|
1 | 1 | ---
|
2 |
| -title: Azure multifactor authentication for Azure Virtual Desktop - Azure |
3 |
| -description: How to set up Azure multifactor authentication to make Azure Virtual Desktop more secure. |
| 2 | +title: Enforce Azure Active Directory Multi-Factor Authentication for Azure Virtual Desktop using Conditional Access - Azure |
| 3 | +description: How to enforce Azure Active Directory Multi-Factor Authentication for Azure Virtual Desktop using Conditional Access to help make it more secure. |
4 | 4 | author: Heidilohr
|
5 | 5 | ms.topic: how-to
|
6 |
| -ms.date: 12/10/2020 |
| 6 | +ms.date: 05/27/2022 |
7 | 7 | ms.author: helohr
|
8 | 8 | manager: femila
|
9 | 9 | ---
|
10 |
| -# Enable Azure multifactor authentication for Azure Virtual Desktop |
| 10 | +# Enforce Azure Active Directory Multi-Factor Authentication for Azure Virtual Desktop using Conditional Access |
11 | 11 |
|
12 |
| ->[!IMPORTANT] |
| 12 | +> [!IMPORTANT] |
13 | 13 | > If you're visiting this page from the Azure Virtual Desktop (classic) documentation, make sure to [return to the Azure Virtual Desktop (classic) documentation](./virtual-desktop-fall-2019/tenant-setup-azure-active-directory.md) once you're finished.
|
14 | 14 |
|
15 |
| -The Windows client for Azure Virtual Desktop is an excellent option for integrating Azure Virtual Desktop with your local machine. However, when you configure your Azure Virtual Desktop account into the Windows Client, there are certain measures you'll need to take to keep yourself and your users safe. |
| 15 | +Users can sign into Azure Virtual Desktop from anywhere using different devices and clients. However, there are certain measures you should take to help keep yourself and your users safe. Using Azure Active Directory (AD) Multi-Factor Authentication with Azure Virtual Desktop prompts users during the sign-in process for an additional form of identification, in addition to their username and password. You can enforce Azure Active Directory Multi-Factor Authentication for Azure Virtual Desktop using Conditional Access and whether it applies for the web client or mobile apps and desktop clients, or both. |
16 | 16 |
|
17 |
| -When you first sign in, the client asks for your username, password, and Azure multifactor authentication. After that, the next time you sign in, the client will remember your token from your Azure Active Directory (AD) Enterprise Application. When you select **Remember me** on the prompt for credentials for the session host, your users can sign in after restarting the client without needing to reenter their credentials. |
| 17 | +How often a user is prompted to reauthenticate depends on [Azure AD session lifetime configuration settings](../active-directory/authentication/concepts-azure-multi-factor-authentication-prompts-session-lifetime.md#azure-ad-session-lifetime-configuration-settings). For example, if their Windows client device is registered with Azure AD, it will receive a [Primary Refresh Token](../active-directory/devices/concept-primary-refresh-token.md) (PRT) to use single sign-on (SSO) across applications. Once issued, a PRT is valid for 14 days and is continuously renewed as long as the user actively uses the device. |
18 | 18 |
|
19 |
| -While remembering credentials is convenient, it can also make deployments on Enterprise scenarios or personal devices less secure. To protect your users, you can make sure the client keeps asking for Azure multifactor authentication credentials more frequently. This article will show you how to configure the Conditional Access policy for Azure Virtual Desktop to enable this setting. |
| 19 | +While remembering credentials is convenient, it can also make deployments for Enterprise scenarios using personal devices less secure. To protect your users, you can make sure the client keeps asking for Azure AD Multi-Factor Authentication credentials more frequently. You can use Conditional Access to configure this behavior. |
| 20 | + |
| 21 | +Learn how to enforce Azure AD Multi-Factor Authentication for Azure Virtual Desktop and optionally configure sign-in frequency below. |
20 | 22 |
|
21 | 23 | ## Prerequisites
|
22 | 24 |
|
23 | 25 | Here's what you'll need to get started:
|
24 | 26 |
|
25 |
| -- Assign users a license that includes Azure Active Directory Premium P1 or P2. |
26 |
| -- An Azure Active Directory group with your users assigned as group members. |
27 |
| -- Enable Azure multifactor authentication for all your users. For more information about how to do that, see [How to require two-step verification for a user](../active-directory/authentication/howto-mfa-userstates.md#view-the-status-for-a-user). |
28 |
| - |
29 |
| -> [!NOTE] |
30 |
| -> The following setting also applies to the [Azure Virtual Desktop web client](https://rdweb.wvd.microsoft.com/arm/webclient/index.html). |
| 27 | +- Assign users a license that includes [Azure Active Directory Premium P1 or P2](../active-directory/authentication/concept-mfa-licensing.md). |
