You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/virtual-desktop/virtual-desktop-fall-2019/manage-resources-using-ui-powershell.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -143,11 +143,11 @@ To verify the Microsoft Entra application configuration and provide consent:
143
143
3. Select **All applications** and search the unique app name you provided for the PowerShell script in [Create a Microsoft Entra app registration](#create-an-azure-active-directory-app-registration).
144
144
4. In the panel on the left side of the browser, select **Authentication** and make sure the redirect URI is the same as the web app URL for the management tool, as shown in the following image.
145
145
146
-
:::image type="content" source="../media/management-ui-redirect-uri-inline.png" alt-text="Screenshot of the Configure Web page on the Authentication tab for an app registration."
146
+
:::image type="content" source="../media/management-ui-redirect-uri-inline.png" alt-text="Screenshot of the Configure Web page on the Authentication tab for an app registration.":::
147
147
148
-
5. In the left panel, select **API permissions** to confirm that permissions were added. If you're a global admin, select the **Grant admin consent for `tenantname`** button and follow the dialog prompts to provide admin consent for your organization.
148
+
5. In the left panel, select **API permissions** to confirm that permissions were added. If you're providing admin consent for all users, select the **Grant admin consent for `tenantname`** button and follow the dialog prompts.
149
149
150
-
:::image type="content" source="../media/management-ui-permissions-inline.png" alt-text="Screenshot of the API permissions page for an app registration that highlights the option to grant admin consent for Contoso." lightbox="../media/management-ui-permissions-expanded.png"
150
+
:::image type="content" source="../media/management-ui-permissions-inline.png" alt-text="Screenshot of the API permissions page for an app registration that highlights the option to grant admin consent for Contoso." lightbox="../media/management-ui-permissions-expanded.png":::
Copy file name to clipboardExpand all lines: articles/virtual-desktop/virtual-desktop-fall-2019/manage-resources-using-ui.md
+2-3Lines changed: 2 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -72,14 +72,13 @@ To determine which user you can use to sign in to the tool, go to your [Microsof
72
72
:::image type="content" source="../media/management-ui-user-consent-allowed-inline.png" alt-text="A screenshot showing if users can grant consent to applications for just their user." lightbox="../media/management-ui-user-consent-allowed-expanded.png":::
73
73
74
74
- If the value is set to **Yes**, you can sign in with any user account in the Microsoft Entra ID and provide consent for that user only. However, if you sign in to the management tool with a different user later, you must perform the same consent again.
75
-
- If the value is set to **No**, you must sign in as a Global Administrator in the Microsoft Entra ID and provide admin consent for all users in the directory. No other users will face a consent prompt.
76
-
75
+
- If the value is set to **No**, you must sign in using an account with the required permissions to provide consent for all users in the tenant. No other users will face a consent prompt. For more information, see [Grant tenant-wide admin consent to an application](/entra/identity/enterprise-apps/grant-admin-consent).
77
76
78
77
Once you decide which user you'll use to provide consent, follow these instructions to provide consent to the tool:
79
78
80
79
1. Go to your Azure resources, select the Azure App Services resource with the name you provided in the template (for example, Apr3UX) and navigate to the URL associated with it; for example, `https://rdmimgmtweb-210520190304.azurewebsites.net`.
81
80
2. Sign in using the appropriate Microsoft Entra user account.
82
-
3. If you authenticated with a Global Administrator, you can now select the checkbox to **Consent on behalf of your organization**. Select **Accept** to provide consent. This will now take you to the management tool.
81
+
3. If you providing consent for all users, you can now select the checkbox to **Consent on behalf of your organization**. Select **Accept** to provide consent. This will now take you to the management tool.
Copy file name to clipboardExpand all lines: articles/virtual-desktop/virtual-desktop-fall-2019/manual-delete.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,7 +19,7 @@ This article describes how to delete Azure Virtual Desktop (classic).
19
19
20
20
Before you begin, make sure you have the following things ready:
21
21
22
-
- A global administrator account within the Microsoft Entra tenant
22
+
- A user administrator account within the Microsoft Entra tenant with permissions to manage your Azure Virtual Desktop (classic) resources.
23
23
24
24
-[Download and import the Azure Virtual Desktop module](/powershell/windows-virtual-desktop/overview/) to use in your PowerShell session if you haven't already
Copy file name to clipboardExpand all lines: articles/virtual-desktop/virtual-desktop-fall-2019/tenant-setup-azure-active-directory.md
+8-10Lines changed: 8 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ ms.custom: docs_inherited
12
12
> [!IMPORTANT]
13
13
> - This content applies to Azure Virtual Desktop (classic), which doesn't support Azure Resource Manager Azure Virtual Desktop objects.
14
14
>
15
-
> -Beginning **September 30 2023**, you will no longer be able to create new Azure Virtual Desktop (classic) tenants. Azure Virtual Desktop (classic) will retire on **September 30, 2026**. You should transition to [Azure Virtual Desktop](../index.yml) before that date. For more information, see [Azure Virtual Desktop (classic) retirement](classic-retirement.md).
