Skip to content

Commit f4b0879

Browse files
authored
Merge pull request #192455 from dknappettmsft/avd-rbac-desktop-virtualization-user
AVD updated RBAC roles and TOC
2 parents 9d83f41 + 47eacba commit f4b0879

File tree

3 files changed

+102
-110
lines changed

3 files changed

+102
-110
lines changed

articles/virtual-desktop/TOC.yml

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -61,8 +61,14 @@
6161
href: connection-latency.md
6262
- name: Virtual machine sizing guidance
6363
href: /windows-server/remote/remote-desktop-services/virtual-machine-recs?context=/azure/virtual-desktop/context/context
64-
- name: Delegated access in Azure Virtual Desktop
65-
href: delegated-access-virtual-desktop.md
64+
- name: Identity and access management
65+
items:
66+
- name: Identities and authentication
67+
href: authentication.md
68+
- name: Azure RBAC roles
69+
href: rbac.md
70+
- name: Delegated access
71+
href: delegated-access-virtual-desktop.md
6672
- name: Host pool load-balancing methods
6773
href: host-pool-load-balancing.md
6874
- name: FSLogix profile containers and Azure files

articles/virtual-desktop/authentication.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,18 +1,17 @@
11
---
2-
title: Azure Virtual Desktop authentication - Azure
3-
description: Authentication methods for Azure Virtual Desktop.
2+
title: Azure Virtual Desktop identities and authentication - Azure
3+
description: Identities and authentication methods for Azure Virtual Desktop.
44
services: virtual-desktop
55
author: Heidilohr
6-
76
ms.service: virtual-desktop
87
ms.topic: conceptual
98
ms.date: 12/07/2021
109
ms.author: helohr
1110
manager: femila
1211
---
13-
# Supported authentication methods
12+
# Supported identities and authentication methods
1413

15-
In this article, we'll give you a brief overview of what kinds of authentication you can use in Azure Virtual Desktop.
14+
In this article, we'll give you a brief overview of what kinds of identities and authentication methods you can use in Azure Virtual Desktop.
1615

1716
## Identities
1817

articles/virtual-desktop/rbac.md

Lines changed: 90 additions & 103 deletions
Original file line numberDiff line numberDiff line change
@@ -1,154 +1,141 @@
11
---
2-
title: Built-in roles Azure Virtual Desktop - Azure
3-
description: An overview of built-in roles for Azure Virtual Desktop available for Azure RBAC.
2+
title: Built-in Azure RBAC roles Azure Virtual Desktop
3+
description: An overview of built-in Azure RBAC roles for Azure Virtual Desktop available.
44
services: virtual-desktop
55
author: Heidilohr
6-
76
ms.service: virtual-desktop
87
ms.topic: conceptual
9-
ms.date: 12/15/2020
8+
ms.date: 03/22/2022
109
ms.author: helohr
1110
manager: femila
1211
---
13-
# Built-in roles for Azure Virtual Desktop
12+
# Built-in Azure RBAC roles for Azure Virtual Desktop
1413

15-
Azure Virtual Desktop uses Azure role-based access controls (RBAC) to assign roles to users and admins. These roles give admins permission to carry out certain tasks. To learn more about built-in roles for Azure RBAC, see [Azure built-in roles](../role-based-access-control/built-in-roles.md).
14+
Azure Virtual Desktop uses Azure role-based access control (RBAC) to control access to resources. There are a number of built-in roles for use with Azure Virtual Desktop which is a collection of permissions. You assign roles to users and admins and these roles give permission to carry out certain tasks. To learn more about Azure RBAC, see [What is Azure RBAC?](../role-based-access-control/overview.md).
1615

17-
The standard built-in roles for Azure are Owner, Contributor, and Reader. However, Azure Virtual Desktop has additional roles that let you separate management roles for host pools, app groups, and workspaces. This separation lets you have more granular control over administrative tasks. These roles are named in compliance with Azure's standard roles and least-privilege methodology.
16+
The standard built-in roles for Azure are Owner, Contributor, and Reader. However, Azure Virtual Desktop has additional roles that let you separate management roles for host pools, application groups, and workspaces. This separation lets you have more granular control over administrative tasks. These roles are named in compliance with Azure's standard roles and least-privilege methodology.
1817

