- Yes, registering your internal application as an Enterprise Application in Microsoft Entra is required to use Private Access. Once registered, you must:
- Create an application segment that defines the internal resource (IP, FQDN, ports, protocols).
- This segment is used by the Global Secure Access (GSA) client to route traffic securely to your internal app.
- No metadata changes are needed within the internal app itself, but the app must be reachable via the connector and support authentication protocols like Kerberos or SAML. [Microsoft...rosoft Q&A]
This setup enables per-app access, allowing granular Conditional Access enforcement.
- How does the internal application become aware of access via connector and Entra ID authentication?
Your internal application doesn’t need to be explicitly aware of the connector. Instead:
- The Microsoft Entra Private Network Connector acts as a bridge between the cloud and your internal network.
- The connector is installed on a Windows Server inside your network and handles outbound communication only—no inbound ports need to be opened.
- The GSA client on the user’s device routes traffic to the connector, which then forwards it to the internal app.
- Authentication is handled by Microsoft Entra ID, using Conditional Access policies and optionally MFA.
- To enforce access only via GSA:
- Configure Conditional Access policies that include Compliant Network checks and source IP validation.
- Use Quick Access for broad network access or App Segments for per-app access. https://learn.microsoft.com/en-us/entra/architecture/gsa-poc-private-access
- Block direct access via browser by ensuring the app is only reachable through the connector and GSA client.
This setup ensures:
- External users must use GSA client and meet Conditional Access requirements.
- Internal users can access automatically if within the corporate network.
- Enforcing MFA for TeamViewer via Entra Enterprise Application
Since TeamViewer is already registered as an Enterprise Application, you can enforce MFA by:
- Assigning users or groups to the TeamViewer app.
- Applying a Conditional Access policy that requires MFA for access to TeamViewer.
- No additional configuration is needed within TeamViewer itself unless it has its own MFA settings. However, ensure:
- The app supports SAML or OAuth for integration.
- You test the policy using the Conditional Access What If API to avoid lockouts.