πŸ”’ Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided AZ-140 Domain 2
Domain 2 β€” Module 2 of 5 40%
14 of 28 overall

AZ-140 Study Guide

Domain 1: Plan and Implement an AVD Infrastructure

  • AVD Architecture: The Big Picture Free
  • Network Capacity and Design Free
  • RDP Shortpath, Multipath and QoS Free
  • Private Link and Network Troubleshooting Free
  • Storage Planning for User Data Free
  • File Shares and Azure NetApp Files Free
  • Host Pool Architecture: Personal vs Pooled Free
  • Sizing for Performance and Capacity Free
  • Creating Host Pools and Session Hosts Free
  • Session Host Licensing Free
  • Building Session Host Images Free
  • Image Lifecycle and Compute Gallery Free

Domain 2: Plan and Implement Identity and Security

  • Identity Scenarios for AVD
  • RBAC, Conditional Access and SSO
  • Defending AVD with Microsoft Defender
  • Network Security: NSGs, Firewall, Bastion
  • Threat Protection and Confidential VMs

Domain 3: Plan and Implement User Environments and Apps

  • FSLogix Profile Containers and ODFC
  • FSLogix Cloud Cache and Application Masking
  • AVD Clients: Choose and Deploy
  • User Experience and Session Settings
  • Application Groups and RemoteApp
  • Microsoft 365, Teams and OneDrive on AVD
  • App Attach: Dynamic Application Delivery

Domain 4: Monitor and Maintain an AVD Infrastructure

  • Monitoring AVD with Azure Monitor
  • Autoscaling and Session Management
  • Update Strategy and Backups
  • Disaster Recovery and Multi-Region

AZ-140 Study Guide

Domain 1: Plan and Implement an AVD Infrastructure

  • AVD Architecture: The Big Picture Free
  • Network Capacity and Design Free
  • RDP Shortpath, Multipath and QoS Free
  • Private Link and Network Troubleshooting Free
  • Storage Planning for User Data Free
  • File Shares and Azure NetApp Files Free
  • Host Pool Architecture: Personal vs Pooled Free
  • Sizing for Performance and Capacity Free
  • Creating Host Pools and Session Hosts Free
  • Session Host Licensing Free
  • Building Session Host Images Free
  • Image Lifecycle and Compute Gallery Free

Domain 2: Plan and Implement Identity and Security

  • Identity Scenarios for AVD
  • RBAC, Conditional Access and SSO
  • Defending AVD with Microsoft Defender
  • Network Security: NSGs, Firewall, Bastion
  • Threat Protection and Confidential VMs

Domain 3: Plan and Implement User Environments and Apps

  • FSLogix Profile Containers and ODFC
  • FSLogix Cloud Cache and Application Masking
  • AVD Clients: Choose and Deploy
  • User Experience and Session Settings
  • Application Groups and RemoteApp
  • Microsoft 365, Teams and OneDrive on AVD
  • App Attach: Dynamic Application Delivery

Domain 4: Monitor and Maintain an AVD Infrastructure

  • Monitoring AVD with Azure Monitor
  • Autoscaling and Session Management
  • Update Strategy and Backups
  • Disaster Recovery and Multi-Region
Domain 2: Plan and Implement Identity and Security Premium ⏱ ~18 min read

RBAC, Conditional Access and SSO

Control who manages AVD resources with RBAC, enforce security policies with Conditional Access, eliminate the double sign-in with SSO, and plan authentication methods including passwordless and smart card.

Three layers of AVD access control

β˜• Simple explanation

Think of AVD security like a concert venue.

  • RBAC is the backstage pass system. It decides who can set up the stage (manage host pools), who can let people in (assign users), and who can only watch (read settings). Different crew members get different coloured passes.
  • Conditional Access is the bouncer at the door. Even if you have a ticket, the bouncer checks your ID, makes sure you are not on a banned list, and might ask for extra proof (MFA) before letting you in.
  • SSO is the wristband. Once the bouncer lets you in, you do not need to show your ticket again at every bar or food stand inside the venue.

AVD access control operates at three distinct layers:

  • Azure RBAC β€” controls who can manage AVD resources (host pools, application groups, workspaces) in the Azure portal and APIs
  • Conditional Access β€” controls the conditions under which users can connect to AVD sessions (device compliance, location, MFA)
  • Single sign-on (SSO) β€” controls the authentication experience once the user connects, eliminating the second credential prompt at the session host

All three work together. RBAC secures the management plane. Conditional Access secures the connection. SSO smooths the user experience.

Azure RBAC for AVD

Built-in AVD roles

Azure provides several built-in roles specifically for AVD management. These follow least-privilege principles.