19-
Azure Virtual Desktop doesn't have a specific Owner role. However, you can use a standard Owner role for the service objects.
18+
Azure Virtual Desktop doesn't have a specific Owner role. However, you can use the general Owner role for the service objects.
2019

21-
## Desktop Virtualization Contributor
20+
The built-in roles for Azure Virtual Desktop and the permissions for each one are detailed below. The assignable scope for all built-in roles are set to the root scope ("/"). The root scope indicates that the role is available for assignment in all scopes, for example management groups, subscriptions, or resource groups. For more information, see [Understand Azure role definitions](../role-based-access-control/role-definitions.md).
2221

23-
The Desktop Virtualization Contributor role lets you manage all aspects of the deployment. However, it doesn't grant you access to compute resources. You'll also need the User Access Administrator role to publish app groups to users or user groups.
22+
## Desktop Virtualization Contributor
2423

24+
The Desktop Virtualization Contributor role allows users to manage all aspects of the deployment. However, it doesn't grant users access to compute resources. You'll also need the *User Access Administrator* role to publish application groups to users or user groups.
2525

26-
- Microsoft.DesktopVirtualization/\*
27-
- Microsoft.Resources/subscriptions/resourceGroups/read
28-
- Microsoft.Resources/deployments/\*
29-
- Microsoft.Authorization/\*/read
30-
- Microsoft.Insights/alertRules/\*
31-
- Microsoft.Support/\*
26+
| Action type | Permissions |
27+
|--|--|
28+
| actions | <ul><li>Microsoft.DesktopVirtualization/\*</li><li>Microsoft.Resources/subscriptions/resourceGroups/read</li><li>Microsoft.Resources/deployments/\*</li><li>Microsoft.Authorization/\*/read</li><li>Microsoft.Insights/alertRules/\*</li><li>Microsoft.Support/\*</li></ul> |
29+
| notActions | None |
30+
| dataActions | None |
31+
| notDataActions | None |
3232

3333
## Desktop Virtualization Reader
3434

35-
The Desktop Virtualization Reader role lets you view everything in the deployment but doesn't let you make any changes.
35+
The Desktop Virtualization Reader role allows users to view everything in the deployment, but doesn't let them make any changes.
3636

37-
- Microsoft.DesktopVirtualization/\*/read
38-
- Microsoft.Resources/subscriptions/resourceGroups/read
39-
- Microsoft.Resources/deployments/read
40-
- Microsoft.Authorization/\*/read
41-
- Microsoft.Insights/alertRules/\*
42-
- Microsoft.Support/\*
37+
| Action type | Permissions |
38+
|--|--|
39+
| actions | <ul><li>Microsoft.DesktopVirtualization/\*/read</li><li>Microsoft.Resources/subscriptions/resourceGroups/read</li><li>Microsoft.Resources/deployments/read</li><li>Microsoft.Authorization/\*/read</li><li>Microsoft.Insights/alertRules/read</li><li>Microsoft.Support/\*</li></ul> |
40+
| notActions | None |
41+
| dataActions | None |
42+
| notDataActions | None |
4343

44-
## Desktop Virtualization Host Pool Contributor
44+
## Desktop Virtualization User
4545

46-
The Host Pool Contributor role lets you manage all aspects of host pools, including access to resources. You'll need an extra contributor role, Virtual Machine Contributor, to create virtual machines. You will need AppGroup and Workspace contributor roles to create host pool using the portal or you can use Desktop Virtualization Contributor role.
46+
The Desktop Virtualization User role allows users to use the applications in an application group.
47+
48+
| Action type | Permissions |
49+
|--|--|
50+
| actions | None |
51+
| notActions | None |
52+
| dataActions | <ul><li>Microsoft.DesktopVirtualization/applicationGroups/useApplications/action</li></ul> |
53+
| notDataActions | None |
54+
55+
## Desktop Virtualization Host Pool Contributor
4756

