Skip to content

Commit 1fe2d18

Browse files
authored
Merge pull request #310476 from AbdullahBell/bastion-overview-overhaul
Azure Bastion: What is Azure Bastion? | Overhaul | Continued
2 parents 0b9a91f + 12a13d6 commit 1fe2d18

2 files changed

Lines changed: 56 additions & 50 deletions

File tree

articles/bastion/bastion-overview.md

Lines changed: 53 additions & 47 deletions
Original file line numberDiff line numberDiff line change
@@ -1,89 +1,95 @@
11
---
2-
title: 'About Azure Bastion'
3-
description: Learn about Azure Bastion, which provides secure and seamless RDP/SSH connectivity to your virtual machines without exposing RDP/SSH ports externally.
2+
title: What is Azure Bastion?
3+
description: Azure Bastion is a fully managed service that provides secure and seamless RDP/SSH connectivity to virtual machines without exposing RDP/SSH ports externally.
44
author: abell
5+
ms.author: abell
56
ms.service: azure-bastion
6-
ms.custom:
7-
- ignite-2024
7+
services: bastion
88
ms.topic: overview
9-
ms.date: 03/14/2025
10-
ms.author: abell
11-
# Customer intent: As someone with a basic network background, but is new to Azure, I want to understand the capabilities of Azure Bastion so that I can securely connect to my Azure virtual machines.
9+
ms.custom: mvc, references_regions, ignite-2024
10+
ms.date: 01/14/2026
11+
# Customer intent: As an administrator, I want to evaluate Azure Bastion so I can determine if I want to use it.
1212
---
13+
1314
# What is Azure Bastion?
1415

15-
Azure Bastion is a fully managed PaaS service that you provision to securely connect to virtual machines via private IP address. It provides secure and seamless RDP/SSH connectivity to your virtual machines directly over TLS from the Azure portal, or via the native SSH or RDP client already installed on your local computer. When you connect via Azure Bastion, your virtual machines don't need a public IP address, agent, or special client software.
16+
Azure Bastion is a fully managed PaaS service that provides secure and seamless RDP/SSH connectivity to your virtual machines directly over TLS from the Azure portal, or via the native SSH or RDP client already installed on your local computer. Azure Bastion is deployed directly in your virtual network and supports all VMs in the virtual network using private IP addresses. When you connect via Azure Bastion, your virtual machines don't need a public IP address, agent, or special client software.
1617

17-
Bastion provides secure RDP and SSH connectivity to all of the VMs in the virtual network for which it's provisioned. Using Azure Bastion protects your virtual machines from exposing RDP/SSH ports to the outside world, while still providing secure access using RDP/SSH.
18+
Azure Bastion is available in four SKUs: Developer, Basic, Standard, and Premium.
19+
20+
> [!NOTE]
21+
> Azure Bastion is one of the services that make up the Network Security category in Azure. Other services in this category include [Azure DDoS Protection](../ddos-protection/ddos-protection-overview.md), [Azure Firewall](../firewall/overview.md), and [Azure Web Application Firewall](../web-application-firewall/overview.md). Each service has its own unique features and use cases. For more information on this service category, see [Network Security](../networking/security/network-security.md).
1822
19-
## <a name="key"></a>Key benefits
23+
## Key benefits
2024

