TL;DR: Jump Hosts – We login to Jump Hosts to then login to the servers and other apps we need to access mainly to perform admin tasks. Jump Hosts are often secured on the Network Layer and other Windows Permissions which will come into play when the admin logs in.
But what can be done before the admin logs in to the Server? This is where the Identity Layer comes into play. What if there is a Pre-login layer that can be compliant with Zero Trust? Yes, I’m talking about ZTNA—Zero-Trust Network Access.
This article will go through the steps in-order to achieve that via Entra Global Secure Access feature, Entra Private Access.
- Goal of the Blog Post
- Gone of the Traditional VPN days
- Other Alternatives + Risks + Failure Points
- Licenses
- Creating Entra Group for PIM
- Create the MFA with a Different Authentication Method in the Conditional Access Policy for PIM Elevation
- Create the Authentication Context
- Now let’s configure the CA Policy
- Enable Entra Private Access Traffic Forwarding Profile
- Configure the Private Network Connector
- Create the RDP Private App
- Create the MFA with Strong Auth for Private App Access
- Download and Install the GSA Client
- End User Experience
- MFA Features that can be configured
- Monitoring
- Some Tips
- Wrapping Up
Goal of the Blog Post
The main goal of this post is to showcase that Entra Identity Governance features such as PIM, Just In Time access, Conditional Access Policies with different Auth methods can be setup, an approver can be setup if needed and a reason for the Jump Host access needs to be added when elevating.
Gone of the Traditional VPN days
This is a problem when you need to provide someone who is working remotely. With traditional VPNs, it allows access to the designated network segment, but not to the resource. Lack of adaptive access can be tempting to a bad actor.
With Entra Private Access, If you are using the per-app-based feature, you will be able to segment the app based on IP address or FQDN. The good thing is that single-named network addresses are coming as well so basically, it doesn’t have to be FQDN all the time.
Other Alternatives + Risks + Failure Points
In today’s market there are a lot of other products that do the same, often come with a hefty price tag for licensing and heaps of configuration. because the Identity provider will be Entra ID, or Local AD the proper connections need to be made and this is another failure point, and that risk needs to be evaluated. It is ideal to explore what you have already, what the existing M365 investment provides you with etc.
Returning to the question, let’s see how to configure this.
Licenses
How good when you can work on these configurations with the existing licenses. Rather than planning to implement a different solution altogether, it would be ideal to capture them in the same ecosystem.
- Entra ID Premium P1 or P2 for Entra Private Access, P2 for Identity Governance
- Entra Suite
Creating Entra Group for PIM
Create the Entra Group for PIM > Go to Privileged Identity Management

Onboard the group to PIM > Enable PIM for this group

Add assignments to the users who require access to the Jump Host with the role as MemberEligible Assignments > Add assignments

And set the eligibility duration

Create the MFA with a Different Authentication Method in the Conditional Access Policy for PIM Elevation
This conditional Access policy ensures the above-created PIM elevation is guarded by MFA. Not just a normal number matching, but with a different method that can be used as an Authentication Strength so that will act as an additional layer.
For this, I’m using the FIDO2 Passkey option.
Go to Protetction > Authentication methods > Policies > Passkey (FIDO2) > Add the previously created group

Configure the FIDO2 Key

now you have the option of using the Passkey or a new Authentication Strength in the CA Policy if needed.
Create the Authentication Context
To connect the PIM elevation with the desired Conditional Access policy but not just the standard Azure MFA, you can create an Authentication Context.
Go to Protection > Conditional Access > Authentication Contexts > New Authentication Context

Configure the Conditional Access Policy
Now let’s configure the CA Policy
We are using the same PIM-enabled group created earlier.

You can add more conditions if needed. I will discuss them in general before I close off the post.
Select Authentication Context from the Target Resources and select the Context we created in the previous step.

Now in the Grant Section, select Require authentication strength and select Passkeys FIDO2

Set the policy mode to ON and Create the policy and this be activated.
Enable Entra Private Access Traffic Forwarding Profile
This is the 1st step towards enabling Entra Private Access. The eligible users/ user groups should be in the profile to get the traffic profiles enabled and the Global Secure Access client activated.
Global Secure Access > Traffic Forwarding > Private access profile

Tip: It is ideal to assign the profile to All Users to remove the confusion and save troubleshooting time.