48-
The following list describes which permissions this role can access:
57+
The Desktop Virtualization Host Pool Contributor role allows users to manage all aspects of host pools, including access to resources. You'll also need the *Virtual Machine Contributor* role to create virtual machines. You will need *Desktop Virtualization Application Group Contributor* and *Desktop Virtualization Workspace Contributor* roles to create host pools using the portal, or you can use the *Desktop Virtualization Contributor* role.
4958

50-
- Microsoft.DesktopVirtualization/hostpools/\*
51-
- Microsoft.Resources/subscriptions/resourceGroups/read
52-
- Microsoft.Resources/deployments/\*
53-
- Microsoft.Authorization/\*/read
54-
- Microsoft.Insights/alertRules/\*
55-
- Microsoft.Support/\*
59+
| Action type | Permissions |
60+
|--|--|
61+
| actions | <ul><li>Microsoft.DesktopVirtualization/hostpools/\*</li><li>Microsoft.Resources/subscriptions/resourceGroups/read</li><li>Microsoft.Resources/deployments/\*</li><li>Microsoft.Authorization/\*/read</li><li>Microsoft.Insights/alertRules/\*</li><li>Microsoft.Support/\*</li></ul> |
62+
| notActions | None |
63+
| dataActions | None |
64+
| notDataActions | None |
5665

5766
## Desktop Virtualization Host Pool Reader
5867

59-
The Host Pool Reader role lets you view everything in the host pool, but won't allow you to make any changes.
68+
The Desktop Virtualization Host Pool Reader role allows users to view everything in the host pool, but won't allow them to make any changes.
6069

61-
- Microsoft.DesktopVirtualization/hostpools/\*/read
62-
- Microsoft.Resources/subscriptions/resourceGroups/read
63-
- Microsoft.Resources/deployments/read
64-
- Microsoft.Authorization/\*/read
65-
- Microsoft.Insights/alertRules/\*
66-
- Microsoft.Support/\*
70+
| Action type | Permissions |
71+
|--|--|
72+
| actions | <ul><li>Microsoft.DesktopVirtualization/hostpools/\*/read</li><li>Microsoft.DesktopVirtualization/hostpools/read</li><li>Microsoft.Resources/subscriptions/resourceGroups/read</li><li>Microsoft.Resources/deployments/read</li><li>Microsoft.Authorization/\*/read</li><li>Microsoft.Insights/alertRules/read</li><li>Microsoft.Support/\*</li></ul> |
73+
| notActions | None |
74+
| dataActions | None |
75+
| notDataActions | None |
6776

6877
## Desktop Virtualization Application Group Contributor
6978

70-
The Application Group Contributor role lets you manage all aspects of app groups. If you want to publish app groups to users or user groups, you'll need the User Access Administrator role.
79+
The Desktop Virtualization Application Group Contributor role allows users to manage all aspects of application groups. If you want users to publish application groups to users or user groups, they'll also need the *User Access Administrator* role.
7180

72-
The following list describes which permissions this role can access:
73-
74-
- Microsoft.DesktopVirtualization/applicationgroups/\*
75-
- Microsoft.DesktopVirtualization/hostpools/read
76-
- Microsoft.DesktopVirtualization/hostpools/sessionhosts/read
77-
- Microsoft.Resources/subscriptions/resourceGroups/read
78-
- Microsoft.Resources/deployments/\*
79-
- Microsoft.Authorization/\*/read
80-
- Microsoft.Insights/alertRules/\*
81-
- Microsoft.Support/\*
81+
| Action type | Permissions |
82+
|--|--|
83+
| actions | <ul><li>Microsoft.DesktopVirtualization/applicationgroups/\*</li><li>Microsoft.DesktopVirtualization/hostpools/read</li><li>Microsoft.DesktopVirtualization/hostpools/sessionhosts/read</li><li>Microsoft.Resources/subscriptions/resourceGroups/read</li><li>Microsoft.Resources/deployments/\*</li><li>Microsoft.Authorization/\*/read</li><li>Microsoft.Insights/alertRules/\*</li><li>Microsoft.Support/\*</ul></li> |
84+
| notActions | None |
85+
| dataActions | None |
86+
| notDataActions | None |
8287

