Skip to content

Commit 2f19424

Browse files
committed
AVD MFA conditional access add drop-down selection
1 parent f6f4fbb commit 2f19424

File tree

1 file changed

+13
-14
lines changed

1 file changed

+13
-14
lines changed

articles/virtual-desktop/set-up-mfa.md

Lines changed: 13 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Enforce Microsoft Entra multifactor authentication for Azure Virtual Desk
33
description: How to enforce Microsoft Entra multifactor authentication for Azure Virtual Desktop using Conditional Access to help make it more secure.
44
author: dknappettmsft
55
ms.topic: how-to
6-
ms.date: 07/26/2024
6+
ms.date: 12/11/2024
77
ms.author: daknappe
88
ms.custom: docs_inherited
99
---
@@ -43,38 +43,37 @@ Here's how to create a Conditional Access policy that requires multifactor authe
4343
1. Under the **Include** tab, select **Select users and groups** and check **Users and groups**, then under **Select**, select **0 users and groups selected**.
4444
1. On the new pane that opens, search for and choose the group that contains your Azure Virtual Desktop users as group members, then select **Select**.
4545
1. Under **Assignments** > **Target resources**, select **No target resources selected**.
46-
1. Under the **Include** tab, select **Select apps**, then under **Select**, select **None**.
46+
1. For the drop-down list **Select what this policy applies to**, leave the default of **Resources (formerly cloud apps)**. Under the **Include** tab, select **Select resources**, then under **Select**, select **None**.
4747
1. On the new pane that opens, search for and select the necessary apps based on the resources you're trying to protect. Select the relevant tab for your scenario. When searching for an application name on Azure, use search terms that begin with the application name in order instead of keywords the application name contains out of order. For example, when you want to use Azure Virtual Desktop, you need to enter '*Azure Virtual*', in that order. If you enter '*virtual*' by itself, the search doesn't return the desired application.
4848

4949
# [Azure Virtual Desktop](#tab/avd)
5050

5151
For Azure Virtual Desktop (based on Azure Resource Manager), you can configure MFA on these different apps:
5252

53-
- **Azure Virtual Desktop** (app ID 9cdead84-a844-4324-93f2-b2e6bb768d07), which applies when the user subscribes to Azure Virtual Desktop, authenticates to the Azure Virtual Desktop Gateway during a connection, and when diagnostics information is sent to the service from the user's local device.
53+
- **Azure Virtual Desktop** (app ID `9cdead84-a844-4324-93f2-b2e6bb768d07`), which applies when the user subscribes to Azure Virtual Desktop, authenticates to the Azure Virtual Desktop Gateway during a connection, and when diagnostics information is sent to the service from the user's local device.
5454

55-
> [!TIP]
56-
> The app name was previously *Windows Virtual Desktop*. If you registered the *Microsoft.DesktopVirtualization* resource provider before the display name changed, the application will be named **Windows Virtual Desktop** with the same app ID as Azure Virtual Desktop.
55+
> [!TIP]
56+
> The app name was previously *Windows Virtual Desktop*. If you registered the *Microsoft.DesktopVirtualization* resource provider before the display name changed, the application will be named **Windows Virtual Desktop** with the same app ID as Azure Virtual Desktop.
5757
58-
- **Microsoft Remote Desktop** (app ID a4a365df-50f1-4397-bc59-1a1564b8bb9c) and **Windows Cloud Login** (app ID 270efc09-cd0d-444b-a71f-39af4910ec45). These apply when the user authenticates to the session host when [single sign-on](configure-single-sign-on.md) is enabled. It's recommended to match conditional access policies between these apps and the Azure Virtual Desktop app, except for the [sign-in frequency](#configure-sign-in-frequency).
58+
- **Microsoft Remote Desktop** (app ID `a4a365df-50f1-4397-bc59-1a1564b8bb9c`) and **Windows Cloud Login** (app ID `270efc09-cd0d-444b-a71f-39af4910ec45`). These apply when the user authenticates to the session host when [single sign-on](configure-single-sign-on.md) is enabled. We recommended you match conditional access policies between these apps and the Azure Virtual Desktop app, except for the [sign-in frequency](#configure-sign-in-frequency).
5959

6060
> [!IMPORTANT]
61-
> The clients used to access Azure Virtual Desktop use the **Microsoft Remote Desktop** Entra ID app to authenticate to the session host today. An upcoming change will transition the authentication to the **Windows Cloud Login** Entra ID app. To ensure a smooth transition, you need to add both Entra ID apps to your CA policies.
62-
63-
> [!IMPORTANT]
64-
> Don't select the app called Azure Virtual Desktop Azure Resource Manager Provider (app ID 50e95039-b200-4007-bc97-8d5790743a63). This app is only used for retrieving the user feed and shouldn't have multifactor authentication.
61+
> - The clients used to access Azure Virtual Desktop use the **Microsoft Remote Desktop** Entra ID app to authenticate to the session host today. An upcoming change will transition the authentication to the **Windows Cloud Login** Entra ID app. To ensure a smooth transition, you need to add both Entra ID apps to your CA policies.
62+
>
63+
> - Don't select the app called Azure Virtual Desktop Azure Resource Manager Provider (app ID `50e95039-b200-4007-bc97-8d5790743a63`). This app is only used for retrieving the user feed and shouldn't have multifactor authentication.
6564
6665
# [Azure Virtual Desktop (classic)](#tab/avd-classic)
6766

6867
For Azure Virtual Desktop (classic), you configure MFA on these apps:
6968

70-
- **Windows Virtual Desktop** (app ID 5a0aa725-4958-4b0c-80a9-34562e23f3b7).
69+
- **Windows Virtual Desktop** (app ID `5a0aa725-4958-4b0c-80a9-34562e23f3b7`).
7170

72-
- **Windows Virtual Desktop Client** (app ID fa4345a4-a730-4230-84a8-7d9651b86739), which lets you set policies on the web client.
71+
- **Windows Virtual Desktop Client** (app ID `fa4345a4-a730-4230-84a8-7d9651b86739`), which lets you set policies on the web client.
7372

74-
- **Azure Virtual Desktop/Windows Virtual Desktop** (app ID 9cdead84-a844-4324-93f2-b2e6bb768d07). Not adding this app ID blocks feed discovery of Azure Virtual Desktop (classic) resources.
73+
- **Azure Virtual Desktop/Windows Virtual Desktop** (app ID `9cdead84-a844-4324-93f2-b2e6bb768d07`). Not adding this app ID blocks feed discovery of Azure Virtual Desktop (classic) resources.
7574

7675
> [!IMPORTANT]
77-
> Don't select the app called Azure Virtual Desktop Azure Resource Manager Provider (app ID 50e95039-b200-4007-bc97-8d5790743a63). This app is only used for retrieving the user feed and shouldn't have multifactor authentication.
76+
> Don't select the app called Azure Virtual Desktop Azure Resource Manager Provider (app ID `50e95039-b200-4007-bc97-8d5790743a63`). This app is only used for retrieving the user feed and shouldn't have multifactor authentication.
7877
7978
1. Once you selected your apps, select **Select**.
8079

0 commit comments

Comments
 (0)