Skip to content

Commit f010127

Browse files
committed
Fixed blocking issues
1 parent 9483852 commit f010127

File tree

4 files changed

+4
-3
lines changed

4 files changed

+4
-3
lines changed

articles/virtual-desktop/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -284,7 +284,7 @@
284284
- name: Set personal desktop assignment type
285285
href: configure-host-pool-personal-desktop-assignment-type.md
286286
- name: Configure a validation environment
287-
href: create-validation-host-pool.md
287+
href: configure-validation-environment.md
288288
- name: Scheduled Agent Updates
289289
href: scheduled-agent-updates.md
290290
- name: Delete a host pool

articles/virtual-desktop/create-host-pool.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,7 @@
22
title: Create a host pool - Azure Virtual Desktop
33
description: Learn how to create a host pool in Azure Virtual Desktop by using the Azure portal, Azure CLI, or Azure PowerShell.
44
ms.topic: how-to
5+
ms.custom: references_regions
56
author: dknappettmsft
67
ms.author: daknappe
78
ms.date: 02/28/2023

articles/virtual-desktop/includes/include-session-hosts-post-deployment.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ To ensure your session hosts have licenses applied correctly, you'll need to do
1717

1818
If your users are going to connect to session hosts joined to Azure Active Directory, you'll need to do the following tasks:
1919

20-
- If your users are going to connect to session hosts joined to Azure Active Directory, you must assign them the [*Virtual Machine User Login*](../../role-based-access-control/built-in-roles.md#virtual-machine-user-login) or [*Virtual Machine Administrator Login*](../../role-based-access-control/built-in-roles.md#virtual-machine-administrator-login) RBAC role either on the each virtual machine, the resource group containing the virtual machines, or the subscription. We recommend you assign the *Virtual Machine User Login* RBAC role on the resource group containing your session hosts to the same user group as the you assign to the application group. For more information, see [Log in to a Windows virtual machine in Azure by using Azure AD](../../active-directory/devices/howto-vm-sign-in-azure-ad-windows.md#configure-role-assignments-for-the-vm).
20+
- If your users are going to connect to session hosts joined to Azure Active Directory, you must assign them the [*Virtual Machine User Login*](../../role-based-access-control/built-in-roles.md#virtual-machine-user-login) or [*Virtual Machine Administrator Login*](../../role-based-access-control/built-in-roles.md#virtual-machine-administrator-login) RBAC role either on each virtual machine, the resource group containing the virtual machines, or the subscription. We recommend you assign the *Virtual Machine User Login* RBAC role on the resource group containing your session hosts to the same user group as you assign to the application group. For more information, see [Log in to a Windows virtual machine in Azure by using Azure AD](../../active-directory/devices/howto-vm-sign-in-azure-ad-windows.md#configure-role-assignments-for-the-vm).
2121

2222
- For users connecting from Windows devices that aren't joined to Azure AD or non-Windows devices, add the custom RDP property `targetisaadjoined:i:1` to the host pool's RDP properties. These connections are restricted to entering user name and password credentials when signing in to a session host. For more information, see [Customize RDP properties for a host pool](../customize-rdp-properties.md).
2323

articles/virtual-desktop/prerequisites.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -88,7 +88,7 @@ You'll need to enter the following identity parameters when deploying session ho
8888
> [!IMPORTANT]
8989
> The account you use for joining a domain can't have multi-factor authentication (MFA) enabled.
9090
>
91-
> When joining an Azure AD DS domain, the account you use must be part of the AAD DC administrators group.
91+
> When joining an Azure AD DS domain, the account you use must be part of the *AAD DC administrators* group.
9292
9393
## Operating systems and licenses
9494

0 commit comments

Comments
 (0)