Skip to content

Commit 2120dca

Browse files
authored
Update bastion-faq.md
added new question for jit policy
1 parent 8915b7f commit 2120dca

File tree

1 file changed

+4
-0
lines changed

1 file changed

+4
-0
lines changed

articles/bastion/bastion-faq.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -237,6 +237,10 @@ Make sure the user has **read** access to both the VM, and the peered VNet. Addi
237237
|Microsoft.Network/virtualNetworks/subnets/virtualMachines/read|Gets references to all the virtual machines in a virtual network subnet|Action|
238238
|Microsoft.Network/virtualNetworks/virtualMachines/read|Gets references to all the virtual machines in a virtual network|Action|
239239

240+
### I am connecting to a VM using a JIT policy, do I need additional permissions?
241+
242+
If user is connecting to a VM using a JIT policy, there is no additional permissions needed. For more information on connecting to a VM using a JIT policy, see [Enable just-in-time access on VMs](./defender-for-cloud/just-in-time-access-usage.md)
243+
240244
### My privatelink.azure.com can't resolve to management.privatelink.azure.com
241245

242246
This may be due to the Private DNS zone for privatelink.azure.com linked to the Bastion virtual network causing management.azure.com CNAMEs to resolve to management.privatelink.azure.com behind the scenes. Create a CNAME record in their privatelink.azure.com zone for management.privatelink.azure.com to arm-frontdoor-prod.trafficmanager.net to enable successful DNS resolution.

0 commit comments

Comments
 (0)