IntroductionΒΆ

For the purpose of this tutorial we will assume that your organization has an instance of Azure Active Directory, populated with several user accounts which typically sign into Azure/Office 365 applications with their cloud credentials.

We will deploy a proxy virtual machine into the cloud and configure it so that these same credentials could be used to sign-in into the proxy. Authenticated user names will then be utilized in web filtering policies, access logs, traffic monitoring and reporting modules.