8388
## Desktop Virtualization Application Group Reader
8489

85-
The Application Group Reader role lets you view everything in the app group and will not allow you to make any changes.
86-
87-
The following list describes which permissions this role can access:
90+
The Desktop Virtualization Application Group Reader role allows users to view everything in the application group and will not allow them to make any changes.
8891

89-
- Microsoft.DesktopVirtualization/applicationgroups/\*/read
90-
- Microsoft.DesktopVirtualization/applicationgroups/read
91-
- Microsoft.DesktopVirtualization/hostpools/read
92-
- Microsoft.DesktopVirtualization/hostpools/sessionhosts/read
93-
- Microsoft.Resources/subscriptions/resourceGroups/read
94-
- Microsoft.Resources/deployments/read
95-
- Microsoft.Authorization/\*/read
96-
- Microsoft.Insights/alertRules/\*
97-
- Microsoft.Support/\*
92+
| Action type | Permissions |
93+
|--|--|
94+
| actions | <ul><li>Microsoft.DesktopVirtualization/applicationgroups/\*/read</li><li>Microsoft.DesktopVirtualization/applicationgroups/read</li><li>Microsoft.DesktopVirtualization/hostpools/read</li><li>Microsoft.DesktopVirtualization/hostpools/sessionhosts/read</li><li>Microsoft.Resources/subscriptions/resourceGroups/read</li><li>Microsoft.Resources/deployments/read</li><li>Microsoft.Authorization/\*/read</li><li>Microsoft.Insights/alertRules/read</li><li>Microsoft.Support/\*</li></ul> |
95+
| notActions | None |
96+
| dataActions | None |
97+
| notDataActions | None |
9898

9999
## Desktop Virtualization Workspace Contributor
100100

101-
The Workspace Contributor role lets you manage all aspects of workspaces. To get information on applications added to the app groups, you'll also need to be assigned the Application Group Reader role.
102-
103-
The following list describes which permissions this role can access:
101+
The Desktop Virtualization Workspace Contributor role allows users to manage all aspects of workspaces. To get information on applications added to the application groups, they'll also need the *Application Group Reader* role.
104102

105-
- Microsoft.DesktopVirtualization/workspaces/\*
106-
- Microsoft.DesktopVirtualization/applicationgroups/read
107-
- Microsoft.Resources/subscriptions/resourceGroups/read
108-
- Microsoft.Resources/deployments/\*
109-
- Microsoft.Authorization/\*/read
110-
- Microsoft.Insights/alertRules/\*
111-
- Microsoft.Support/\*
103+
| Action type | Permissions |
104+
|--|--|
105+
| actions | <ul><li>Microsoft.DesktopVirtualization/workspaces/\*</li><li>Microsoft.DesktopVirtualization/applicationgroups/read</li><li>Microsoft.Resources/subscriptions/resourceGroups/read</li><li>Microsoft.Resources/deployments/\*</li><li>Microsoft.Authorization/\*/read</li><li>Microsoft.Insights/alertRules/\*</li><li>Microsoft.Support/\*</li></ul> |
106+
| notActions | None |
107+
| dataActions | None |
108+
| notDataActions | None |
112109

113110
## Desktop Virtualization Workspace Reader
114111

115-
The Workspace Reader role lets you view everything in the workspace, but won't allow you to make any changes.
112+
The Desktop Virtualization Workspace Reader role allows users to view everything in the workspace, but won't allow them to make any changes.
116113

117-
The following list describes which permissions this role can access:
118-
119-
- Microsoft.DesktopVirtualization/workspaces/read
120-
- Microsoft.DesktopVirtualization/applicationgroups/read
121-
- Microsoft.Resources/subscriptions/resourceGroups/read
122-
- Microsoft.Resources/deployments/read
123-
- Microsoft.Authorization/\*/read
124-
- Microsoft.Insights/alertRules/\*
125-
- Microsoft.Support/\*
114+
| Action type | Permissions |
115+
|--|--|
116+
| actions | <ul><li>Microsoft.DesktopVirtualization/workspaces/read</li><li>Microsoft.DesktopVirtualization/applicationgroups/read</li><li>Microsoft.Resources/subscriptions/resourceGroups/read</li><li>Microsoft.Resources/deployments/read</li><li>Microsoft.Authorization/\*/read</li><li>Microsoft.Insights/alertRules/read</li><li>Microsoft.Support/\*</li></ul> |
117+
| notActions | None |
118+
| dataActions | None |
119+
| notDataActions | None |
126120