21-
|Benefit |Description|
22-
|-----------|-----------|
23-
|Session recording on VM sessions| Azure Bastion Premium allows for [graphical session recording](session-recording.md) of all sessions connected through the Bastion, stored in a customer-designated storage container, and viewed within the Bastion resource|
24-
|RDP and SSH through the Azure portal|You can get to the RDP and SSH session directly in the Azure portal using a single-click seamless experience.|
25-
|Entra ID authentication support| Azure Bastion supports Entra ID authentication for the portal and through native client. This allows for identity-based authentication to the VM, eliminating the need for local authentication methods.
26-
|Remote Session over TLS and firewall traversal for RDP/SSH|Azure Bastion uses an HTML5 based web client that is automatically streamed to your local device. Your RDP/SSH session is over TLS on port 443. This enables the traffic to traverse firewalls more securely. Bastion supports TLS 1.2. Older TLS versions aren't supported.|
27-
|No Public IP address required on the Azure VM| Azure Bastion opens the RDP/SSH connection to your Azure VM by using the private IP address on your VM. You don't need a public IP address on your virtual machine.|
28-
|No hassle of managing Network Security Groups (NSGs)| You don't need to apply any NSGs to the Azure Bastion subnet. Because Azure Bastion connects to your virtual machines over private IP, you can configure your NSGs to allow RDP/SSH from Azure Bastion only. This removes the hassle of managing NSGs each time you need to securely connect to your virtual machines. For more information about NSGs, see [Network Security Groups](../virtual-network/network-security-groups-overview.md#security-rules).|
29-
|No need to manage a separate bastion host on a VM |Azure Bastion is a fully managed platform PaaS service from Azure that is hardened internally to provide you secure RDP/SSH connectivity.|
30-
|Protection against port scanning|Your VMs are protected against port scanning by rogue and malicious users because you don't need to expose the VMs to the internet.|
31-
|Hardening in one place only|Azure Bastion sits at the perimeter of your virtual network, so you don’t need to worry about hardening each of the VMs in your virtual network.|
32-
|Protection against zero-day exploits |The Azure platform protects against zero-day exploits by keeping the Azure Bastion hardened and always up to date for you.|
25+
Azure Bastion provides the following benefits:
26+
27+
* **Secure connectivity over TLS**: Connect to VMs using RDP/SSH over TLS on port 443. Learn more about [connection methods](vm-about.md) and [Kerberos authentication](kerberos-authentication-portal.md).
28+
* **Protection from external threats**: Your VMs are protected from port scanning. Deploy with [availability zones](configuration-settings.md#az) for additional resilience.
29+
* **Scalability and flexibility**: Configure [host scaling](configuration-settings.md#instance), use [shareable links](shareable-link.md), and connect via [IP address](connect-ip-address.md).
30+
* **Reduced management overhead**: Deploy once and use [virtual network peering](vnet-peering.md) to serve multiple networks.
31+
* **Compliance and audit**: Use [session recording](session-recording.md) for compliance requirements (Premium SKU).
3332

3433
## <a name="sku"></a>SKUs
35-
> [!NOTE]
36-
> Bastion Premium SKU is now generally available, providing graphical session recording and private only deployment capabilities.
3734

38-
Azure Bastion offers multiple SKU tiers. The following table shows features and corresponding SKUs. For more information about SKUs, see the [SKU Comparison](bastion-sku-comparison.md) article.
35+
Azure Bastion offers four SKU tiers:
3936

40-
[!INCLUDE [Azure Bastion SKUs](../../includes/bastion-sku.md)]
37+
* **Premium**: Includes all Standard features plus session recording for compliance and private-only deployment.
38+
* **Standard**: Includes all Basic features plus scalability and advanced features (native client, shareable links, IP-based connections, custom ports, file transfer).
39+
* **Basic**: Dedicated deployment with fixed capacity for production environments with moderate connection requirements.
40+
* **Developer**: Free tier using shared infrastructure recommended for development and testing. Supports one VM at a time. Available in select regions.
41+
42+
For a complete feature comparison and capacity details, see [Choose the right Azure Bastion SKU](bastion-sku-comparison.md).
4143

4244
## <a name="architecture"></a>Architecture
4345

44-
Azure Bastion offers multiple deployment architectures, depending on the selected SKU and option configurations. For most SKUs, Bastion is deployed to a virtual network and supports virtual network peering. Specifically, Azure Bastion manages RDP/SSH connectivity to VMs created in the local or peered virtual networks.
46+
Azure Bastion offers three deployment architectures:
47+
48+
**Private-only deployment**: Premium SKU without public IP address for enhanced security.
4549