Configure the Private Network Connector
These lightweight connectors establish a secure communication channel between your on-premises network and Azure. It is recommended to create at least 2 connectors for high availability. Further, Microsoft Entra Private Network provides single sign-on (SSO) and secure remote access for web applications hosted on-premises.
Important notes on Private Network Connectors – https://learn.microsoft.com/en-us/entra/global-secure-access/concept-connectors and working with Proxy servers https://learn.microsoft.com/en-us/entra/identity/app-proxy/application-proxy-configure-connectors-with-proxy-servers
Global Secure Access > Connect > Connectors > Download connector service


Once installed, it will be visible under Private Network connectors.
If you have more than one connector, create a connector group for high availability as they will be in the same region.


Create the RDP Private App
You can always add network segments in Quick Access, but for more granular access, we need to create a Private App.
Global Secure Access > Applications >Enteprise applications > New application
Select the Connector Group we created earlier and select the option Enable access with Global Secure Access client

Now in the Application segment, add the sections. I will be adding IP address, single label and FQDN. All for the same Jump Host server.

Further, you can add more protocols if needed.

Once added, press Save and the Private App will be created.
If you now go to the Enterprise applications section, the app will be visible. Note the Application type as Global Secure Access applications.

If you need to add more segments later, go to the app and go to Network access properties
Important: Make sure you add the same group you created before in the Users and Groups section of the app.

Create the MFA with Strong Auth for Private App Access
It is essential to configure the Conditional Access Policy when accessing the Private App as that will provide the true ZTNA layer.
As we did the previous Conditional Access policy, this will be assigned to the same user group we created for PIM.

Select the App we created under Target resources

Under Grant select the MFA or Authentication Strength or other restrictions as needed.
Under Session, I’m selecting every time under Sign-in frequency to make sure it needs to comply with MFA.

And that’s. it. Set the policy to ON and Create.
Download and Install the GSA Client
GSA client needs to be installed on the user’s device in order to access the tunneled Private Apps. this will be a part of the latest Windows 11 builds so not required to install in the future. Basically, this client will reflect the Traffic Forwarding profile and application segments on the user endpoint.
Global Secure Access > Connect > Client download
Download the appropriate client. You can use Microsoft Intune to install the app on the endpoints.

If you head to the client device > Go to Advanced Diagnostics > Forwarding profile > Private access rules, you will see the received network rules as below.
This will be updated frequently so the latest config will be received by the client device always.
Note the destinations with the action Bypass. They will be required to access the GSA endpoints to make sure the tunneling is configured to the given Private Apps.

End User Experience
In a nutshell, the below diagram will be applied when the user needs to login to the Private App.

Adding the user to PIM enabled group.
Without PIM Elevation users will not be added to the required group and they will get the below screen.

Once they submit the reason and go through the elevation process, the user will be added to the group.

Group membership as below.

Now when the user tries to login to the Jump host, they will receive the below popup

User will have to sign in and the 2nd Conditional Access Policy will come into play. As we configured FIDO2 Passkey for this too, it will go through the below process before allowing access.

And when the user tries to login, they will be presented with the standard RDP login prompt.

Users will be able to access the Jump Host during the time window configured in the PIM group and need to re-elevate access when initial access expires.
MFA Features that can be configured
Device filters such as only granting access for the devices that are Entra Joined or Entra Hybrid joined can further narrow down access, and also bringing in the Compliance policies into the Conditional Access Policy will make sure the connecting endpoint is fully trusted.
Monitoring
If you head to the Monitoring tab in GSA, you will see the rich list of logs and workbooks that can be helpful when it comes to Private Access monitoring and troubleshooting.


Some Tips
- If the users or the groups are not assigned to the Traffic Forwarding profile, the GSA client will not connect and will show the below error.

- Its wise to setup a different authentication method such as a phishing-resistant method when authentication for the app as jump hosts can be critical depending on the services it has access to.
Wrapping Up
As I mentioned at the start, it is always wise to find out what your existing investment (M365 license in this case) can do for you before exploring the market for 3rd party products which at the end of the day does the same thing with an extra licensing cost, admin overhead and configuration requirements.
Discover more from EMS Route
Subscribe to get the latest posts sent to your email.