra ID endpoints at `login.microsoftonline.com`. This guide provides two solutions to enable this connectivity while controlling outbound traffic: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
So when we have three solutions....
| When NGINXaaS is deployed in a private subnet, authentication traffic must reach external Microsoft Entra ID endpoints at `login.microsoftonline.com`. This guide provides two solutions to enable this connectivity while controlling outbound traffic: | |
| When NGINXaaS is deployed in a private subnet, authentication traffic must reach external Microsoft Entra ID endpoints at `login.microsoftonline.com`. This guide provides the following solutions to enable this connectivity while controlling outbound traffic: |
| 1. **Azure Firewall** - Higher security, more granular control | ||
|
|
||
| ## Before you begin | ||
|
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Need some sort of intro, such as:
| To complete this guide, you need to set up the following: | |
| {{< table >}} | ||
| | Feature | Azure NAT Gateway | Azure Firewall | | ||
| |---------|-------------------|----------------| | ||
| | **Hourly Cost** | Lower ($0.045+ per hour) | Higher ($1.25+ per hour) | |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
It might be better to link to the Azure source for these costs.
Otherwise, if Azure raises their prices, a customer could say: "But NGINX told us that the price would be..."
| {{< call-out "note" >}}The `oidc_jwt_keyfile` endpoint is not listed in the Microsoft App Registration's endpoints pane but is required for proper OIDC configuration.{{< /call-out >}} | ||
|
|
||
| 1. Configure DNS resolution appropriately: | ||
| - For IPv4-only deployments, set `ipv6=off` in your resolver directive in the `openid_connect.server_conf` file |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Since this is a duplicate of current line 75
| - For IPv4-only deployments, set `ipv6=off` in your resolver directive in the `openid_connect.server_conf` file |
| 1. **Route Configuration**: Confirm the route table is properly associated with the NGINXaaS subnet. | ||
|
|
||
| ## Security considerations | ||
|
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Need some sort of intro, such as:
| To secure your systems, address the following: | |
| - **Network Segmentation**: Consider additional network segmentation for enhanced security. | ||
|
|
||
| ## Cost optimization | ||
|
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| To optimize your systems, we recommend: | |
Proposed Changes
This PR adds documentation for configuring OIDC authentication with Microsoft Entra ID in private subnet NGINXaaS deployments, addressing networking challenges for external authentication endpoints.
Changes Made
Benefits
Checklist
Before sharing this pull request, I completed the following checklist:
Footnotes
Potentially sensitive information includes personally identify information (PII), authentication credentials, and live URLs. Refer to the style guide for guidance about placeholder content. ↩