{"id":76275,"date":"2024-03-19T17:19:43","date_gmt":"2024-03-19T09:19:43","guid":{"rendered":"https:\/\/version-2.com\/?p=76275"},"modified":"2024-03-15T12:09:04","modified_gmt":"2024-03-15T04:09:04","slug":"how-to-providing-secure-access-to-microsoft-azure-with-parallels-browser-isolation","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2024\/03\/how-to-providing-secure-access-to-microsoft-azure-with-parallels-browser-isolation\/","title":{"rendered":"How-to: Providing secure access to Microsoft Azure with Parallels Browser Isolation"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"76275\" class=\"elementor elementor-76275\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-71ae5294 post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"71ae5294\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4a899f&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1e9119cd\" data-id=\"1e9119cd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4f04f8cb elementor-widget elementor-widget-text-editor\" data-id=\"4f04f8cb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/www.parallels.com\/blogs\/ras\/app\/uploads\/2024\/03\/PBI-Web-Blog-Release-1138x301.jpg.png\" width=\"1138\" height=\"301\" \/><\/p><article class=\"post\"><h2>What is Parallels Browser Isolation (PBI)?\u00a0<\/h2><p>Parallels Browser Isolation (PBI) is a comprehensive, cloud-native solution that offers highly secure access to web applications and SaaS via a preferred web browser. It is a remote browser isolation solution that offers Zero Trust protection from cybersecurity threats and aligns with industry security standards for safety, protection, and compliance.<\/p><p>Parallels Browser Isolation is a fully hosted remote browser isolation service, with a control plane and containerized browser instances. It\u2019s scalable, flexible, and agentless, offering a highly adaptable and secure solution for all users within an organization.<\/p><p>Learn more about <a href=\"https:\/\/parallels.com\/products\/browser-isolation\">Parallels Browser Isolation<\/a>!<\/p><h2>Why would you like to set up secure access to Microsoft Azure with Parallels Browser Isolation (PBI)?<\/h2><p>Like many SaaS applications, users have access to Microsoft Azure from any device and any location by default.<\/p><p>Conditional access in Microsoft Entra Identity (Azure AD) enables you to impose restrictions on managed devices or specific network ranges. However, it\u2019s important to understand that these restrictions are applicable only to managed devices.<\/p><p>What if you want to enforce restrictions without the use of VPN agents? Or suppose you aim to apply access controls to bring-your-own-device (BYOD) policies or non-windows-based devices?<\/p><p>Adding to these challenges, it\u2019s crucial to note that conditional access focuses solely on securing entry points. It does not extend to controlling actions within Microsoft Azure (or any other SaaS application) once access is granted.<\/p><p>What if your security needs include stopping users from downloading data while permitting uploads? Or suppose you need to disable copy\/paste functions, prevent screenshot capture, and block printing capabilities? These requirements align with a Zero Trust security model, yet such specific restrictions cannot be achieved through traditional conditional access or role-based access controls alone.<\/p><p>Parallels Browser Isolation enables you to route all Microsoft Azure access through a remote browser. This setup allows for geo-blocking, restricting access exclusively to locations associated with PBI IP addresses.<\/p><p>Following this configuration, only users who adhere to the PBI policies and belong to the designated access groups will be granted the ability to connect to Azure. Furthermore, the policy engine empowers you to specify permissible actions within Azure, such as copy\/paste, upload, download, print, and others, offering a tailored and secure user experience.