Post

Secure Remote Management with Windows Admin Center via Azure Arc and SSH Tunneling.

Secure Remote Management with Windows Admin Center via Azure Arc and SSH Tunneling.

Overview

This guide demonstrates how to securely access Windows Admin Center (WAC) on a remote server using Azure Arc and SSH tunneling. This approach provides a secure, cloud-based connection without exposing your management interface directly to the internet.

What You’ll Achieve

  • Secure remote access to Windows Admin Center through Azure Arc
  • SSH tunnel for encrypted port forwarding
  • Centralized management of multiple servers from a single WAC instance
  • Leverage WAC extensions (Active Directory, DNS, RDP, etc.) remotely

Prerequisites

Before you begin, ensure you have:

  • Azure subscription with appropriate permissions
  • Azure CLI installed on your local machine
  • Windows Admin Center installed on the target server
  • Azure Arc agent installed on the server hosting Windows Admin Center
  • Local administrator credentials for the Arc-enabled server

Architecture

1
2
3
4
5
[Your Local Machine] 
    ↓ (Azure CLI + SSH)
[Azure Arc Service]
    ↓ (Secure Connection)
[Arc-enabled Server with WAC]

WAC Login

Step-by-Step Guide

Step 1: Install Azure Arc Agent

  1. Navigate to the Azure Portal
  2. Go to Azure Arc > Machines > Add/Create > Add a machine
  3. Select Generate script for your server
  4. Run the generated PowerShell script on your target server as Administrator

The script will:

  • Install the Azure Connected Machine agent
  • Register the server with Azure Arc
  • Create the server resource in your specified resource group

Verify the installation:

1
azcmagent show

Step 2: Install Windows Admin Center

  1. Download Windows Admin Center on the Arc-enabled server
  2. Run the installer with these recommended settings:
    • Port: 443 (default) or custom port
    • Certificate: Use self-signed for testing, or provide your own SSL certificate
    • Allowed client connections: Select based on your security requirements
  3. Complete the installation and verify WAC is accessible locally:
    1
    
    https://localhost:443
    

Step 3: Authenticate with Azure CLI

On your local machine, authenticate to your Azure tenant:

1
az login

Follow the browser prompt to complete authentication.

Verify your subscription:

1
az account show

If you have multiple subscriptions, set the correct one:

1
az account set --subscription "7501db9d-d5f8-4597-8df2-xxxxxxx"

Step 4: Establish SSH Tunnel via Azure Arc

Use the Azure CLI to create an SSH connection with port forwarding:

1
2
3
4
5
6
az ssh arc \
  --subscription "7501db9d-d5f8-4597-8df2-xxxxxxxxx" \
  --resource-group "hyperv" \
  --name "HYPER-01" \
  --local-user administrator \
  -- -L 3333:192.168.81.101:443

Command Breakdown:

  • --subscription: Your Azure subscription ID
  • --resource-group: Resource group containing the Arc-enabled server
  • --name: Name of the Arc-enabled server
  • --local-user: Local administrator account on the remote server
  • -- -L 3333:192.168.81.101:443: Port forwarding configuration
    • 3333: Local port on your machine
    • 192.168.81.101:443: IP and port of the WAC instance (can be localhost or specific IP)

Note: You’ll be prompted for the administrator password.

Step 5: Access Windows Admin Center

  1. Keep the SSH connection active (don’t close the terminal)
  2. Open your web browser and navigate to:
    1
    
    https://localhost:3333
    

WAC Dashboard

  1. Accept the security certificate warning (if using self-signed certificate)
  2. Log in with your administrator credentials

Step 6: Manage Your Environment

Once connected to Windows Admin Center, you can:

Add Server Connections

  1. Click Add in Windows Admin Center
  2. Select Server or Windows PC
  3. Enter the hostname or IP address of servers accessible from the Arc-enabled machine
  4. Provide credentials (use saved credentials for convenience)

Install and Use Extensions

Navigate to Settings > Extensions to install:

  • Active Directory - Manage AD users, groups, and OUs
  • DNS - Configure DNS zones and records
  • DHCP - Manage DHCP scopes and reservations
  • Remote Desktop - Connect to servers via RDP
  • Failover Clustering - Manage Windows clusters
  • Hyper-V - Manage virtual machines
  • And many more…

Manage Multiple Servers

From a single WAC instance, you can now:

  • Monitor performance across servers
  • Deploy configurations and updates
  • Manage certificates and firewall rules
  • Access Event Viewer and logs
  • Execute PowerShell scripts

Security Considerations

Best Practices

  1. Use Strong Authentication
    • Enable Multi-Factor Authentication (MFA) on Azure accounts
    • Use complex passwords for local administrator accounts
    • Consider Azure AD integration for WAC
  2. Network Segmentation
    • Place WAC on a management VLAN/subnet
    • Restrict firewall rules to necessary ports only
    • Use Azure Arc with private endpoints when possible
  3. Certificate Management
    • Replace self-signed certificates with trusted certificates in production
    • Regularly renew and rotate certificates
    • Use your organization’s PKI infrastructure
  4. Audit and Monitoring
    • Enable Azure Arc logging and monitoring
    • Review WAC audit logs regularly
    • Monitor SSH connections through Azure Activity Log
  5. Least Privilege Access
    • Grant only necessary Azure RBAC roles
    • Use just-in-time (JIT) access where applicable
    • Regularly review and revoke unused permissions

Troubleshooting

This post is licensed under CC BY 4.0 by the author.