| 28 | +- An [Azure Active Directory group](../active-directory/fundamentals/active-directory-groups-create-azure-portal.md) with your Azure Virtual Desktop users assigned as group members. |
| 29 | +- Enable Azure AD Multi-Factor Authentication for your users. For more information about how to do that, see [Enable Azure AD Multi-Factor Authentication](../active-directory/authentication/tutorial-enable-azure-mfa.md). |
31 | 30 |
|
32 | 31 | ## Create a Conditional Access policy
|
33 | 32 |
|
34 |
| -Here's how to create a Conditional Access policy that requires multifactor authentication when connecting to Azure Virtual Desktop: |
35 |
| - |
36 |
| -1. Sign in to the **Azure portal** as a global administrator, security administrator, or Conditional Access administrator. |
37 |
| -2. Browse to **Azure Active Directory** > **Security** > **Conditional Access**. |
38 |
| -3. Select **New policy**. |
39 |
| -4. Give your policy a name. We recommend that organizations create a meaningful standard for the names of their policies. |
40 |
| -5. Under **Assignments**, select **Users and groups**. |
41 |
| -6. Under **Include**, select **Select users and groups** > **Users and groups** > Choose the group you created in the [prerequisites](#prerequisites) stage. |
42 |
| -7. Select **Done**. |
43 |
| -8. Under **Cloud apps or actions** > **Include**, select **Select apps**. |
44 |
| -9. Select one of the following apps based on which version of Azure Virtual Desktop you're using. |
| 33 | +Here's how to create a Conditional Access policy that requires multi-factor authentication when connecting to Azure Virtual Desktop: |
| 34 | + |
| 35 | +1. Sign in to the [Azure portal](https://portal.azure.com) as a global administrator, security administrator, or Conditional Access administrator. |
| 36 | +1. In the search bar, type *Azure Active Directory* and select the matching service entry. |
| 37 | +1. Browse to **Security** > **Conditional Access**. |
| 38 | +1. Select **New policy** > **Create new policy**. |
| 39 | +1. Give your policy a name. We recommend that organizations create a meaningful standard for the names of their policies. |
| 40 | +1. Under **Assignments**, select **Users or workload entities**. |
| 41 | +1. Under the **Include** tab, select **Select users and groups** and tick **Users and groups**. On the right, search for and choose the group that contains your Azure Virtual Desktop users as group members. |
| 42 | +1. Select **Select**. |
| 43 | +1. Under **Assignments**, select **Cloud apps or actions**. |
| 44 | +1. Under the **Include** tab, select **Select apps**. |
| 45 | +1. On the right, select one of the following apps based on which version of Azure Virtual Desktop you're using. |
45 | 46 |
|
46 |
| - - If you're using Azure Virtual Desktop (classic), choose these apps: |
47 |
| - |
48 |
| - - **Windows Virtual Desktop** (App ID 5a0aa725-4958-4b0c-80a9-34562e23f3b7) |
49 |
| - - **Windows Virtual Desktop Client** (App ID fa4345a4-a730-4230-84a8-7d9651b86739), which will let you set policies on the web client |
| 47 | + - If you're using Azure Virtual Desktop (based on Azure Resource Manager), choose this app: |
50 | 48 |
|
51 |
| - After that, skip ahead to step 11. |
| 49 | + - **Azure Virtual Desktop** (app ID 9cdead84-a844-4324-93f2-b2e6bb768d07) |
52 | 50 |
|
53 |
| - - If you're using Azure Virtual Desktop, choose this app instead: |
| 51 | + > [!TIP] |
| 52 | + > The app name was previously *Windows Virtual Desktop*. If you registered the *Microsoft.DesktopVirtualization* resource provider before the display name changed, the application will be named **Windows Virtual Desktop** with the same app ID as above. |
| 53 | +
|
| 54 | + After that, go to step 10. |
| 55 | + |
| 56 | + - If you're using Azure Virtual Desktop (classic), choose these apps: |
54 | 57 |
|
55 |
| - - **Azure Virtual Desktop** (App ID 9cdead84-a844-4324-93f2-b2e6bb768d07) |
| 58 | + - **Windows Virtual Desktop** (app ID 5a0aa725-4958-4b0c-80a9-34562e23f3b7) |
| 59 | + - **Windows Virtual Desktop Client** (app ID fa4345a4-a730-4230-84a8-7d9651b86739), which will let you set policies on the web client |
56 | 60 |
|
57 |
| - After that, go to step 10. |
| 61 | + > [!TIP] |
| 62 | + > If you're using Azure Virtual Desktop (classic) and if the Conditional Access policy blocks all access excluding Azure Virtual Desktop app IDs, you can fix this by also adding the **Azure Virtual Desktop** (app ID 9cdead84-a844-4324-93f2-b2e6bb768d07) to the policy. Not adding this app ID will block feed discovery of Azure Virtual Desktop (classic) resources. |
58 | 63 |
|
59 |
| - >[!IMPORTANT] |
60 |
| - > Don't select the app called Azure Virtual Desktop Azure Resource Manager Provider (50e95039-b200-4007-bc97-8d5790743a63). This app is only used for retrieving the user feed and shouldn't have multifactor authentication. |
61 |
| - > |
62 |
| - > If you're using Azure Virtual Desktop (classic), if the Conditional Access policy blocks all access and only excludes Azure Virtual Desktop app IDs, you can fix this by adding the app ID 9cdead84-a844-4324-93f2-b2e6bb768d07 to the policy. Not adding this app ID will block feed discovery of Azure Virtual Desktop (classic) resources. |