46-
RDP and SSH are some of the fundamental means through which you can connect to your workloads running in Azure. Exposing RDP/SSH ports over the Internet isn't desired and is seen as a significant threat surface. This is often due to protocol vulnerabilities. To contain this threat surface, you can deploy bastion hosts (also known as jump-servers) at the public side of your perimeter network. Bastion host servers are designed and configured to withstand attacks. Bastion servers also provide RDP and SSH connectivity to the workloads sitting behind the bastion, as well as further inside the network.
50+
:::image type="content" source="media/private-only-deployment/private-only-architecture.png" alt-text="Diagram showing Azure Bastion private-only architecture." lightbox="media/private-only-deployment/private-only-architecture.png":::
4751

48-
The SKU you select when you deploy Bastion determines the architecture and the available features. You can upgrade to a higher SKU to support more features, but you can't downgrade a SKU after deploying. Certain architectures, such as Private-only and the Bastion Developer offering, must be configured at the time of deployment. For more information about each architecture, see [Bastion design and architecture](design-architecture.md).
52+
For detailed information about each architecture, deployment requirements, and network topology options, see [Bastion design and architecture](design-architecture.md).
4953

50-
The following diagrams show the available architectures for Azure Bastion.
54+
**Dedicated deployment**: Basic, Standard, and Premium SKUs deployed to your virtual network.
5155

52-
**Basic SKU and higher**
56+
:::image type="content" source="media/bastion-overview/architecture.png" alt-text="Diagram showing Azure Bastion architecture." lightbox="media/bastion-overview/architecture.png":::
5357

54-
:::image type="content" source="./media/bastion-overview/architecture.png" alt-text="Diagram showing Azure Bastion architecture." lightbox="./media/bastion-overview/architecture.png":::
58+
**Developer**: Shared infrastructure for development and testing environments.
5559

56-
**Bastion Developer**
60+
:::image type="content" source="media/quickstart-developer/bastion-shared-pool.png" alt-text="Architecture diagram illustrating Azure Bastion Developer deployment using shared infrastructure.":::
5761

58-
:::image type="content" source="./media/quickstart-developer/bastion-shared-pool.png" alt-text="Diagram that shows the Azure Bastion Developer architecture." lightbox="./media/quickstart-developer/bastion-shared-pool.png":::
62+
## Requirements
5963

60-
**Private-only deployment**
64+
Deployment requirements vary by SKU. Developer uses shared infrastructure with no virtual network required. Basic, Standard, and Premium require a dedicated subnet (AzureBastionSubnet) and public IP address. Premium supports private-only deployment without a public IP.
6165

62-
:::image type="content" source="./media/private-only-deployment/private-only-architecture.png" alt-text="Diagram showing Azure Bastion private-only architecture." lightbox="./media/private-only-deployment/private-only-architecture.png":::
66+
For complete requirements including subnet sizing and NSG rules, see [About Bastion configuration settings](configuration-settings.md).
6367

64-
## Availability zones
68+
## Connection methods
6569

66-
[!INCLUDE [Availability Zones description and supported regions](../../includes/bastion-availability-zones-description.md)]
70+
Azure Bastion supports multiple connection methods:
6771

68-
## <a name="host-scaling"></a>Host scaling
72+
* **Browser-based connections**: Connect through the Azure portal using an HTML5 web client. Available for all SKU tiers. No additional client software required.
73+
* **Native client connections**: Connect using the SSH or RDP client already installed on your local computer. Available for Standard and Premium SKUs. Supports Microsoft Entra ID authentication and file transfer.
74+
* **Shareable links**: Create shareable links that allow users to connect to VMs without accessing the Azure portal. Available for Standard and Premium SKUs.
6975

70-
Azure Bastion supports manual host scaling. You can configure the number of host **instances** (scale units) in order to manage the number of concurrent RDP/SSH connections that Azure Bastion can support. Increasing the number of host instances lets Azure Bastion manage more concurrent sessions. Decreasing the number of instances decreases the number of concurrent supported sessions. Azure Bastion supports up to 50 host instances. This feature is available for Standard SKU and higher.
76+
For more information about connection methods and authentication options, see [About VM connections and features](vm-about.md).
7177

72-
For more information, see the [Configuration settings](configuration-settings.md#instance) article.
7378

74-
## <a name="pricing"></a>Pricing
79+
## What's new
7580

76-
Azure Bastion pricing is a combination of hourly pricing based on SKU and instances (scale units), plus data transfer rates. Hourly pricing starts from the moment Bastion is deployed, regardless of outbound data usage. For the latest pricing information, see the [Azure Bastion pricing](https://azure.microsoft.com/pricing/details/azure-bastion) page.
81+
Azure Bastion is continuously updated with new features and improvements. To learn about the latest updates and announcements, see [What's new in Azure Bastion?](whats-new.md).
7782

78-
## Bastion FAQ
83+
## Troubleshooting and FAQ
7984

80-
For frequently asked questions, see the Bastion [FAQ](bastion-faq.md).
85+
For information about troubleshooting and frequently asked questions, see the [troubleshooting guide](troubleshoot.md) and [Azure Bastion FAQ](bastion-faq.md).
8186

8287
## Next steps
8388

8489
* [Quickstart: Deploy Bastion automatically with default settings and Standard SKU](quickstart-host-portal.md)
8590
* [Quickstart: Deploy Bastion Developer](quickstart-developer.md)
8691
* [Tutorial: Deploy Bastion using specified settings and SKUs](tutorial-create-host-portal.md)
92+
* [Choose the right Azure Bastion SKU](bastion-sku-comparison.md)
93+
* [About Bastion configuration settings](configuration-settings.md)
94+
* [Azure Bastion FAQ](bastion-faq.md)
8795
* [Learn module: Introduction to Azure Bastion](/training/modules/intro-to-azure-bastion/)
88-
* Learn about some of the other key [networking capabilities](../networking/fundamentals/networking-overview.md) of Azure
89-
* [Learn more about Azure network security](../networking/security/index.yml)

articles/bastion/secure-bastion.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ Azure Bastion is a fully managed platform-as-a-service (PaaS) that provides secu
1616

1717
This article provides guidance on how to best secure your Azure Bastion deployment.
1818
> [!NOTE]
19-
> Entra ID authentication for RDP connections is now available in public preview! See [Microsoft Entra ID](bastion-connect-vm-rdp-windows.md#microsoft-entra-id-authentication-preview) for details.
19+
> Entra ID authentication for RDP connections is now available in preview! See [Microsoft Entra ID](bastion-connect-vm-rdp-windows.md#microsoft-entra-id-authentication-preview) for details.
2020
2121
## Network security
2222

@@ -66,7 +66,7 @@ Privileged access management for Azure Bastion ensures that only authorized user
6666

6767
Data protection for Azure Bastion focuses on protecting data integrity and preventing unauthorized access to session data and configuration information.
6868

69-
* **Leverage built-in TLS encryption**: Azure Bastion automatically uses TLS to encrypt data in transit between users and virtual machines. This encryption is managed by Microsoft and doesn't require additional configuration. For more information, see [Azure Bastion key features](./bastion-overview.md#key).
69+
* **Leverage built-in TLS encryption**: Azure Bastion automatically uses TLS to encrypt data in transit between users and virtual machines. This encryption is managed by Microsoft and doesn't require additional configuration. For more information, see [Azure Bastion key benefits](./bastion-overview.md#key-benefits).
7070

7171
## Session management and monitoring
7272

@@ -121,4 +121,4 @@ Asset management for Azure Bastion involves implementing governance controls, mo
121121
## Next steps
122122

123123
- [Azure Well-Architected Framework - Security pillar](/azure/well-architected/security/)
124-
- [Microsoft Cloud Adoption Framework - Secure methodology](/azure/cloud-adoption-framework/secure/overview)
124+
- [Microsoft Cloud Adoption Framework - Secure methodology](/azure/cloud-adoption-framework/secure/overview)

0 commit comments

Comments
 (0)