<\/p><p><img decoding=\"async\" class=\"size-large wp-image-56070 aligncenter\" src=\"https:\/\/www.parallels.com\/blogs\/ras\/app\/uploads\/2024\/03\/pbi-azure-portal-diagram-1024x576.png\" sizes=\"(max-width: 1024px) 100vw, 1024px\" srcset=\"https:\/\/www.parallels.com\/blogs\/ras\/app\/uploads\/2024\/03\/pbi-azure-portal-diagram-1024x576.png 1024w, https:\/\/www.parallels.com\/blogs\/ras\/app\/uploads\/2024\/03\/pbi-azure-portal-diagram-300x169.png 300w, https:\/\/www.parallels.com\/blogs\/ras\/app\/uploads\/2024\/03\/pbi-azure-portal-diagram-768x432.png 768w, https:\/\/www.parallels.com\/blogs\/ras\/app\/uploads\/2024\/03\/pbi-azure-portal-diagram-735x413.png 735w, https:\/\/www.parallels.com\/blogs\/ras\/app\/uploads\/2024\/03\/pbi-azure-portal-diagram-150x84.png 150w, https:\/\/www.parallels.com\/blogs\/ras\/app\/uploads\/2024\/03\/pbi-azure-portal-diagram.png 1440w\" alt=\"PBI Azure Portal Diagram\" width=\"1024\" height=\"576\" \/><\/p><h2>Implement conditional access on Azure<\/h2><p>For the first step, you must set up Microsoft Azure to exclusively permit access from PBI IP addresses. You can do this by setting up conditional access within Microsoft Entra ID (formerly known as Azure AD). It\u2019s important to highlight that activating this conditional access feature requires a Microsoft Entra Identity P1 license. The process starts with establishing a Named Location that encompasses the IP addresses associated with Parallels Browser Isolation.<\/p><p>As an admin, go to \u201cMicrosoft Entra ID\u201d \u2014&gt; \u201cSecurity,\u201d \u2014&gt; \u201cNamed Locations\u201d Click on \u201c+ IP ranges location\u201d and give this location a unique name. In my case, I called this location \u201cParallels Browser Isolation\u201d. Add all IP addresses used by Parallels Browser Isolation. The list can be found online in this <strong>KB<\/strong> article: <a href=\"https:\/\/kb.parallels.com\/en\/130095\">https:\/\/kb.parallels.com\/en\/130095<\/a>.<\/p><p>When adding the different IP addresses, add a \/32 to the end to identify that these are single IPs and not ranges.<\/p><p>Once this is done, go to \u201cMicrosoft Entra ID\u201d \u2014&gt; \u201cSecurity\u201d \u2014&gt;\u201cConditional Access\u201d<\/p><p>Click on \u201c+ Create new policy\u201d and give it a unique name. In my case, I called it \u201cPBI Only Policy\u201d.<\/p><p>In configuring the policy, the initial step involves selecting the \u2018Users\u2019 to whom the policy will apply. It\u2019s advisable to begin with a small user group for testing purposes before expanding the policy to include a broader audience.<\/p><p><em><strong>Important:<\/strong> Make sure you exclude at least a few users from this policy, as you might need to get back into your Microsoft Azure if there are configuration or other issues with your conditional access configuration. If you include everyone and you have an issue, you can\u2019t log in to Microsoft Azure anymore and, therefore can\u2019t make any changes to the conditional access settings in the \u201cMicrosoft Entra ID\u201d. <\/em><\/p><p>Next, we need to select the \u201cTarget Resources\u201d and select \u201cInclude\u201d.<\/p><p>If you want to protect your Azure portal only, then choose the \u201cSelect apps\u201d option and \u201cSelect\u201d only \u201cMicrosoft Admin Portals\u201d. This application covers access to Microsoft Azure and some other management portals.<\/p><p><em> <strong>Important:<\/strong> If you choose the \u201cAll cloud apps\u201d option, take into account that you might have configured your Parallels Browser Isolation (PBI) solution to be federated with \u201cMicrosoft Entra ID,\u201d and therefore, you need to make sure you exclude the application that was created in \u201cMicrosoft Entra ID\u201d for PBI from this policy. If not, you won\u2019t be able to log in on PBI. <\/em><\/p><p>On the \u201cConditions\u201d settings, we now have to enable the \u201cLocations\u201d filter. We want to have this policy enabled for all locations except for the \u201cParallels Browser Isolation\u201d location created in the first step of this procedure.