127121
## Desktop Virtualization User Session Operator
128122

129-
The User Session Operator role lets you send messages, disconnect sessions, and use the "logoff" function to sign sessions out of the session host. However, this role doesn't let you perform session host management like removing session host, changing drain mode, and so on. This role can see assignments, but can't modify admins. We recommend you assign this role to specific host pools. If you give this permission at a resource group level, the admin will have read permission on all host pools under a resource group.
130-
131-
The following list describes which permissions this role can access:
123+
The Desktop Virtualization User Session Operator role allows users to send messages, disconnect sessions, and use the "logoff" function to sign sessions out of the session host. However, this role doesn't let users perform session host management like removing session host, changing drain mode, and so on. This role can see assignments, but can't modify admins. We recommend you assign this role to specific host pools. If you give this permission at a resource group level, the admin will have read permission on all host pools under a resource group.
132124

133-
- Microsoft.DesktopVirtualization/hostpools/read
134-
- Microsoft.DesktopVirtualization/hostpools/sessionhosts/read
135-
- Microsoft.DesktopVirtualization/hostpools/sessionhosts/usersessions/\*
136-
- Microsoft.Resources/subscriptions/resourceGroups/read
137-
- Microsoft.Resources/deployments/read
138-
- Microsoft.Authorization/\*/read
139-
- Microsoft.Insights/alertRules/\*
140-
- Microsoft.Support/\*
125+
| Action type | Permissions |
126+
|--|--|
127+
| actions | <ul><li>Microsoft.DesktopVirtualization/hostpools/read</li><li>Microsoft.DesktopVirtualization/hostpools/sessionhosts/read</li><li>Microsoft.DesktopVirtualization/hostpools/sessionhosts/usersessions/\*</li><li>Microsoft.Resources/subscriptions/resourceGroups/read</li><li>Microsoft.Resources/deployments/\*</li><li>Microsoft.Authorization/\*/read</li><li>Microsoft.Insights/alertRules/\*</li><li>Microsoft.Support/\*</li></ul> |
128+
| notActions | None |
129+
| dataActions | None |
130+
| notDataActions | None |
141131

142132
## Desktop Virtualization Session Host Operator
143133

144-
The Session Host Operator role lets you view and remove session hosts, as well as change drain mode. They can't add session hosts using the Azure portal because they don't have write permission for host pool objects. If the registration token is valid (generated and not expired), you can use this role to add session hosts to the host pool outside of Azure portal if the admin has compute permissions through the Virtual Machine Contributor role.
145-
146-
The following list describes which permissions this role can access:
134+
The Desktop Virtualization Session Host Operator role allows users to view and remove session hosts, as well as change drain mode. Users can't add session hosts using the Azure portal because they don't have write permission for host pool objects. If the registration token is valid (generated and not expired), users assigned this role can add session hosts to the host pool outside of the Azure portal if they also have the *Virtual Machine Contributor* role.
147135

148-
- Microsoft.DesktopVirtualization/hostpools/read
149-
- Microsoft.DesktopVirtualization/hostpools/sessionhosts/\*
150-
- Microsoft.Resources/subscriptions/resourceGroups/read
151-
- Microsoft.Resources/deployments/read
152-
- Microsoft.Authorization/\*/read
153-
- Microsoft.Insights/alertRules/\*
154-
- Microsoft.Support/\*
136+
| Action type | Permissions |
137+
|--|--|
138+
| actions | <ul><li>Microsoft.DesktopVirtualization/hostpools/read</li><li>Microsoft.DesktopVirtualization/hostpools/sessionhosts/\*</li><li>Microsoft.Resources/subscriptions/resourceGroups/read</li><li>Microsoft.Resources/deployments/\*</li><li>Microsoft.Authorization/\*/read</li><li>Microsoft.Insights/alertRules/\*</li><li>Microsoft.Support/\*</li></ul> |
139+
| notActions | None |
140+
| dataActions | None |
141+
| notDataActions | None |

0 commit comments

Comments
 (0)