Skip to content

Commit ce1d0ee

Browse files
authored
Merge pull request #188090 from sefriend/svmonc-doc-updates
Updated SVMONC doc to be accurate
2 parents e00ff48 + 66c3dbb commit ce1d0ee

File tree

1 file changed

+11
-11
lines changed

1 file changed

+11
-11
lines changed

articles/virtual-desktop/start-virtual-machine-connect.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -30,14 +30,14 @@ The following Remote Desktop clients support the Start VM on Connect feature:
3030

3131
## Create a custom role for Start VM on Connect
3232

33-
Before you can configure the Start VM on Connect feature, you'll need to assign your VM a custom RBAC (role-based access control) role. This role will let Azure Virtual Desktop manage the VMs in your subscription. You can also use this role to turn on VMs, check their status, and report diagnostic info. If you want to know more about what each role does, take a look at [Azure custom roles](../role-based-access-control/custom-roles.md).
33+
Before you can configure the Start VM on Connect feature, you'll need to assign a subscription-level custom RBAC (role-based access control) role to the Azure Virtual Desktop service principal . This role will let Azure Virtual Desktop manage the VMs in your subscription. This role grants Azure Virtual Desktop the permissions to turn on VMs, check their status, and report diagnostic info. If you want to know more about Azure custom RBAC roles, take a look at [Azure custom roles](../role-based-access-control/custom-roles.md).
3434

3535
>[!NOTE]
36-
>If your VMs and host pool are in different subscriptions, the RBAC role needs to be assigned to the subscription that the VMs are in.
36+
>If your VMs and host pool are in different subscriptions, the RBAC role needs to be created in the subscription that the VMs are in.
3737
3838
### Use the Azure portal
3939

40-
To use the Azure portal to assign a custom role for Start VM on Connect:
40+
To use the Azure portal to create a custom role for Start VM on Connect:
4141

4242
1. Open the Azure portal and go to **Subscriptions**.
4343

@@ -48,9 +48,9 @@ To use the Azure portal to assign a custom role for Start VM on Connect:
4848
> [!div class="mx-imgBorder"]
4949
> ![A screenshot of a drop-down menu from the Add button in Access control (IAM). "Add a custom role" is highlighted in red.](media/add-custom-role.png)
5050
51-
4. Next, name the custom role and add a description. We recommend you name it “start VM on connect.”
51+
4. Next, name the custom role and add a description. We recommend you name it “Start VM on Connect.”
5252

53-
5. On the **Permissions** tab, add one of the two following sets of permissions to the subscription you're assigning the role to:
53+
5. On the **Permissions** tab, add one of the two following sets of permissions to the role:
5454

5555
- Microsoft.Compute/virtualMachines/start/action
5656
- Microsoft.Compute/virtualMachines/read
@@ -61,20 +61,20 @@ To use the Azure portal to assign a custom role for Start VM on Connect:
6161
- Microsoft.Compute/virtualMachines/start/action
6262
- Microsoft.Compute/virtualMachines/*/read
6363

64-
6. When you're finished, select **Ok**.
64+
6. When you're finished, select **Review + create**. It may take a few minutes for the RBAC service to create the custom role.
6565

66-
After that, you'll need to assign the role to grant access to Azure Virtual Desktop.
66+
After that, you'll need to assign the role to the Azure Virtual Desktop service principal.
6767

6868
To assign the custom role:
6969

70-
1. In the **Access control (IAM) tab**, select **Add role assignments**.
70+
1. In the **Access control (IAM) tab**, select **Add role assignment**.
7171

72-
2. Select the role you just created.
72+
2. Search for and select the role you just created.
7373

74-
3. In the search bar, enter and select **Windows Virtual Desktop** (this will soon be updated to "Azure Virtual Desktop").
74+
3. On the **Members** tab, enter and select **Windows Virtual Desktop** in the search bar.
7575

7676
>[!NOTE]
77-
>You might see two apps if you have deployed Azure Virtual Desktop (classic). Assign the role to both apps you see.
77+
>You might see both the Windows Virtual Desktop and Windows Virtual Desktop Azure Resource Manager Provider first party applications appear if you've deployed Azure Virtual Desktop (classic). Assign the role to both apps.
7878
>
7979
> [!div class="mx-imgBorder"]
8080
> ![A screenshot of the Access control (IAM) tab. In the search bar, both Azure Virtual Desktop and Azure Virtual Desktop (classic) are highlighted in red.](media/add-role-assignment.png)

0 commit comments

Comments
 (0)