RoleWhat It Can DoTypical Assignee
Desktop Virtualization ContributorFull management of all AVD resources (create, modify, delete host pools, app groups, workspaces)AVD team leads, platform engineers
Desktop Virtualization ReaderRead-only access to all AVD resourcesAuditors, helpdesk (view only)
Desktop Virtualization UserLets users connect to application groups (assigned at the app group level)End users
Desktop Virtualization Host Pool ContributorManage host pools but not app groups or workspacesSession host administrators
Desktop Virtualization Host Pool ReaderRead-only access to host poolsMonitoring tools, read-only admins
Desktop Virtualization Application Group ContributorManage application groupsApp publishing team
Desktop Virtualization Application Group ReaderRead-only access to app groupsHelpdesk
Desktop Virtualization Workspace ContributorManage workspacesWorkspace administrators
Desktop Virtualization Workspace ReaderRead-only access to workspacesReporting tools
Desktop Virtualization Session Host OperatorStart, stop, restart, and drain session hostsOperations team, on-call staff
Desktop Virtualization Power On Off ContributorStart and stop VMs via autoscaleAutoscale service principal

🏒 Raj at TerraStack delegates carefully: β€œI gave our helpdesk team Desktop Virtualization Reader plus Session Host Operator. They can see everything and restart stuck session hosts, but they cannot change host pool settings or delete anything. Our app publishing team gets Application Group Contributor so they can publish RemoteApps without touching the infrastructure.”

πŸ’‘ Exam tip: Desktop Virtualization User is NOT a management role

The Desktop Virtualization User role is assigned to end users at the application group level β€” it grants the ability to connect and use desktops or apps. It does NOT grant any management permissions. If a question asks about assigning users to access AVD, the answer is Desktop Virtualization User on the application group resource.

Custom RBAC roles

If built-in roles do not match your needs, you can create custom roles. Common custom scenarios:

  • AVD Deployer β€” can create host pools and register session hosts but cannot assign users or modify Conditional Access
  • Profile Manager β€” can manage FSLogix storage accounts and file share permissions but not AVD resources
  • Autoscale Operator β€” can start/stop/deallocate VMs but nothing else (narrower than Power On Off Contributor)

Custom roles are defined in JSON with specific Actions and NotActions. They can be scoped to a subscription, resource group, or individual resource.

Conditional Access for AVD

Conditional Access policies evaluate signals (user, device, location, risk) and enforce controls (MFA, device compliance, block) before granting access.

Key concept: Two cloud apps to target

AVD authentication involves two cloud apps in Conditional Access:

Cloud AppApp IDPurpose
Azure Virtual Desktop9cdead84-a844-4324-93f2-b2e6bb768d07Authenticates the user to the AVD service (feed retrieval, resource enumeration)
Microsoft Remote Desktopa4a365df-50f1-4397-bc59-1a1564b8bb9cAuthenticates the connection to the session host (the actual RDP session)

Important: You should apply Conditional Access policies to both cloud apps. If you only target Azure Virtual Desktop, the user can get past the feed but still connect without MFA on the RDP session.

Common CA policy patterns for AVD

PolicySignalControlPurpose
Require MFA for AVDAll users, both AVD cloud appsRequire MFABaseline security for all connections
Block from untrusted locationsBoth AVD cloud apps, exclude trusted IPsBlock accessGeo-restrict AVD access
Require compliant deviceBoth AVD cloud apps, device stateRequire device to be marked as compliantOnly managed devices can connect
Require hybrid Entra joined deviceBoth AVD cloud apps, device stateRequire hybrid Entra joinRestrict to corporate-managed PCs
Risk-based MFABoth AVD cloud apps, sign-in risk medium+Require MFAAdaptive security based on risk signals

πŸ›οΈ JC at the Federal Department layers three CA policies: β€œEvery connection requires MFA via FIDO2 key. Connections are blocked from outside the country. And the device must be Intune-compliant with BitLocker enabled. Director Walsh does not negotiate on this.”

ℹ️ Deep dive: Conditional Access frequency and AVD

By default, Entra ID re-evaluates Conditional Access when the authentication token expires. For AVD, this means users may be prompted for MFA during reconnection if their token has expired.

You can control this with sign-in frequency settings in the CA policy. Setting sign-in frequency to a longer period (e.g., 12 hours) reduces MFA prompts during the workday. Setting it shorter increases security but may interrupt users.

For the exam, know that sign-in frequency is configured in the Session controls section of the Conditional Access policy, not in the Grant controls.

Authentication methods

Passwordless authentication

AVD supports several passwordless methods:

MethodHow It WorksRequirements
FIDO2 security keysPhysical USB or NFC keyEntra ID joined or hybrid joined session hosts. Key must support CTAP2.
Windows Hello for BusinessBiometric or PIN tied to the deviceDevice must be Entra ID joined or hybrid joined. Requires TPM.
Certificate-based authX.509 certificates on smart cards or virtual smart cardsAD DS or Entra certificate-based authentication configured

Smart card redirection

For organisations using physical smart cards (common in government and healthcare), AVD can redirect the smart card reader from the client device into the remote session. The user inserts their smart card locally, and the session host uses it for authentication.

πŸ›οΈ JC uses smart card redirection for privileged access: β€œOur security auditor Aisha logs in with her PIV card. The card reader on her laptop is redirected into the AVD session, and she authenticates to classified systems inside the session using the physical card.”