<\/p><p>To do this, under \u201cInclude\u201d, select \u201cAny Network,\u201d and under \u201cExclude,\u201d select \u201cSelect Locations\u201d and select the \u201cNamed Location\u201d you created earlier, in my case, \u201cParallels Browser Isolation\u201d location.<\/p><p>The other conditions like \u201cUser risk\u201d, \u201cSign-in risk\u201d, \u201cDevice platforms\u201d, \u201cClient apps,\u201d and \u201cFilter for devices\u201d can remain in the default configuration and don\u2019t need to be modified.<\/p><p>The final steps are to set the \u201cAccess Controls\u201d to \u201cBlock access\u201d, set \u201cEnable policy\u201d to \u201cOn,\u201d and save it.<\/p><h2>Publish Microsoft Azure as a Secure Web Application in Parallels Browser Isolation (PBI)<\/h2><p>Now that the conditional access is configured, your next step is to make sure the users can access Microsoft Azure via Parallels Browser Isolation (PBI).<\/p><p>To do this, log in and go to the PBI admin portal. Click on \u201cApplications\u201d \u2014&gt; \u201cAdd Application\u201d \u2014&gt; \u201cSecure Web Application\u201d.<\/p><p>Start by setting the \u201cName\u201cand the \u201c<strong>Icon<\/strong>\u201d. Set \u201c<a href=\"https:\/\/portal.azure.com\/\">https:\/\/portal.azure.com<\/a>\u201d as a start URL.<\/p><p>Under \u201c<strong>Domains,<\/strong>\u201d you have now to specify all URLs that are used by Azure.<\/p><p>For some SaaS applications, this is a single domain, but for Microsoft Azure, the list is pretty long (this is the <a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/azure-portal\/azure-portal-safelist-urls?tabs=public-cloud\">full list<\/a> of all domain names used by Microsoft Azure).<\/p><p>You can add the individual subdomains or only the main domains. In the example below we simplified the list of domains to include only the main domains, but not the individual subdomains. Also, we added all possible domains, not just the ones linked to the Microsoft Azure login but all the individual services.<\/p><p>The following domains have been added:<\/p><table><tbody><tr><td><p>aadrm.com<\/p><p>azconfig.io<\/p><p>azure.com<\/p><p>azure.net<\/p><p>azureedge.net azuresynapse.net loganalytics.io<\/p><\/td><td><p>login.live.com microsoft.com<\/p><p>microsoftonline-p.com microsoftonline.com<\/p><p>msauth.net<\/p><p>msauthimages.net<\/p><p>msftauth.net<\/p><\/td><td><p>msftauthimages.net<\/p><p>office.com<\/p><p>status.microsoft<\/p><p>trafficmanager.net<\/p><p>windows.net<\/p><\/td><\/tr><\/tbody><\/table><p>Under the \u201c<strong>Access for secure web applications,<\/strong>\u201d select the users or groups in PBI that must have access to Microsoft Azure. Optionally, select an extra policy you want to apply to this application. If the policy doesn\u2019t exist yet, you must first save the application, create a new policy, and then edit the app and assign the newly created policy.<\/p><p>Before creating the policy, don\u2019t forget to save the configuration. You do this by clicking on the bottom of the screen on \u201cAdd\u201d.<\/p><p>Once that is done you will see the app in the list of published apps.<\/p><p><img decoding=\"async\" class=\"aligncenter wp-image-56068 size-full\" src=\"https:\/\/www.parallels.com\/blogs\/ras\/app\/uploads\/2024\/03\/Screenshot-2024-03-07-at-10.52.55\u202fAM-e1709830452359.png\" sizes=\"(max-width: 938px) 100vw, 938px\" srcset=\"https:\/\/www.parallels.com\/blogs\/ras\/app\/uploads\/2024\/03\/Screenshot-2024-03-07-at-10.52.55\u202fAM-e1709830452359.png 938w, https:\/\/www.parallels.com\/blogs\/ras\/app\/uploads\/2024\/03\/Screenshot-2024-03-07-at-10.52.55\u202fAM-e1709830452359-300x176.png 300w, https:\/\/www.parallels.com\/blogs\/ras\/app\/uploads\/2024\/03\/Screenshot-2024-03-07-at-10.52.55\u202fAM-e1709830452359-768x451.png 768w\" alt=\"Azure Portal PBI\" width=\"938\" height=\"551\" \/><\/p><p>In this example, I want extra security on top of Microsoft Azure and, therefore, will create an extra policy to block \u201ccopy\/paste\u201d, \u201cdownload\u201d, and \u201cprinting\u201d and have a watermark on the screen to make it more difficult to take screenshots.