You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
title: Set up Azure multi-factor authentication for Windows Virtual Desktop - Azure
3
-
description: How to set up Azure multi-factor authentication for increased security in Windows Virtual Desktop.
2
+
title: Set up Azure Multi-Factor Authentication for Windows Virtual Desktop - Azure
3
+
description: How to set up Azure Multi-Factor Authentication for increased security in Windows Virtual Desktop.
4
4
services: virtual-desktop
5
5
author: Heidilohr
6
6
7
7
ms.service: virtual-desktop
8
8
ms.topic: conceptual
9
-
ms.date: 04/01/2020
9
+
ms.date: 04/22/2020
10
10
ms.author: helohr
11
11
manager: lizross
12
12
---
13
-
14
-
# Set up Azure Multi-Factor Authentication
13
+
# Enable Azure Multi-Factor Authentication for Windows Virtual Desktop
15
14
16
15
The Windows client for Windows Virtual Desktop is an excellent option for integrating Windows Virtual Desktop with your local machine. However, when you configure your Windows Virtual Desktop account into the Windows Client, there are certain measures you'll need to take to keep yourself and your users safe.
17
16
@@ -23,71 +22,34 @@ While remembering credentials is convenient, it can also make deployments on Ent
23
22
24
23
Here's what you'll need to get started:
25
24
26
-
- Assign all your users one of the following licenses:
27
-
- Microsoft 365 E3 or E5
28
-
- Azure Active Directory Premium P1 or P2
29
-
- Enterprise Mobility + Security E3 or E5
25
+
- Assign users a license that includes Azure Active Directory Premium P1 or P2.
30
26
- An Azure Active Directory group with your users assigned as group members.
31
27
- Enable Azure MFA for all your users. For more information about how to do that, see [How to require two-step verification for a user](../active-directory/authentication/howto-mfa-userstates.md#view-the-status-for-a-user).
32
28
33
-
>[!NOTE]
34
-
>The following setting also applies to the [Windows Virtual Desktop web client](https://rdweb.wvd.microsoft.com/webclient/index.html).
35
-
36
-
## Opt in to the Conditional Access policy
37
-
38
-
1. Open **Azure Active Directory**.
39
-
40
-
2. Go to the **All applications** tab. In the "Application type" drop-down menu, select **Enterprise Applications**, then search for **Windows Virtual Desktop Client**.
41
-
42
-

43
-
44
-
3. Select **Conditional Access**.
45
-
46
-

47
-
48
-
4. Select **+ New policy**.
49
-
50
-

51
-
52
-
5. Enter a **name** for the **rule**, then **select** the *name of the **group** you created in the prerequisites.
53
-
54
-
6. Select **Select**, then select **Done**.
55
-
56
-
7. Next, open **Cloud Apps or actions**.
57
-
58
-
8. On the **Select** panel, select the **Windows Virtual Desktop** Enterprise app.
59
-
60
-

61
-
62
-
>[!NOTE]
63
-
>You should also see the Windows Virtual Desktop Client app selected on the left side of the screen, as shown in the following image. You need both the Windows Virtual Desktop and Windows Virtual Desktop Client Enterprise apps for the policy to work.
64
-
>
65
-
> 
66
-
67
-
9. Select **Select**
68
-
69
-
10. Next, open **Grant**
70
-
71
-
11. Select **Require multi-factor authentication**, then select **Require one of the selected controls**.
72
-
73
-

74
-
75
-
>[!NOTE]
76
-
>If you have MDM-enrolled devices in your organization and don't want them to show the MFA prompt, you can also select **Require device to be marked as compliant**.
29
+
> [!NOTE]
30
+
> The following setting also applies to the [Windows Virtual Desktop web client](https://rdweb.wvd.microsoft.com/webclient/index.html).
77
31
78
-
12. Select **Session**.
32
+
## Create a Conditional Access policy
79
33
80
-
13. Set the **Sign-in frequency**to **Active**, then change its value to **1 Hours**.
34
+
This section will show you how to create a Conditional Access policy that requires multi-factor authentication when connecting to Windows Virtual Desktop.
81
35
82
-

83
-
84
-
>[!NOTE]
85
-
>Active sessions in your Windows Virtual Desktop environment will continue to work as you change the policy. However, if you disconnect or sign off, you'll need to provide your credentials again after 60 minutes. As you change the settings, you can extend the timeout period as much as you want (as long as it aligns with your organization's security policy).
86
-
>
87
-
>The default setting is a rolling window of 90 days, which means the client will ask users to sign in again when they try to access a resource after being inactive on their machine for 90 days or longer.
36
+
1. Sign in to the **Azure portal** as a global administrator, security administrator, or Conditional Access administrator.
37
+
1. Browse to **Azure Active Directory** > **Security** > **Conditional Access**.
38
+
1. Select **New policy**.
39
+
1. Give your policy a name. We recommend that organizations create a meaningful standard for the names of their policies.
40
+
1. Under **Assignments**, select **Users and groups**.
41
+
1. Under **Include**, select **Select users and groups** > **Users and groups** > Choose the group created in the prerequisites stage.
42
+
1. Select **Done**.
43
+
1. Under **Cloud apps or actions** > **Include**, select **Select apps**.
44
+
1. Choose **Windows Virtual Desktop** and **Windows Virtual Desktop Client**, and select **Select** then **Done**.
45
+

46
+
1. Under **Access controls** > **Grant**, select **Grant access**, **Require multi-factor authentication**, and then **Select**.
47
+
1. Under **Access controls** > **Session**, select **Sign-in frequency**, set the value to **1** and the unit to **Hours**, and then **Select**.
48
+
1. Confirm your settings and set **Enable policy** to **On**.
49
+
1. Select **Create** to enable your policy.
88
50
89
-
14. Enable the policy.
51
+
## Next steps
90
52
91
-
15. Select **Create** to confirm the policy.
53
+
-[Learn more about Conditional Access policies](../active-directory/conditional-access/concept-conditional-access-policies.md)
92
54
93
-
You're all done! Feel free to test the policy to make sure your allow list works as intended.
55
+
-[Learn more about user sign in frequency](../active-directory/conditional-access/howto-conditional-access-session-lifetime.md#user-sign-in-frequency)
0 commit comments