Skip to content

Commit 157970d

Browse files
committed
Add information on Every Time Sign in frequency.
1 parent 880bcdd commit 157970d

File tree

1 file changed

+17
-6
lines changed

1 file changed

+17
-6
lines changed

articles/virtual-desktop/set-up-mfa.md

Lines changed: 17 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Enforce Microsoft Entra multifactor authentication for Azure Virtual Desk
33
description: How to enforce Microsoft Entra multifactor authentication for Azure Virtual Desktop using Conditional Access to help make it more secure.
44
author: Heidilohr
55
ms.topic: how-to
6-
ms.date: 10/27/2023
6+
ms.date: 02/12/2024
77
ms.author: helohr
88
---
99

@@ -101,18 +101,29 @@ Here's how to create a Conditional Access policy that requires multifactor authe
101101
102102
## Configure sign-in frequency
103103

104-
To optionally configure the time period before a user is asked to sign-in again:
104+
Sign-in frequency policies enable you to choose the time period before a user must prove their identity again when accessing Microsoft Entra-based resources. This can help secure your environment and is especially important for personal devices, where the local OS may not require MFA or may not lock automatically after inactivity.
105+
106+
Sign-in frequency policies will result in different behavior based on the Microsoft Entra app selected:
107+
- **Azure Virtual Desktop** (app ID 9cdead84-a844-4324-93f2-b2e6bb768d07)
108+
- Enforces re-authentication when a user subscribes to Azure Virtual Desktop, manually refreshes their list of resources and authenticates to the Azure Virtual Desktop Gateway during a connection.
109+
- Once the re-authentication period has passed, background feed refresh and diagnostics upload will silently fail, until a user completes their next interactive sign in to Microsoft Entra.
110+
- **Microsoft Remote Desktop** (app ID a4a365df-50f1-4397-bc59-1a1564b8bb9c) and **Windows Cloud Login** (app ID 270efc09-cd0d-444b-a71f-39af4910ec45)
111+
- Enforces re-authentication when a user signs in to a session host when [single sign-on](configure-single-sign-on.md) is enabled.
112+
- Both apps should be configured together as the Azure Virtual Desktop clients will soon switch from using the Microsoft Remote Desktop app to the Windows Cloud Login app to authenticate to the session host.
113+
114+
To configure the time period before a user is asked to sign-in again:
105115

106116
1. Open the policy you created previously.
107117
1. Under **Access controls** > **Session**, select **0 controls selected**.
108118
1. On the new pane that opens, select **Sign-in frequency**.
109-
1. Select **Periodic reauthentication**.
110-
1. Set the value for the time period before a user is asked to sign-in again, and then select **Select**. For example, setting the value to **1** and the unit to **Hours**, will require multifactor authentication if a connection is launched over an hour after the last one.
119+
1. Select **Periodic reauthentication** or **Every time**.
120+
- If you select Periodic reauthentication, set the value for the time period before a user is asked to sign-in again, and then select **Select**. For example, setting the value to **1** and the unit to **Hours**, will require multifactor authentication if a connection is launched over an hour after the last one.
121+
- If you select Every time, users will be prompted to re-authenticate after a period or 10 to 15 minutes since the last time they authenticated.
111122
1. At the bottom of the page, under **Enable policy** select **Save**.
112123

113124
> [!NOTE]
114-
> - If [single sign-on](configure-single-sign-on.md) is enabled, it's recommended to configure the sign-in frequency only on the **Microsoft Remote Desktop** and **Windows Cloud Login** Entra ID apps and not the **Azure Virtual Desktop** Entra ID app. This will ensure that feed refresh and diagnostics upload continue working in the background as expected.
115-
> - Without single sign-on, sign-in frequency can be configured on the **Azure Virtual Desktop** Entra ID app.
125+
> - Re-authentication only happens when a user must authenticate to a resource. Once a connection is established, users will not be prompted even if the connection lasts longer than the sign-in frequency you've configured.
126+
> - Users will need to re-authenticate if there is a network disruption that forces the session to be re-established after the sign-in frequency you've configured. This could lead to more frequent authentication requests on unstable networks.
116127
117128
<a name='azure-ad-joined-session-host-vms'></a>
118129

0 commit comments

Comments
 (0)