Skip to content

Commit 5429c56

Browse files
Merge pull request #263318 from aatsang/patch-1
Update bastion-faq.md
2 parents c6c0eda + cee6620 commit 5429c56

File tree

1 file changed

+4
-0
lines changed

1 file changed

+4
-0
lines changed

articles/bastion/bastion-faq.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -241,6 +241,10 @@ Make sure the user has **read** access to both the VM, and the peered VNet. Addi
241241
|Microsoft.Network/virtualNetworks/subnets/virtualMachines/read|Gets references to all the virtual machines in a virtual network subnet|Action|
242242
|Microsoft.Network/virtualNetworks/virtualMachines/read|Gets references to all the virtual machines in a virtual network|Action|
243243

244+
### I am connecting to a VM using a JIT policy, do I need additional permissions?
245+
246+
If user is connecting to a VM using a JIT policy, there is no additional permissions needed. For more information on connecting to a VM using a JIT policy, see [Enable just-in-time access on VMs](../defender-for-cloud/just-in-time-access-usage.md)
247+
244248
### My privatelink.azure.com can't resolve to management.privatelink.azure.com
245249

246250
This may be due to the Private DNS zone for privatelink.azure.com linked to the Bastion virtual network causing management.azure.com CNAMEs to resolve to management.privatelink.azure.com behind the scenes. Create a CNAME record in their privatelink.azure.com zone for management.privatelink.azure.com to arm-frontdoor-prod.trafficmanager.net to enable successful DNS resolution.

0 commit comments

Comments
 (0)