Concepts

In the world of cloud computing, security is of utmost importance. As more and more organizations adopt virtual desktop solutions like Microsoft Azure Virtual Desktop, it becomes crucial to ensure secure administrative access to session hosts. Azure Bastion and Just-in-Time (JIT) access are two powerful features that can help achieve this goal. In this article, we will explore how to configure Azure Bastion or JIT for administrative access to session hosts.

Azure Bastion

Azure Bastion is a fully managed platform as a service (PaaS) that provides secure and seamless RDP and SSH access to virtual machines directly from the Azure portal without the need for a public IP address. It eliminates the need to expose virtual machines to the public internet by routing traffic through a secure and dedicated gateway.

To configure Azure Bastion for administrative access to session hosts, follow these steps:

  1. Open the Azure portal and navigate to the desired Azure Virtual Desktop workspace.
  2. Click on “Session hosts” in the left navigation menu and select the session host you want to configure.
  3. In the session host overview page, click on “Networking” under Settings.
  4. On the Networking page, click on “Add inbound port rule” and select “RDP” or “SSH” depending on the protocol you want to enable.
  5. In the Rule name field, enter a descriptive name for the rule.
  6. Choose the appropriate source IP address range for access. You can specify a specific IP address or a range of IP addresses.
  7. Select “AzureBastionSubnet” as the Target subnet.
  8. Click on “Save” to create the inbound port rule.
  9. Repeat steps 4-8 for each protocol (RDP and SSH) you want to enable.

Once the Azure Bastion configuration is complete, you can now securely access the session host using the Azure portal. Simply navigate to the session host in the Azure portal, click on “Connect” and select “Bastion” as the method. This will open a browser-based RDP or SSH session to the session host over a secure connection.

Just-in-Time (JIT) Access

Just-in-Time (JIT) access is another security feature provided by Azure Virtual Desktop that reduces the attack surface by only allowing inbound traffic to session hosts when it is needed. JIT access helps prevent unauthorized access by temporarily opening the necessary ports for a specified duration and then automatically closing them once the specified time elapses.

To configure JIT access for administrative access to session hosts, follow these steps:

  1. Open the Azure portal and navigate to the desired Azure Virtual Desktop workspace.
  2. Click on “Session hosts” in the left navigation menu and select the session host you want to configure.
  3. In the session host overview page, click on “Security” under Settings.
  4. On the Security page, click on “Just-in-Time VM access” to open the JIT access configuration.
  5. In the JIT access configuration page, click on “Add” to create a new rule.
  6. Select either “RDP” or “SSH” as the protocol, depending on your requirement.
  7. Specify the maximum request duration for how long the ports should remain open. This can range from a few minutes to several hours.
  8. Choose the appropriate source IP address range for access. You can specify a specific IP address or a range of IP addresses.
  9. Click on “Save” to create the JIT access rule.

Once the JIT access rule is created, you can now request access to the session host for the specified duration. To request access, navigate to the session host in the Azure portal, click on “Connect” and select “JIT” as the method. This will open a browser-based RDP or SSH session to the session host for the specified time period.

Conclusion

Securing administrative access to session hosts is crucial to ensure the integrity and confidentiality of your virtual desktop infrastructure. Azure Bastion and Just-in-Time (JIT) access are two powerful features provided by Azure Virtual Desktop that can help achieve this goal. By following the steps outlined in this article, you can configure Azure Bastion or JIT access to provide secure administrative access to your session hosts. Stay secure and keep your virtual desktop environment protected!

Answer the Questions in Comment Section

What is Azure Bastion used for?

– a) Securely connect to Azure virtual machines using Remote Desktop Protocol (RDP)
– b) Manage Azure Active Directory (AD) roles and permissions
– c) Configure virtual network peering in Azure
– d) Deploy and manage Azure Firewall resources

Answer: a) Securely connect to Azure virtual machines using Remote Desktop Protocol (RDP)

True or False: Azure Bastion requires a public IP address for each virtual machine that you want to connect to.
– a) True
– b) False

Answer: b) False

What is the primary advantage of using Azure Bastion instead of a traditional jump box or Virtual Private Network (VPN)?
– a) Faster connection speeds
– b) Improved scalability
– c) Lower cost
– d) Stronger security

Answer: d) Stronger security

What protocol does Azure Bastion use to connect to virtual machines?
– a) Secure Shell (SSH)
– b) Virtual Private Network (VPN)
– c) Remote Desktop Protocol (RDP)
– d) Telnet

Answer: c) Remote Desktop Protocol (RDP)

True or False: Azure Bastion requires the deployment of any additional agents or software on the target virtual machines.
– a) True
– b) False

Answer: a) True

Which Azure service provides just-in-time (JIT) access to Azure virtual machines?
– a) Azure Automation
– b) Azure Security Center
– c) Azure Sentinel
– d) Azure Kubernetes Service (AKS)

Answer: b) Azure Security Center

True or False: Just-in-Time (JIT) Access is enabled by default for all virtual machines in Azure.
– a) True
– b) False

Answer: b) False

What are the three essential steps to configure just-in-time (JIT) access in Azure Security Center? (Select three)
– a) Enable JIT on the virtual machine’s Network Security Group (NSG)
– b) Configure the allowed ports and protocols for JIT access
– c) Specify the allowed IP addresses from which JIT access can be initiated
– d) Enable Azure Security Center standard tier
– e) Install a JIT agent on the virtual machine

Answer: b) Configure the allowed ports and protocols for JIT access, c) Specify the allowed IP addresses from which JIT access can be initiated, d) Enable Azure Security Center standard tier

True or False: Just-in-time (JIT) access can only be configured for Azure virtual machines with Windows operating systems.
– a) True
– b) False

Answer: b) False

Which role is required to configure just-in-time (JIT) access in Azure Security Center?
– a) Owner
– b) Reader
– c) Security Admin
– d) Contributor

Answer: a) Owner

0 0 votes
Article Rating
Subscribe
Notify of
guest
19 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
William Wilson
7 months ago

Azure Bastion or JIT? What do you guys think is more secure for administrative access to session hosts in Azure Virtual Desktop?

Ethel Nguyen
1 year ago

Great post! Thanks for sharing this detailed comparison.

Rad Pankevich
9 months ago

Quick question: Can we use JIT to secure access to Linux-based session hosts as well?

Mia Margaret
1 year ago

I appreciate the depth of information in this blog. It really helped me understand the options.

آراد زارعی
1 year ago

Personally, I’ve found configuring Bastion to be straightforward, but JIT seems to offer a more granular level of control. Thoughts?

David Murphy
1 year ago

For an exam like AZ-140, do you need to master both Azure Bastion and JIT, or can you focus on just one?

Georgina Huntjens
9 months ago

Thanks for this post! It cleared up a lot of confusion I had about Azure Bastion and JIT.

Alessandro Fernandez
10 months ago

What about cost implications? Is one significantly cheaper than the other?

19
0
Would love your thoughts, please comment.x
()
x