Skip to content

Conversation

@kafeelhasan
Copy link
Contributor

Proposed Changes

This PR adds documentation for configuring OIDC authentication with Microsoft Entra ID in private subnet NGINXaaS deployments, addressing networking challenges for external authentication endpoints.

Changes Made

  • Azure NAT Gateway solution with NSG rules and Microsoft IP ranges
  • Azure Firewall solution with DNS proxy and FQDN filtering
  • Complete Azure CLI commands for NAT Gateway, Firewall, NSG, and route tables
  • OIDC configuration for Microsoft Entra ID JWT keyfile endpoint
  • DNS resolver setup for private subnet environments
  • Network rules for TCP 443 access to login.microsoftonline.com

Benefits

  • Enables OIDC authentication in private subnet deployments
  • Provides two networking solutions with cost/security trade-offs
  • Reduces implementation errors with production-ready CLI commands
  • Meets enterprise security requirements for network isolation

Checklist

Before sharing this pull request, I completed the following checklist:

Footnotes

  1. Potentially sensitive information includes personally identify information (PII), authentication credentials, and live URLs. Refer to the style guide for guidance about placeholder content.

@kafeelhasan kafeelhasan requested a review from a team as a code owner November 4, 2025 09:27
@kafeelhasan kafeelhasan self-assigned this Nov 4, 2025
@github-actions github-actions bot added documentation Improvements or additions to documentation product/nginxaas-azure Issues related to NGINX as a Service for Azure labels Nov 4, 2025
@kafeelhasan kafeelhasan requested a review from russokj November 4, 2025 09:31
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

documentation Improvements or additions to documentation product/nginxaas-azure Issues related to NGINX as a Service for Azure

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants