Enable Azure Multi-Factor Authentication for Windows Virtual Desktop
If you're visiting this page from the Windows Virtual Desktop (classic) documentation, make sure to return to the Windows Virtual Desktop (classic) documentation once you're finished.
The Windows client for Windows Virtual Desktop is an excellent option for integrating Windows Virtual Desktop with your local machine. However, when you configure your Windows Virtual Desktop account into the Windows Client, there are certain measures you'll need to take to keep yourself and your users safe.
When you first sign in, the client asks for your username, password, and Azure MFA. After that, the next time you sign in, the client will remember your token from your Azure Active Directory (AD) Enterprise Application. When you select Remember me, your users can sign in after restarting the client without needing to reenter their credentials.
While remembering credentials is convenient, it can also make deployments on Enterprise scenarios or personal devices less secure. To protect your users, you'll need to make sure the client keeps asking for Azure Multi-Factor Authentication (MFA) credentials. This article will show you how to configure the Conditional Access policy for Windows Virtual Desktop to enable this setting.
Here's what you'll need to get started:
- Assign users a license that includes Azure Active Directory Premium P1 or P2.
- An Azure Active Directory group with your users assigned as group members.
- Enable Azure MFA for all your users. For more information about how to do that, see How to require two-step verification for a user.
The following setting also applies to the Windows Virtual Desktop web client.
Create a Conditional Access policy
Here's how to create a Conditional Access policy that requires multi-factor authentication when connecting to Windows Virtual Desktop:
Sign in to the Azure portal as a global administrator, security administrator, or Conditional Access administrator.
Browse to Azure Active Directory > Security > Conditional Access.
Select New policy.
Give your policy a name. We recommend that organizations create a meaningful standard for the names of their policies.
Under Assignments, select Users and groups.
Under Include, select Select users and groups > Users and groups > Choose the group you created in the prerequisites stage.
Under Cloud apps or actions > Include, select Select apps.
Select one of the following apps based on which version of Windows Virtual Desktop you're using.
If you're using Windows Virtual Desktop (classic), choose these apps:
- Windows Virtual Desktop (App ID 5a0aa725-4958-4b0c-80a9-34562e23f3b7)
- Windows Virtual Desktop Client (App ID fa4345a4-a730-4230-84a8-7d9651b86739), which will let you set policies on the web client
After that, skip ahead to step 11.
If you're using Windows Virtual Desktop, choose this app instead:
- Windows Virtual Desktop (App ID 9cdead84-a844-4324-93f2-b2e6bb768d07)
After that, go to step 10.
Don't select the app called Windows Virtual Desktop Azure Resource Manager Provider (50e95039-b200-4007-bc97-8d5790743a63). This app is only used for retrieving the user feed and shouldn't have MFA.
Go to Conditions > Client apps, then select where you want to apply the policy to:
- Select Browser if you want the policy to apply to the web client.
- Select Mobile apps and desktop clients if you want to apply the policy to other clients.
- Select both check boxes if you want to apply the policy to all clients.
Once you've selected your app, choose Select, and then select Done.
To find the App ID of the app you want to select, go to Enterprise Applications and select Microsoft Applications from the application type drop-down menu.
Under Access controls > Grant, select Grant access, Require multi-factor authentication, and then Select.
Under Access controls > Session, select Sign-in frequency, set the value to 1 and the unit to Hours, and then select Select.
Confirm your settings and set Enable policy to On.
Select Create to enable your policy.