Skip to main content
Welcome to this lesson on connecting devices to networks using point-to-site (P2S) VPN connections. Azure point-to-site (P2S) VPNs are the recommended approach when individual users—such as remote employees, contractors, or developers—need secure access to resources inside an Azure virtual network without configuring a full site-to-site VPN between networks. A P2S connection lets a single device establish an encrypted VPN tunnel over the internet to your Azure VNets, enforcing the same network controls and route policies you configure in Azure. In this lesson we will:
  • Understand what point-to-site connections are and when to choose them.
  • Compare the supported VPN protocols and authentication methods for P2S.
  • Walk through the high-level configuration workflow to enable P2S in Azure.
When it comes to protocols, Azure P2S supports OpenVPN, SSTP, and IKEv2. For authentication you can use certificate-based authentication, Microsoft Entra ID (Azure AD), or a RADIUS server (for integration with existing identity systems). Below is a compact reference comparing the protocols and authentication options and when to use each.
ProtocolTypical use caseClient support / notes
OpenVPNCross-platform compatibility, flexible ports (TCP/UDP), good for non-Windows clients or restrictive networksWorks on Windows, macOS, Linux, iOS, Android. Can traverse restrictive outbound ports if configured on TCP/443. See OpenVPN for client options.
SSTPWindows-native option when other protocols are blockedBuilt into Windows clients; uses SSL/TLS over TCP 443 so it easily traverses strict firewalls but is limited to Windows platforms.
IKEv2Strong performance and native mobile supportNative on many mobile and desktop OSes (iOS, macOS, some Android builds). Good for mobile scenarios with strong reconnection behavior.
Authentication methodDescriptionProsCons
Certificate-basedClients authenticate with user/device certificates derived from a trusted root certificate you uploadStrong security, no external identity provider required, works offlineCertificate lifecycle management and distribution required
Microsoft Entra ID (Azure AD)Integrates Azure identity (user-based auth) for P2S connectionsCentralized identity, MFA support, conditional accessRequires Entra ID configuration and supported clients
RADIUSDelegates authentication to on-prem or cloud RADIUS servers (LDAP, AD integration)Works with existing enterprise auth systems and MFA appliancesRequires RADIUS server availability and network access from gateway
A presentation slide titled "Learning Objectives" listing three items about point-to-site (P2S) connections: understanding point-to-site connections, learning the protocols and authentication methods used in P2S, and learning how to configure point-to-site. The slide features a blue-green gradient left panel and colored numbered markers for each objective.
In later sections of this article we will step through the configuration workflow at a high level and provide practical notes for each step. Typical P2S setup steps include:
  1. Create and configure the virtual network and gateway subnet.
  2. Deploy an Azure VPN gateway (select an appropriate gateway SKU that supports P2S).
  3. Enable point-to-site configuration on the gateway and define the address pool for clients.
  4. Choose and configure an authentication method:
    • Certificate auth: generate and upload the root certificate and client certificates.
    • Microsoft Entra ID: register and configure the Entra app and permissions.
    • RADIUS: configure the gateway to reach your RADIUS server and validate access.
  5. Generate and provision client VPN profiles / VPN client installers to users.
  6. Test connectivity, verify routes, and monitor the gateway using Azure Monitor and logs.
For step-by-step deployment examples and client configuration downloads, see the Azure documentation linked below.
Point-to-site is best for individual device connectivity. For always-on connectivity between entire networks (for example, between two offices), site-to-site VPNs or ExpressRoute are more appropriate.