• Making IT Work
  • 0800 8047 256
  • information@eacs.com
Publishing Internal Services Using Azure AD Application Proxy 17/07/2017Publishing Internal Services Using Azure AD Application Proxy 17/07/2017Publishing Internal Services Using Azure AD Application Proxy 17/07/2017Publishing Internal Services Using Azure AD Application Proxy 17/07/2017
  • About Us
    • Our Story
    • Customer Charter
    • Customers
      • Case Studies
    • ISO Certifications
    • CSR Statement
    • Awards & Recognition
    • Policy Statements
  • Services
    • Services News
    • Managed Services
      • 24/7 Services
      • Device Services
      • Device as a Service
      • Infrastructure Services
      • Security Service
      • Print Service
      • Managed Support Services
      • Managed WAN
      • Case Studies
      • Datasheets
    • Modern Workplace
      • Digital Transformation
      • Strategy Consulting
      • Current State Assessment
      • Desktop Deployment
      • Hardware Products
      • Data Management Solutions
      • Software & Renewal
      • Procurement Portal
        • eacs Selector
      • Lifecycle Management
      • Benefits of Hardware & Software Services
      • Case Studies
      • Datasheets
    • Hybrid Cloud
      • Journey to the Cloud
      • Optimise Virtual Workspace
      • Cloud Migration
      • Cloud Solutions
      • Architecture & Planning
      • Project Management
      • Cloud Availability Suite
      • Case Studies
      • Datasheets
    • Cyber Security
      • Predict
      • Prevent
      • Detect
      • Respond
      • Cybersecurity Made Simple
      • Cyber Essentials
      • Datasheets
    • Apple Services
      • Case Studies
      • Datasheets
    • Apps & Data
      • The Power Platform
      • Data Intelligence
      • Case Studies
      • Datasheets
  • Partners
    • Hybrid Cloud
    • Modern Workplace
    • Security
    • Frameworks
      • Shared Business Services
  • Optimise IT
    • Agenda
    • Exhibitors
  • News & Resources
    • News
      • Featured News
      • eacs in the news
      • eacs Blogs
      • eacs Newsletters
    • Resources
    • Case Studies
    • Datasheets
  • Community
    • Charitable Activities
    • Environment
    • CSR Statement
  • Careers
    • Careers
      • Recruitment Process
    • People Stories
    • Policies
  • Contact
    • Marketing
✕
Image for Data Protection Blog. Image of someone pressing interactive security padlock
UK Proposed Data Protection Bill Looks To Go Further Than GDPR 08/08/2017
January 12, 2018
Published by Marketing on January 8, 2018
Categories
  • Resources
  • WhitePaper
Tags
Image for Azure AD Application Proxy Blog.

Publishing Internal Services Using Azure AD Application Proxy

Publishing internal services to external users has been something of a security nightmare for many IT departments; Microsoft now offers a solution with Azure AD App Proxy.

Gone are the days when directly publishing internal services through the firewall using a NAT rule was acceptable. Even with the advancements of integrated firewall intrusion detection and prevention, it was always best practice to use a reverse proxy as a middleman between the external user and the internal web server. Using reverse proxy technology moved the security layer from the internal server to the perimeter device/server; this meant that attacks and malicious attempts to connect were never able to reach the internal web server reducing unnecessary load and security implications. This led to improved performance of the internal resource and provided reassurance that things would remain secure.

However, Reverse Proxy services still needed firewall configuration to pass traffic from external users to the device or server, this meant careful configuration was required to guarantee traffic that should not be passed was blocked.

Microsoft now provides a new more secure way to publish services without the need for inbound firewall configuration; the Azure AD App Proxy. Released in 2016 as part of the Azure AD subscription, and continually updated, it enables secure connectivity to internal web services from external networks without the need for any reverse proxy infrastructure. Simplified implementation using an on-premises connector installed on the internal network (or DMZ) allows a broker-based connection through the Azure tenant portal. Using either Microsoft DNS and SSL certificates, or your own company DNS and SSL certificates, a connection to your internal web services can be published to your users allowing Single Sign-On to the internal application with the confidence that the security features of Azure will protect your services.

Further configuration of Conditional Access policies in Azure AD allows increased security to control access from location, device operating system, validating domain membership, Intune management compliance and enforcing Azure MFA. 

