Microsoft 365,  Microsoft Azure

Microsoft Entra Private Access BYOD: Access Internal Resources with Entra Registered Devices

Until now, access to internal resources through Microsoft Entra Private Access was limited to managed devices that were either Microsoft Entra joined or Microsoft Entra hybrid joined. With the introduction of Microsoft Entra Private Access BYOD support, this limitation has been removed. Microsoft Entra registered devices can now access internal resources through Microsoft Entra Private Access, extending secure access to scenarios beyond fully managed devices.

During the initial sign-in through the Global Secure Access Client, the device is registered in the tenant as Microsoft Entra registered and created as a corresponding device object. Microsoft Entra registered devices support Microsoft Entra Private Access, but they are not supported for Microsoft Entra Internet Access.

Microsoft Entra Private Access BYOD is currently available in Public Preview.

Prerequisites and Licensing

Private Access Profile

Access to internal resources using Microsoft Entra Private Access BYOD requires an existing Microsoft Entra Private Access configuration. A detailed step-by-step guide for setting up Microsoft Entra Private Access is available here: Microsoft Entra Private Access: Secure Access to Internal Resources and Cloud Services without VPN – cloudcoffee.ch

Global Secure Access Client

The Global Secure Access client version 2.26.108 or later is required. The installation package is available for download in the Microsoft Entra admin center (https://entra.microsoft.com) under Global Secure Access > Connect > Client download.

Licenses

No additional license is required for Microsoft Entra Private Access BYOD. The capability is included as part of Microsoft Entra Private Access and is covered under the same licensing model.

Roles

The following roles are appropriate for configuring traffic forwarding in accordance with the principle of least privilege:

RolePermission
Global Secure Access AdministratorConfigure and manage Global Secure Access
Application AdministratorAdd and remove users from traffic forwarding profiles

Microsoft Entra Private Access BYOD Configuration

Traffic Forwarding Configuration

Access to internal resources using a Bring Your Own Device (BYOD) requires that the user is assigned to the Private access profile.

Microsoft Entra admin center (https://entra.microsoft.com) > Global Secure Access > Connect > Traffic forwarding > Private access profile > User and group assignments

Global Secure Access Client Installation

The device requires Global Secure Access Client version 2.26.108 or later. The installation package is available for download in the Microsoft Entra admin center (https://entra.microsoft.com) under Global Secure Access > Connect > Client download.

Run the downloaded GlobalSecureAccessClient.exe file on the device to start the installation. The installation process is straightforward.

Connect to Microsoft Entra Private Access

When the Global Secure Access Client is started for the first time, a sign-in prompt is displayed.
Select Sign in.

Enter the user credentials

When prompted with “Sign in to all apps, websites, and services on this device?”, select Yes. This action registers the device in the tenant (1).

After restarting the device, Microsoft Entra Global Secure Access establishes a connected state and the device remains registered.

Connection Status

Global Secure Access Client

In the Global Secure Access Client overview, the connection type Entra registered (1), the active connection to Microsoft Entra Private Access (2) and the currently signed-in organization (3) are displayed.

Device Registration

When signing in with a Bring Your Own Device (BYOD) for the first time, the device is created in the tenant under the user account as Microsoft Entra registered.

Microsoft Entra admin center (https://admin.microsoft.com) > Entra ID > Users > Select user > Devices

Conclusion

Microsoft Entra Private Access BYOD enables access to internal resources using Microsoft Entra registered devices. This allows BYOD scenarios to be integrated into an existing Zero Trust architecture without the need to operate separate VPN solutions. As a result, Global Secure Access gains additional flexibility and supports modern work models with secure access to internal resources.