<\/p><p>To create a new policy in the right menu bar, click on \u201cPolicies\u201d \u2014&gt;\u201cAdd\u201d<\/p><p>Again, we start with setting a \u201c<strong>Name<\/strong>\u201d. My policy will be called \u201cMicrosoft Apps Policy\u201d, and the idea is that I can apply this same policy to other published Microsoft applications I may want to publish in PBI later.<\/p><p>I want to apply the policy to all users, so I will set the filter for \u201c<strong>Users and Groups<\/strong>\u201d to disabled.<\/p><p>Same for the \u201c<strong>Active Hours<\/strong>\u201d, I keep it set to disabled.<\/p><p>For the \u201c<strong>Location,<\/strong>\u201d I can implement the geo-restriction. As we have restricted access to Azure to only PBIIP addresses with conditional access, we can\u2019t set country-based geo-restrictions at that level.<\/p><p>In my example, I have geo-restricted Microsoft Azure access to \u201cBelgium\u201d, \u201cFrance\u201d, \u201cGermany\u201d, \u201cItaly\u201d, \u201cNetherlands\u201d, \u201cPortugal\u201d and \u201cSpain\u201d.<\/p><p>On the \u201c<strong>Security controls\/Policy Features,<\/strong>\u201d I enabled the \u201c<strong>Disable printing<\/strong>\u201d, \u201c<strong>Disabled downloads,<\/strong>\u201d and \u201c<strong>Disable Clipboard<\/strong>\u201d features.<\/p><p>Under \u201c<strong>Security controls\/End-user experience,<\/strong>\u201d I enabled the following features:<\/p><ul><li>\u201c<strong>Blue border<\/strong>\u201d: This will put a visual indication (blue border around the screen) that you are not accessing the website directly but via the Parallels Browser Isolation solution.<\/li><li>\u201c<strong>Watermarking<\/strong>\u201d: This will add the user\u2019s login name and date as a watermark on top of the screen so that taking screenshots becomes more difficult.<\/li><\/ul><p>The \u201c<strong>Restrict URLs<\/strong>\u201d options don\u2019t need to change here \u2014 they can stay on the default values.<\/p><p>Finish creating the policy by clicking on \u201cSave\u201d. Now that the policy has been created, go back to the \u201cAzure Portal\u201d application and add the \u201cMicrosoft Apps Policy\u201d to the application.<\/p><h2>Test the setup<\/h2><p>Now that we have published the \u201cAzure Portal\u201d application on PBI and configured the conditional access on Microsoft Entra ID, we can test if the setup works: First, we try to open it directly from the web browser.<\/p><p>This should not work as the conditional access only allows connections from the Parallels Brower Isolation IP addresses.<\/p><p><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-56069 aligncenter\" src=\"https:\/\/www.parallels.com\/blogs\/ras\/app\/uploads\/2024\/03\/Screenshot-2024-03-07-at-10.54.47\u202fAM-1024x616.png\" sizes=\"(max-width: 1024px) 100vw, 1024px\" srcset=\"https:\/\/www.parallels.com\/blogs\/ras\/app\/uploads\/2024\/03\/Screenshot-2024-03-07-at-10.54.47\u202fAM-1024x616.png 1024w, https:\/\/www.parallels.com\/blogs\/ras\/app\/uploads\/2024\/03\/Screenshot-2024-03-07-at-10.54.47\u202fAM-300x181.png 300w, https:\/\/www.parallels.com\/blogs\/ras\/app\/uploads\/2024\/03\/Screenshot-2024-03-07-at-10.54.47\u202fAM-768x462.png 768w, https:\/\/www.parallels.com\/blogs\/ras\/app\/uploads\/2024\/03\/Screenshot-2024-03-07-at-10.54.47\u202fAM.png 1190w\" alt=\"PBI Secure Access\" width=\"1024\" height=\"616\" \/><\/p><p>If we do the same thing but via Parallels Browser Isolation, it works. Also, note the watermark and the blue bar around the screen.<\/p><p>Now you have set up secure access to Microsoft Azure via Parallels Browser Isolation!<\/p><p><!