Skip to content

Commit b2c0b07

Browse files
committed
Added mention of preview and new scope.
1 parent 795a21f commit b2c0b07

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

articles/virtual-desktop/set-up-mfa.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Enforce Microsoft Entra multifactor authentication for Azure Virtual Desk
33
description: How to enforce Microsoft Entra multifactor authentication for Azure Virtual Desktop using Conditional Access to help make it more secure.
44
author: Heidilohr
55
ms.topic: how-to
6-
ms.date: 02/12/2024
6+
ms.date: 03/05/2024
77
ms.author: helohr
88
---
99

@@ -103,7 +103,7 @@ Here's how to create a Conditional Access policy that requires multifactor authe
103103
104104
## Configure sign-in frequency
105105

106-
Sign-in frequency policies enable you to choose the time period before a user must prove their identity again when accessing Microsoft Entra-based resources. This can help secure your environment and is especially important for personal devices, where the local OS may not require MFA or may not lock automatically after inactivity.
106+
Sign-in frequency policies let you set the time period after which a user must prove their identity again when accessing Microsoft Entra-based resources. This can help secure your environment and is especially important for personal devices, where the local OS may not require MFA or may not lock automatically after inactivity.
107107

108108
Sign-in frequency policies result in different behavior based on the Microsoft Entra app selected:
109109

@@ -112,15 +112,15 @@ Sign-in frequency policies result in different behavior based on the Microsoft E
112112
| **Azure Virtual Desktop** | 9cdead84-a844-4324-93f2-b2e6bb768d07 | Enforces re-authentication when a user subscribes to Azure Virtual Desktop, manually refreshes their list of resources and authenticates to the Azure Virtual Desktop Gateway during a connection.<br /><br />Once the re-authentication period has passed, background feed refresh and diagnostics upload silently fails until a user completes their next interactive sign in to Microsoft Entra. |
113113
| **Microsoft Remote Desktop**<br /><br />**Windows Cloud Login** | a4a365df-50f1-4397-bc59-1a1564b8bb9c<br /><br />270efc09-cd0d-444b-a71f-39af4910ec45 | Enforces re-authentication when a user signs in to a session host when [single sign-on](configure-single-sign-on.md) is enabled.<br /><br />Both apps should be configured together as the Azure Virtual Desktop clients will soon switch from using the Microsoft Remote Desktop app to the Windows Cloud Login app to authenticate to the session host. |
114114

115-
To configure the time period before a user is asked to sign-in again:
115+
To configure the time period after which a user is asked to sign-in again:
116116

117117
1. Open the policy you created previously.
118118
1. Under **Access controls** > **Session**, select **0 controls selected**.
119-
1. On the new pane that opens, select **Sign-in frequency**.
119+
1. In the **Session** pane, select **Sign-in frequency**.
120120
1. Select **Periodic reauthentication** or **Every time**.
121-
- If you select **Periodic reauthentication**, set the value for the time period before a user is asked to sign-in again, and then select **Select**. For example, setting the value to **1** and the unit to **Hours**, requires multifactor authentication if a connection is launched over an hour after the last one.
122-
- If you select **Every time**, users are prompted to re-authenticate after a period of 10 to 15 minutes since the last time they authenticated.
123-
1. At the bottom of the page, under **Enable policy** select **Save**.
121+
- If you select **Periodic reauthentication**, set the value for the time period after which a user is asked to sign-in again, and then select **Select**. For example, setting the value to **1** and the unit to **Hours**, requires multifactor authentication if a connection is launched more than an hour after the last one.
122+
- The **Every time** option is currently available in public preview and is only supported when applied to the **Microsoft Remote Desktop** and **Windows Cloud Login** apps when single sign-on is enabled for your host pool. If you select **Every time**, users are prompted to re-authenticate after a period of 5 to 15 minutes after the last time they authenticated for the Microsoft Remote Desktop and Windows Cloud Login apps.
123+
1. At the bottom of the page, select **Save**.
124124

125125
> [!NOTE]
126126
> - Re-authentication only happens when a user must authenticate to a resource. Once a connection is established, users aren't prompted even if the connection lasts longer than the sign-in frequency you've configured.

0 commit comments

Comments
 (0)