Skip to content

Latest commit

 

History

History
39 lines (25 loc) · 2.64 KB

File metadata and controls

39 lines (25 loc) · 2.64 KB
title Configure Azure VPN Client - P2S Microsoft Entra ID authentication - macOS
titleSuffix Azure Virtual WAN
description Learn how to configure the Azure VPN Client on macOS for Virtual WAN P2S configurations that use Microsoft Entra ID authentication.
ms.service azure-virtual-wan
ms.topic how-to
ms.date 03/07/2025
ms.author cherylmc
author cherylmc

Configure Azure VPN Client - Microsoft Entra ID authentication - macOS

This article helps you configure your macOS client computer to connect to an Azure virtual network using a Virtual WAN User VPN point-to-site (P2S) connection. These steps apply to Azure VPN gateways configured for Microsoft Entra ID authentication. Microsoft Entra ID authentication only supports OpenVPN® protocol connections and requires the Azure VPN Client. The Azure VPN client for macOS is currently not available in France and China due to local regulations and requirements.

Before you begin

Verify that you are on the correct article. The following table shows the configuration articles available for Azure Virtual WAN point-to-site (P2S) VPN clients. Steps differ, depending on the authentication type, tunnel type, and the client OS.

[!INCLUDE P2S client configuration articles]

Prerequisites

This article assumes that you've already performed the following prerequisites:

[!INCLUDE Supported OS, processors, Rosetta software]

[!INCLUDE Configuration steps]

Optional client configuration settings

You can configure the Azure VPN Client with optional configuration settings such as additional DNS servers, custom DNS, forced tunneling, custom routes, and other additional settings. For a description of the available optional settings and configuration steps, see Azure VPN Client optional settings.

Next steps

For more information about Microsoft-registered Azure VPN Client, see Configure P2S User VPN for Microsoft Entra ID authentication.