-- AddThis Share Buttons generic via filter on the_content --><\/p><\/article>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1a1b0f4 elementor-widget elementor-widget-shortcode\" data-id=\"1a1b0f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"42979\" class=\"elementor elementor-42979\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6b25dc0d elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"6b25dc0d\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3cc1b37d\" data-id=\"3cc1b37d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-52c4a230 elementor-widget elementor-widget-text-editor\" data-id=\"52c4a230\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About Parallels\u00a0<br \/><\/strong>Parallels\u00ae is a global leader in cross-platform solutions, enabling businesses and individuals to access and use the applications and files they need on any device or operating system. Parallels helps customers leverage the best technology available, whether it\u2019s Windows, Linux, macOS, iOS, Android or the cloud.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>What is Parallels Browser Isolation (PBI)?\u00a0 Parallels B [&hellip;]<\/p>","protected":false},"author":149011790,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[587,1273,61],"tags":[589,1272],"class_list":["post-76275","post","type-post","status-publish","format-standard","hentry","category-awingu","category-1273","category-press-release","tag-awingu","tag-1272"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How-to: Providing secure access to Microsoft Azure with Parallels Browser Isolation - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.parallels.com\/blogs\/ras\/pbi-access-azure\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How-to: Providing secure access to Microsoft Azure with Parallels Browser Isolation - Version 2\" \/>\n<meta property=\"og:description\" content=\"What is Parallels Browser Isolation (PBI)?\u00a0 Parallels B [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.parallels.com\/blogs\/ras\/pbi-access-azure\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-19T09:19:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.parallels.com\/blogs\/ras\/app\/uploads\/2024\/03\/PBI-Web-Blog-Release-1138x301.jpg.png\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.parallels.com\\\/blogs\\\/ras\\\/pbi-access-azure\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/03\\\/how-to-providing-secure-access-to-microsoft-azure-with-parallels-browser-isolation\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"How-to: Providing secure access to Microsoft Azure with Parallels Browser Isolation\",\"datePublished\":\"2024-03-19T09:19:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/03\\\/how-to-providing-secure-access-to-microsoft-azure-with-parallels-browser-isolation\\\/\"},\"wordCount\":1637,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.parallels.com\\\/blogs\\\/ras\\\/pbi-access-azure\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.parallels.com\\\/blogs\\\/ras\\\/app\\\/uploads\\\/2024\\\/03\\\/PBI-Web-Blog-Release-1138x301.jpg.png\",\"keywords\":[\"Parallels\",\"2024\"],\"articleSection\":[\"Parallels\",\"2024\",\"Press Release\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/03\\\/how-to-providing-secure-access-to-microsoft-azure-with-parallels-browser-isolation\\\/\",\"url\":\"https:\\\/\\\/www.parallels.com\\\/blogs\\\/ras\\\/pbi-access-azure\\\/\",\"name\":\"How-to: Providing secure access to Microsoft Azure with Parallels Browser Isolation - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.parallels.com\\\/blogs\\\/ras\\\/pbi-access-azure\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.parallels.com\\\/blogs\\\/ras\\\/pbi-access-azure\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.parallels.com\\\/blogs\\\/ras\\\/app\\\/uploads\\\/2024\\\/03\\\/PBI-Web-Blog-Release-1138x301.jpg.png\",\"datePublished\":\"2024-03-19T09:19:43+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.parallels.com\\\/blogs\\\/ras\\\/pbi-access-azure\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.parallels.com\\\/blogs\\\/ras\\\/pbi-access-azure\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.parallels.com\\\/blogs\\\/ras\\\/pbi-access-azure\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.parallels.com\\\/blogs\\\/ras\\\/app\\\/uploads\\\/2024\\\/03\\\/PBI-Web-Blog-Release-1138x301.jpg.png\",\"contentUrl\":\"https:\\\/\\\/www.parallels.com\\\/blogs\\\/ras\\\/app\\\/uploads\\\/2024\\\/03\\\/PBI-Web-Blog-Release-1138x301.jpg.