To discuss Azure AD App Proxy further, or request a demonstration, please contact EACS.

Share
1
Marketing
Marketing

Related posts

Hindsight Cybersecurity
February 2, 2022

Hindsight Cybersecurity


Read more
cyber insurance
January 27, 2022

What’s Next for Cyber Insurance


Read more
October 6, 2021

Incident Response Guide


Read more

3 Comments

  1. Thelma says:
    September 8, 2018 at 10:11 am

    Thanks, it is quite informative

    Reply
  2. JAmass says:
    October 12, 2018 at 12:56 pm

    some truly interesting info , well written and generally user genial.

    Reply
  3. mama bear shirt says:
    November 27, 2019 at 7:22 pm

    Greetings! I’ve been reading your site for a long time now and
    finally got the bravery to go ahead and give you a shout out from Atascocita
    Texas! Just wanted to say keep up the fantastic work!

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

eacs Blogs

  • Remanufactured Laptops
    Dispelling Myths About Remanufactured Laptops
    April 5, 2022 , Modern Workplace
  • Selector home
    Modernising your IT Procurement Process with eacs Selector
    March 24, 2022 , Modern Workplace
  • remote working
    Supporting a Remote Workforce with the Hybrid Cloud
    February 21, 2022 , Business Continuity
  • How can Schools Combat Ransomware Attacks?
    February 2, 2022 , Cyber Security
  • cybersecurity
    What’s Next for the IT Security Team?
    December 9, 2021 , Cyber Security
  • Zero Trust
    What is Zero Trust and Why is it Important?
    November 24, 2021 , Cyber Security
  • Outsourcing IT
    2021: The Year of Outsourcing
    November 8, 2021 , Managed Services
  • Beating the Productivity Challenge with Innovation
    October 26, 2021 , Managed Services
  • Image of time to rethink the password blog. Image is of someone typing typing password into laptop
    The easiest way to help prevent 80% of Data Breaches
    June 10, 2021 , Cyber Security
  • How can Phishing Attacks be Prevented?
    May 14, 2021 , Cyber Security
  • Supporting Productive Digital Workspaces
    April 23, 2021 , Business Continuity
  • Delivering Excellence Consistently – ISO20000-1 Certification
    March 22, 2021 , Compliance
  • How do you know that you’re secure?
    March 3, 2021 , Cyber Security
  • Digital Workplace Solutions Framework – Simple, Trusted with the Potential for Huge Cost Savings
    February 16, 2021 , Shared Business Services
  • eacsRevo – ‘Furlough’ your Assets
    January 18, 2021 , Business Continuity
  • 24/7 Support – A Necessity for the New Way of Working
    January 8, 2021 , Modern Workplace
  • Why do customers trust eacs?
    December 15, 2020 , Business Continuity
  • #Optimise2020 – The Biggest Show of the Year!
    November 20, 2020 , OptimiseIT
  • A taste of what you have to look forward to at #Optimise2020…
    November 3, 2020 , OptimiseIT
  • Taking Optimise Virtual – The Story so Far!
    October 8, 2020 , OptimiseIT
  • Supporting your Home Workers with the Power Platform
    October 1, 2020 , Modern Workplace
  • The clock is ticking, are you prepared…
    September 30, 2020 , Cyber Security
  • Why you NEED to attend Optimise 2020
    September 15, 2020 , OptimiseIT
  • Decision time for N365 is ‘nigh’?
    September 3, 2020 , Shared Business Services
  • Image for Data Protection Blog. Image of someone pressing interactive security padlock
    Cloud Security
    August 18, 2020 , Cyber Security

About

About Us

Corporate Social Responsibility

Customer Satisfaction

Services

Managed Services

Professional Services

Cloud Services

Apple Services

Cyber Security

Hardware and Software

Procurement Portal – eacs Selector

Get in Touch

Head Office:
7 Ramsay Court,
Hinchingbrooke Business Park,
Huntingdon, Cambridgeshire.
PE29 6FY

Tel: 0800 8047 256
Fax: 0845 – 3379 147
Email: Click Here

Policies

Cookies

Disclaimer

Policy Statements

Privacy

Supplier Code of Conduct

© 2020 EACS. All Rights Reserved