Skip to content

Commit 9cbe64a

Browse files
Merge pull request #111901 from MicrosoftGuyJFlo/WVDEdit
[Windows Virtual Desktop] - Conditional Access require MFA
2 parents 5e1b25a + df0d592 commit 9cbe64a

File tree

1 file changed

+26
-64
lines changed

1 file changed

+26
-64
lines changed
Lines changed: 26 additions & 64 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,16 @@
11
---
2-
title: Set up Azure multi-factor authentication for Windows Virtual Desktop - Azure
3-
description: How to set up Azure multi-factor authentication for increased security in Windows Virtual Desktop.
2+
title: Set up Azure Multi-Factor Authentication for Windows Virtual Desktop - Azure
3+
description: How to set up Azure Multi-Factor Authentication for increased security in Windows Virtual Desktop.
44
services: virtual-desktop
55
author: Heidilohr
66

77
ms.service: virtual-desktop
88
ms.topic: conceptual
9-
ms.date: 04/01/2020
9+
ms.date: 04/22/2020
1010
ms.author: helohr
1111
manager: lizross
1212
---
13-
14-
# Set up Azure Multi-Factor Authentication
13+
# Enable Azure Multi-Factor Authentication for Windows Virtual Desktop
1514

1615
The Windows client for Windows Virtual Desktop is an excellent option for integrating Windows Virtual Desktop with your local machine. However, when you configure your Windows Virtual Desktop account into the Windows Client, there are certain measures you'll need to take to keep yourself and your users safe.
1716

@@ -23,71 +22,34 @@ While remembering credentials is convenient, it can also make deployments on Ent
2322

2423
Here's what you'll need to get started:
2524

26-
- Assign all your users one of the following licenses:
27-
- Microsoft 365 E3 or E5
28-
- Azure Active Directory Premium P1 or P2
29-
- Enterprise Mobility + Security E3 or E5
25+
- Assign users a license that includes Azure Active Directory Premium P1 or P2.
3026
- An Azure Active Directory group with your users assigned as group members.
3127
- Enable Azure MFA for all your users. For more information about how to do that, see [How to require two-step verification for a user](../active-directory/authentication/howto-mfa-userstates.md#view-the-status-for-a-user).
3228

33-
>[!NOTE]
34-
>The following setting also applies to the [Windows Virtual Desktop web client](https://rdweb.wvd.microsoft.com/webclient/index.html).
35-
36-
## Opt in to the Conditional Access policy
37-
38-
1. Open **Azure Active Directory**.
39-
40-
2. Go to the **All applications** tab. In the "Application type" drop-down menu, select **Enterprise Applications**, then search for **Windows Virtual Desktop Client**.
41-
42-
![A screenshot of the All applications tab. The user entered "windows virtual desktop client" into the search bar, and the app has shown up in the search results.](media/all-applications-search.png)
43-
44-
3. Select **Conditional Access**.
45-
46-
![A screenshot showing the user hovering their mouse cursor over the Conditional Access tab.](media/conditional-access-location.png)
47-
48-
4. Select **+ New policy**.
49-
50-
![A screenshot of the Conditional Access page. The user is hovering their mouse cursor over the new policy button.](media/new-policy-button.png)
51-
52-
5. Enter a **name** for the **rule**, then **select** the *name of the **group** you created in the prerequisites.
53-
54-
6. Select **Select**, then select **Done**.
55-
56-
7. Next, open **Cloud Apps or actions**.
57-
58-
8. On the **Select** panel, select the **Windows Virtual Desktop** Enterprise app.
59-
60-
![A screenshot of the Cloud apps or actions page. The user has selected the Windows Virtual Desktop app by selecting the check mark next to it. The selected app is highlighted in red.](media/cloud-apps-select.png)
61-
62-
>[!NOTE]
63-
>You should also see the Windows Virtual Desktop Client app selected on the left side of the screen, as shown in the following image. You need both the Windows Virtual Desktop and Windows Virtual Desktop Client Enterprise apps for the policy to work.
64-
>
65-
> ![A screenshot of the Cloud apps or actions page. The Windows Virtual Desktop and Windows Virtual Desktop Client apps are highlighted in red.](media/cloud-apps-enterprise-selected.png)
66-
67-
9. Select **Select**
68-
69-
10. Next, open **Grant**
70-
71-
11. Select **Require multi-factor authentication**, then select **Require one of the selected controls**.
72-
73-
![A screenshot of the Grant page. "Require multi-factor authentication" is selected.](media/grant-page.png)
74-
75-
>[!NOTE]
76-
>If you have MDM-enrolled devices in your organization and don't want them to show the MFA prompt, you can also select **Require device to be marked as compliant**.
29+
> [!NOTE]
30+
> The following setting also applies to the [Windows Virtual Desktop web client](https://rdweb.wvd.microsoft.com/webclient/index.html).
7731
78-
12. Select **Session**.
32+
## Create a Conditional Access policy
7933

80-
13. Set the **Sign-in frequency** to **Active**, then change its value to **1 Hours**.
34+
This section will show you how to create a Conditional Access policy that requires multi-factor authentication when connecting to Windows Virtual Desktop.
8135

82-
![A screenshot of the Session page. The session menu shows the sign-in frequency drop-down menus have been changed to "1" and "Hours."](media/sign-in-frequency.png)
83-
84-
>[!NOTE]
85-
>Active sessions in your Windows Virtual Desktop environment will continue to work as you change the policy. However, if you disconnect or sign off, you'll need to provide your credentials again after 60 minutes. As you change the settings, you can extend the timeout period as much as you want (as long as it aligns with your organization's security policy).
86-
>
87-
>The default setting is a rolling window of 90 days, which means the client will ask users to sign in again when they try to access a resource after being inactive on their machine for 90 days or longer.
36+
1. Sign in to the **Azure portal** as a global administrator, security administrator, or Conditional Access administrator.
37+
1. Browse to **Azure Active Directory** > **Security** > **Conditional Access**.
38+
1. Select **New policy**.
39+
1. Give your policy a name. We recommend that organizations create a meaningful standard for the names of their policies.
40+
1. Under **Assignments**, select **Users and groups**.
41+
1. Under **Include**, select **Select users and groups** > **Users and groups** > Choose the group created in the prerequisites stage.
42+
1. Select **Done**.
43+
1. Under **Cloud apps or actions** > **Include**, select **Select apps**.
44+
1. Choose **Windows Virtual Desktop** and **Windows Virtual Desktop Client**, and select **Select** then **Done**.
45+
![A screenshot of the Cloud apps or actions page. The Windows Virtual Desktop and Windows Virtual Desktop Client apps are highlighted in red.](media/cloud-apps-enterprise-selected.png)
46+
1. Under **Access controls** > **Grant**, select **Grant access**, **Require multi-factor authentication**, and then **Select**.
47+
1. Under **Access controls** > **Session**, select **Sign-in frequency**, set the value to **1** and the unit to **Hours**, and then **Select**.
48+
1. Confirm your settings and set **Enable policy** to **On**.
49+
1. Select **Create** to enable your policy.
8850

89-
14. Enable the policy.
51+
## Next steps
9052

91-
15. Select **Create** to confirm the policy.
53+
- [Learn more about Conditional Access policies](../active-directory/conditional-access/concept-conditional-access-policies.md)
9254

93-
You're all done! Feel free to test the policy to make sure your allow list works as intended.
55+
- [Learn more about user sign in frequency](../active-directory/conditional-access/howto-conditional-access-session-lifetime.md#user-sign-in-frequency)

0 commit comments

Comments
 (0)