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.parallels.com\\\/blogs\\\/ras\\\/pbi-access-azure\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How-to: Providing secure access to Microsoft Azure with Parallels Browser Isolation\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How-to: Providing secure access to Microsoft Azure with Parallels Browser Isolation - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.parallels.com\/blogs\/ras\/pbi-access-azure\/","og_locale":"en_US","og_type":"article","og_title":"How-to: Providing secure access to Microsoft Azure with Parallels Browser Isolation - Version 2","og_description":"What is Parallels Browser Isolation (PBI)?\u00a0 Parallels B [&hellip;]","og_url":"https:\/\/www.parallels.com\/blogs\/ras\/pbi-access-azure\/","og_site_name":"Version 2","article_published_time":"2024-03-19T09:19:43+00:00","og_image":[{"url":"https:\/\/www.parallels.com\/blogs\/ras\/app\/uploads\/2024\/03\/PBI-Web-Blog-Release-1138x301.jpg.png","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"Written by":"tracylamv2","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.parallels.com\/blogs\/ras\/pbi-access-azure\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2024\/03\/how-to-providing-secure-access-to-microsoft-azure-with-parallels-browser-isolation\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"How-to: Providing secure access to Microsoft Azure with Parallels Browser Isolation","datePublished":"2024-03-19T09:19:43+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2024\/03\/how-to-providing-secure-access-to-microsoft-azure-with-parallels-browser-isolation\/"},"wordCount":1637,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/www.parallels.com\/blogs\/ras\/pbi-access-azure\/#primaryimage"},"thumbnailUrl":"https:\/\/www.parallels.com\/blogs\/ras\/app\/uploads\/2024\/03\/PBI-Web-Blog-Release-1138x301.jpg.png","keywords":["Parallels","2024"],"articleSection":["Parallels","2024","Press Release"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2024\/03\/how-to-providing-secure-access-to-microsoft-azure-with-parallels-browser-isolation\/","url":"https:\/\/www.parallels.com\/blogs\/ras\/pbi-access-azure\/","name":"How-to: Providing secure access to Microsoft Azure with Parallels Browser Isolation - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.parallels.com\/blogs\/ras\/pbi-access-azure\/#primaryimage"},"image":{"@id":"https:\/\/www.parallels.com\/blogs\/ras\/pbi-access-azure\/#primaryimage"},"thumbnailUrl":"https:\/\/www.parallels.com\/blogs\/ras\/app\/uploads\/2024\/03\/PBI-Web-Blog-Release-1138x301.jpg.png","datePublished":"2024-03-19T09:19:43+00:00","breadcrumb":{"@id":"https:\/\/www.parallels.com\/blogs\/ras\/pbi-access-azure\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.parallels.com\/blogs\/ras\/pbi-access-azure\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.parallels.com\/blogs\/ras\/pbi-access-azure\/#primaryimage","url":"https:\/\/www.parallels.com\/blogs\/ras\/app\/uploads\/2024\/03\/PBI-Web-Blog-Release-1138x301.jpg.png","contentUrl":"https:\/\/www.parallels.com\/blogs\/ras\/app\/uploads\/2024\/03\/PBI-Web-Blog-Release-1138x301.jpg.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.parallels.com\/blogs\/ras\/pbi-access-azure\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"How-to: Providing secure access to Microsoft Azure with Parallels Browser Isolation"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/en\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-jQf","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/76275","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=76275"}],"version-history":[{"count":4,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/76275\/revisions"}],"predecessor-version":[{"id":76308,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/76275\/revisions\/76308"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=76275"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=76275"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=76275"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}