Azure Bastion – Concepts

What is Azure Bastion?

Azure Bastion is a fully managed Platform-as-a-Service (PaaS) that provides secure and seamless RDP/SSH connectivity to your virtual machines directly in the Azure portal over SSL, without exposing public IP addresses.

Key Benefits

Architecture Overview

Azure Bastion consists of a managed service deployed into a dedicated subnet (AzureBastionSubnet) within your virtual network. It establishes a secure tunnel between the user’s browser session and the target VM.

Virtual Network (VNet)
│
├─ AzureBastionSubnet (Host Azure Bastion)
│   └─ Azure Bastion Service (Managed)
│
├─ Subnet‑A
│   └─ VM‑01 (Private IP)
│
└─ Subnet‑B
    └─ VM‑02 (Private IP)

Data Flow

  1. User initiates RDP/SSH from the Azure portal.
  2. Portal creates a TLS connection to the Azure Bastion service.
  3. Azure Bastion proxies the connection to the target VM over the VNet.
  4. All traffic stays within Azure’s backbone; no inbound rules are required.

Security Model

Azure Bastion adheres to a zero‑trust approach. It leverages Azure AD for authentication and supports network security groups (NSGs) on the AzureBastionSubnet for additional controls.

Supported Controls

Typical Usage Scenarios

Frequently Asked Questions

Do I need a public IP on my VMs?

No. Azure Bastion works with private IPs only.

Can I use my own custom domain?

Azure Bastion is accessed via the Azure portal; custom domains are not applicable.

Is there an additional cost?

Yes, Azure Bastion is billed per hour of provisioning and data processed. Refer to the pricing page for details.