15
+
> -You can no longer be able to create new Azure Virtual Desktop (classic) tenants. Azure Virtual Desktop (classic) will retire on **September 30, 2026**. You should transition to [Azure Virtual Desktop](../index.yml) before that date. For more information, see [Azure Virtual Desktop (classic) retirement](classic-retirement.md).
16
16
17
17
Creating a tenant in Azure Virtual Desktop is the first step toward building your desktop virtualization solution. A tenant is a group of one or more host pools. Each host pool consists of multiple session hosts, running as virtual machines in Azure and registered to the Azure Virtual Desktop service. Each host pool also consists of one or more application groups that are used to publish desktop and application resources to users. With a tenant, you can build host pools, create application groups, assign users, and make connections through the service.
18
18
@@ -28,14 +28,12 @@ In this tutorial, learn how to:
28
28
Before you start setting up your Azure Virtual Desktop tenant, make sure you have these things:
29
29
30
30
* The [Microsoft Entra ID](https://azure.microsoft.com/services/active-directory/) tenant ID for Azure Virtual Desktop users.
31
-
* A global administrator account within the Microsoft Entra tenant.
32
-
* This also applies to Cloud Solution Provider (CSP) organizations that are creating an Azure Virtual Desktop tenant for their customers. If you're in a CSP organization, you must be able to sign in as global administrator of the customer's Microsoft Entra instance.
31
+
* A account within the Microsoft Entra tenant with the required permissions to provide admin consent for for an application in the tenant. For more information, see [Grant tenant-wide admin consent to an application](/entra/identity/enterprise-apps/grant-admin-consent).
32
+
* This also applies to Cloud Solution Provider (CSP) organizations that are creating an Azure Virtual Desktop tenant for their customers. If you're in a CSP organization, you must be able to sign in with an appropriate account in the customer's Microsoft Entra instance.
33
33
* The administrator account must be sourced from the Microsoft Entra tenant in which you're trying to create the Azure Virtual Desktop tenant. This process doesn't support Microsoft Entra B2B (guest) accounts.
34
34
* The administrator account must be a work or school account.
35
35
* An Azure subscription.
36
36
37
-
You must have the tenant ID, global administrator account, and Azure subscription ready so that the process described in this tutorial can work properly.
38
-
39
37
## Grant permissions to Azure Virtual Desktop
40
38
41
39
If you have already granted permissions to Azure Virtual Desktop for this Microsoft Entra instance, skip this section.
@@ -51,7 +49,7 @@ To grant the service permissions:
2. Sign in to the Azure Virtual Desktop consent page with a global administrator account. For example, if you were with the Contoso organization, your account might be [email protected] or [email protected].
52
+
2. Sign in to the Azure Virtual Desktop consent page with the appropriate account.
55
53
3. Select **Accept**.
56
54
4. Wait for one minute so Microsoft Entra ID can record consent.
57
55
5. Open a browser and begin the admin consent flow to the [Azure Virtual Desktop client app](https://login.microsoftonline.com/common/adminconsent?client_id=fa4345a4-a730-4230-84a8-7d9651b86739&redirect_uri=https%3A%2F%2Frdweb.wvd.microsoft.com%2FRDWeb%2FConsentCallback).
@@ -61,12 +59,12 @@ To grant the service permissions:
6. Sign in to the Azure Virtual Desktop consent page as global administrator, as you did in step 2.
62
+
6. Sign in to the Azure Virtual Desktop consent page, as you did in step 2.
65
63
7. Select **Accept**.
66
64
67
65
## Assign the TenantCreator application role
68
66
69
-
Assigning a Microsoft Entra user the TenantCreator application role allows that user to create an Azure Virtual Desktop tenant associated with the Microsoft Entra instance. You'll need to use your global administrator account to assign the TenantCreator role.
67
+
Assigning a Microsoft Entra user the `TenantCreator` application role allows that user to create an Azure Virtual Desktop tenant associated with the Microsoft Entra instance.
70
68
71
69
To assign the TenantCreator application role:
72
70
@@ -80,8 +78,8 @@ To assign the TenantCreator application role:
80
78
3. Select **Users and groups**. You might see that the administrator who granted consent to the application is already listed with the **Default Access** role assigned. This is not enough to create an Azure Virtual Desktop tenant. Continue following these instructions to add the **TenantCreator** role to a user.
81
79
82
80
4. Select **Add user**, and then select **Users and groups** in the **Add Assignment** tab.
83
-
5. Search for a user account that will create your Azure Virtual Desktop tenant. For simplicity, this can be the global administrator account.
5. Search for a user account that will create your Azure Virtual Desktop tenant.
82
+
- If you're using a Microsoft Identity Provider like [email protected] or [email protected], you might not be able to sign in to Azure Virtual Desktop.
85
83
86
84
> [!NOTE]
87
85
> You must select a user (or a group that contains a user) that's sourced from this Microsoft Entra instance. You can't choose a guest (B2B) user or a service principal.
0 commit comments