MFA with AVD

MFA is enforced through Conditional Access policies targeting the two AVD cloud apps. Options include:

  • Microsoft Authenticator push notifications
  • FIDO2 security keys
  • Phone-based verification (SMS or voice call β€” less secure, being deprecated)
  • Temporary Access Pass (for onboarding when a user does not have their MFA device yet)

Single sign-on (SSO)

The problem SSO solves

Without SSO, users connecting to AVD see two credential prompts:

  1. Sign in to Entra ID (to access the AVD feed and resources)
  2. Sign in again at the session host (to authenticate the RDP connection)

This is confusing and frustrating. SSO eliminates the second prompt.

How SSO works in AVD

When SSO is enabled, AVD uses an Entra ID authentication token to sign in to the session host automatically. The user authenticates once to Entra ID, and the session host trusts that token.

Requirements for SSO:

  • Session hosts must be Entra ID joined or hybrid Entra ID joined
  • SSO must be enabled in the host pool RDP properties
  • The β€œMicrosoft Remote Desktop” Entra ID enterprise application must be configured to allow SSO
  • Supported on Windows, macOS, iOS, Android clients and web client

🌐 Priya at NomadTech enabled SSO immediately: β€œOur remote workers connect from 12 countries on personal laptops. Before SSO, they had to enter credentials twice β€” half of them raised helpdesk tickets thinking the first login failed. After enabling SSO, login complaints dropped to zero.”

πŸ’‘ Exam tip: SSO and the consent dialog

When SSO is first enabled, users may see a one-time consent dialog asking them to allow the connection. You can suppress this by configuring the β€œMicrosoft Remote Desktop” enterprise application in Entra ID to grant admin consent for the organisation. Expect a question about this β€” if SSO is enabled but users report a consent prompt, the fix is admin consent in the enterprise application, not a Conditional Access change.

Authentication Methods for AVD
MethodSecurity LevelUser ExperienceRequirements
Password + MFA (Authenticator)GoodModerate β€” two prompts unless SSO enabledEntra ID + Authenticator app
FIDO2 security keyExcellentTap and go β€” fast and phishing-resistantEntra ID joined, CTAP2-compliant key
Windows Hello for BusinessExcellentBiometric or PIN β€” seamlessTPM, Entra ID joined or hybrid
Smart card (redirected)ExcellentInsert card β€” familiar for gov/healthSmart card reader, RDP redirection enabled
Certificate-based authExcellentTransparent if cert is on devicePKI infrastructure, cert deployment
Password onlyPoorSimple but insecureNot recommended β€” always pair with MFA

Putting it all together: RBAC + CA + SSO

LayerControlsExample
RBACWho can manage AVD resourcesRaj gives helpdesk Desktop Virtualization Reader, ops team gets Session Host Operator
Conditional AccessConditions for user connectionsJC requires MFA + compliant device + domestic IP for all AVD connections
SSOSmooth user login experiencePriya enables SSO so remote workers authenticate once and land in their desktop
Auth methodsHow users prove identityJC uses FIDO2, Priya uses Authenticator, Mia uses smart card for clinical staff
Question

Which RBAC role should you assign to end users so they can connect to AVD desktops?

Click or press Enter to reveal answer

Answer

Desktop Virtualization User β€” assigned at the application group level. This grants connection rights, not management permissions.

Click to flip back

Question

What two Entra ID cloud apps must you target in Conditional Access policies for AVD?

Click or press Enter to reveal answer

Answer

1. Azure Virtual Desktop (for feed/resource authentication) and 2. Microsoft Remote Desktop (for the RDP session authentication). Target both to avoid a gap.

Click to flip back

Question

What does SSO for AVD eliminate?

Click or press Enter to reveal answer

Answer

The second credential prompt when connecting to the session host. Without SSO, users authenticate twice β€” once to Entra ID and once to the session host. SSO uses a token to handle the second authentication automatically.

Click to flip back

Question

What is the Desktop Virtualization Power On Off Contributor role used for?

Click or press Enter to reveal answer

Answer

It is assigned to the autoscale service principal so it can start and stop (deallocate) session host VMs based on demand. It should NOT be assigned to human users.

Click to flip back

Knowledge Check

JC wants to ensure that all AVD users must use MFA and connect from a compliant device. He creates a Conditional Access policy targeting only the 'Azure Virtual Desktop' cloud app. What is the problem with this approach?

Knowledge Check

Priya enabled SSO for her AVD host pool, but users report seeing a consent dialog on first connection. How should Priya resolve this for all NomadTech users?

Knowledge Check

Raj needs to allow his operations team to restart stuck session hosts but NOT modify host pool settings, assign users, or delete any resources. Which built-in role should he assign?

🎬 Video coming soon

RBAC, Conditional Access and SSO


Next up: Defending AVD with Microsoft Defender β€” how to protect session hosts with Defender for Cloud, configure antivirus exclusions for FSLogix, and onboard endpoints to Defender for Endpoint.

← Previous

Identity Scenarios for AVD

Next β†’

Defending AVD with Microsoft Defender

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.