| 64 | + After that, skip ahead to step 11. |
63 | 65 |
|
64 |
| -10. Once you've selected your app, choose **Select**, and then select **Done**. |
| 66 | + > [!IMPORTANT] |
| 67 | + > Don't select the app called Azure Virtual Desktop Azure Resource Manager Provider (app ID 50e95039-b200-4007-bc97-8d5790743a63). This app is only used for retrieving the user feed and shouldn't have multi-factor authentication. |
65 | 68 |
|
66 |
| - > [!div class="mx-imgBorder"] |
67 |
| - >  |
| 69 | +1. Once you've selected your app, select **Select**. |
68 | 70 |
|
69 |
| - >[!NOTE] |
70 |
| - >To find the App ID of the app you want to select, go to **Enterprise Applications** and select **Microsoft Applications** from the application type drop-down menu. |
71 |
| - |
72 |
| -11. Go to **Conditions** > **Client apps**. In **Configure**, select **Yes**, and then select where to apply the policy: |
| 71 | + > [!div class="mx-imgBorder"] |
| 72 | + >  |
73 | 73 |
|
| 74 | +1. Under **Assignments**, select **Conditions** > **Client apps**. On the right, for **Configure**, select **Yes**, and then select the client apps this policy will apply to: |
| 75 | + |
| 76 | + - Select both check boxes if you want to apply the policy to all clients. |
74 | 77 | - Select **Browser** if you want the policy to apply to the web client.
|
75 | 78 | - Select **Mobile apps and desktop clients** if you want to apply the policy to other clients.
|
76 |
| - - Select both check boxes if you want to apply the policy to all clients. |
| 79 | + - Deselect values for legacy authentication clients. |
77 | 80 |
|
78 | 81 | > [!div class="mx-imgBorder"]
|
79 |
| - >  |
| 82 | + >  |
| 83 | +
|
| 84 | +1. Once you've selected the client apps this policy will apply to, select **Done**. |
| 85 | +1. Under **Assignments**, select **Access controls** > **Grant**, select **Grant access**, **Require multi-factor authentication**, and then select **Select**. |
| 86 | +1. At the bottom of the page, set **Enable policy** to **On** and select **Create**. |
| 87 | + |
| 88 | +> [!NOTE] |
| 89 | +> When you use the web client to sign in to Azure Virtual Desktop through your browser, the log will list the client app ID as a85cf173-4192-42f8-81fa-777a763e6e2c (Azure Virtual Desktop client). This is because the client app is internally linked to the server app ID where the conditional access policy was set. |
| 90 | +
|
| 91 | +> [!TIP] |
| 92 | +> Some users may see a prompt titled *Stay signed in to all your apps* if the Windows device they're using is not already registered with Azure AD. If they deselect **Allow my organization to manage my device** and select **No, sign in to this app only**, this may reappear frequently. |
| 93 | +
|
| 94 | +## Configure sign-in frequency |
| 95 | + |
| 96 | +To optionally configure the time period before a user is asked to sign-in again: |
| 97 | + |
| 98 | +1. Open the policy you created previously. |
| 99 | +1. Under **Assignments**, select **Access controls** > **Session**. On the right, select **Sign-in frequency**. Set the value for the time period before a user is asked to sign-in again, and then select **Select**. For example, setting the value to **1** and the unit to **Hours**, will require multi-factor authentication if a connection is launched over an hour after the last one. |
| 100 | +1. At the bottom of the page, under **Enable policy** select **Save**. |
80 | 101 |
|
81 |
| -12. Under **Access controls** > **Grant**, select **Grant access**, **Require multi-factor authentication**, and then **Select**. |
82 |
| -13. Under **Access controls** > **Session**, select **Sign-in frequency**, set the value to the time you want between prompts, and then select **Select**. For example, setting the value to **1** and the unit to **Hours**, will require multifactor authentication if a connection is launched an hour after the last one. |
83 |
| -14. Confirm your settings and set **Enable policy** to **On**. |
84 |
| -15. Select **Create** to enable your policy. |
| 102 | +## Azure AD joined session host VMs |
85 | 103 |
|
86 |
| ->[!NOTE] |
87 |
| ->When you use the web client to sign in to Azure Virtual Desktop through your browser, the log will list the client app ID as a85cf173-4192-42f8-81fa-777a763e6e2c (Azure Virtual Desktop client). This is because the client app is internally linked to the server app ID where the conditional access policy was set. |
| 104 | +For connections to succeed, you must [disable the legacy per-user multi-factor authentication sign-in method](../active-directory/devices/howto-vm-sign-in-azure-ad-windows.md#mfa-sign-in-method-required). If you don't want to restrict signing in to strong authentication methods like Windows Hello for Business, you'll also need to [exclude the Azure Windows VM Sign-In app](../active-directory/devices/howto-vm-sign-in-azure-ad-windows.md#mfa-sign-in-method-required) from your Conditional Access policy. |
88 | 105 |
|
89 | 106 | ## Next steps
|
90 | 107 |
|
|
0 commit comments