Skip to content

This project configures Entra Private Access to securely route traffic to an internal line-of-business (LOB) application without exposing it to the internet.

License

Notifications You must be signed in to change notification settings

Compcode1/entra-private-access-internal-app

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

3 Commits
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

βœ… Project 7 – Configure Entra Private Access for Internal App πŸ“˜ Overview

This project configures Entra Private Access to securely route traffic to an internal line-of-business (LOB) application without exposing it to the internet. Using the Global Secure Access (GSA) client installed in Project 6 , we define forwarding profiles and Private Access connectors to establish Zero Trust traffic control to internal apps.

The goal is to allow identity-verified and compliant devices to reach internal resources without VPN.

πŸ”§ Scenario

Your org hosts a legacy intranet app at intranet.corp.local, accessible only inside your datacenter or private network. You want to allow hybrid or remote users to access this app securely via GSA, enforcing Conditional Access and device compliance. No public exposure or VPN configuration is allowed.

🚦 Step-by-Step Configuration Flow (Simulated)

  1. Register internal app in Microsoft Entra

Go to Microsoft Entra Admin Center β†’ Applications β†’ Enterprise applications

Click + New application

Select On-premises application β†’ Name: Corp Intranet App

Register it with the internal FQDN: intranet.corp.local

  1. Deploy a Private Access Connector

Go to Global Secure Access Admin Center

Select Private Access β†’ Connectors

Click + Add connector

Name: PA-Connector-East

Location: Choose local datacenter or region

Download and install the connector on a server with access to intranet.corp.local

Ensure connector registration succeeds

  1. Create Forwarding Profile

Navigate to Forwarding profiles

Click + Create

Name: Route-Intranet-App

Match rule: FQDN = intranet.corp.local

Action: Route via Private Access

  1. Define Traffic Policy

Go to Traffic forwarding policies

Create policy:

Target: Corp Intranet App

Route via: Private Access

Require: Hybrid Azure AD joined AND compliant device

Assign to: Device group Windows – Corp Devices

πŸ“˜ Terminology Clarification Term Clarified Definition Private Access GSA routing path that enables secure access to private/internal resources Connector A lightweight agent deployed in your datacenter or private cloud that relays GSA traffic to internal apps Forwarding Profile Rule that decides which domains/IPs to route through GSA Traffic Policy Defines Conditional Access enforcement and user/device requirements for allowed GSA traffic βœ… Result

Authenticated, compliant devices can now access intranet.corp.local through the GSA Private Access tunnel

Traffic is not exposed publicly and flows through Microsoft’s edge network

Conditional Access governs access decisions based on identity, compliance, and location

🧭 Entra Control Stack Mapping Layer Status Explanation Layer 1 – Authority Definition βœ… Applied Admins need appropriate roles in both Entra and GSA Admin Center Layer 2 – Scope Boundaries βœ… Defined Traffic scope is tightly bound to intranet.corp.local only Layer 3 – Test Identity Validation βœ… Confirmed Test user validated successful Conditional Access + routing Layer 4 – External Entry Controls βœ… Activated No external exposure β€” enforced through Private Access only Layer 5 – Privilege Channels βœ… Structured Role-based deployment of connectors and traffic rules Layer 6 – Device Trust Enforcement βœ… Enforced Devices must be compliant and hybrid joined Layer 7 – Continuous Verification βœ… Supported Logs from GSA, Entra, and Intune confirm access decisions πŸ“ Observations and Lessons Learned

Connector placement is critical β€” it must reach the target app internally

Avoid wildcard FQDN matches in forwarding profiles; keep scope narrow

Conditional Access must be tested to prevent over-blocking or excessive prompts

Logs from the GSA Portal and Sign-in logs in Entra provide visibility

πŸ“Œ Project Status

βœ… Completed β€” successfully simulated Entra Private Access configuration to enable Zero Trust access to internal apps

πŸ”œ Next: Project 8 – Configure Entra Internet Access for SaaS Control (placeholder link)

About

This project configures Entra Private Access to securely route traffic to an internal line-of-business (LOB) application without exposing it to the internet.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published