Hello Schäfer, Lukas
Here's how to troubleshoot RDP access to your Azure VM (Windows 11 Multi-Session) using a shared link (Bastion) with Azure Active Directory (Azure AD) users:
1. Verify Azure AD User Permissions:
- Reader Role on Bastion: Ensure the Azure AD users you're trying to access the VM with have the "Reader" role assigned to the Azure Bastion resource or the resource group where it resides. This grants them basic access to connect via Bastion.
- Virtual Machine User Login Role: Additionally, users need the "Virtual Machine User Login" role assigned at the scope of the VM or the resource group where the VM resides. This allows them to log in to the specific VM using RDP.
2. Check Security Group Rules:
- Inbound RDP Rule: Verify that your VM's Network Security Group (NSG) has an inbound rule allowing RDP connections on port 3389 from the Bastion subnet. This is crucial for RDP traffic to reach the VM.
3. Bastion Host Configuration:
- RDP Protocol Enabled: Double-check that the RDP protocol is enabled within your Azure Bastion configuration.
4. Local User Permissions (Optional):
- Temporary Access: If you're still encountering issues, consider creating a temporary local user account on the VM with RDP access for testing purposes. This can help isolate whether the problem lies with Azure AD user permissions or the RDP configuration on the VM itself.
Troubleshooting Steps:
- Review Azure AD Permissions: Go to the Azure portal, navigate to your Bastion resource or resource group, and verify the assigned roles for the Azure AD users.
- Check NSG Rules: Locate the NSG associated with your VM and ensure the inbound RDP rule is present and configured correctly.
- Bastion Configuration: Review your Bastion configuration to confirm RDP protocol is enabled.
- Test with Local User (Optional): Create a temporary local user on the VM and try RDP access through Bastion with that account.Here's how to troubleshoot RDP access to your Azure VM (Windows 11 Multi-Session) using a shared link (Bastion) with Azure Active Directory (Azure AD) users: 1. Verify Azure AD User Permissions:
- Reader Role on Bastion: Ensure the Azure AD users you're trying to access the VM with have the "Reader" role assigned to the Azure Bastion resource or the resource group where it resides. This grants them basic access to connect via Bastion.
- Virtual Machine User Login Role: Additionally, users need the "Virtual Machine User Login" role assigned at the scope of the VM or the resource group where the VM resides. This allows them to log in to the specific VM using RDP.
2. Check Security Group Rules:
- Inbound RDP Rule: Verify that your VM's Network Security Group (NSG) has an inbound rule allowing RDP connections on port 3389 from the Bastion subnet. This is crucial for RDP traffic to reach the VM.
3. Bastion Host Configuration:
- RDP Protocol Enabled: Double-check that the RDP protocol is enabled within your Azure Bastion configuration.
4. Local User Permissions (Optional):
- Temporary Access: If you're still encountering issues, consider creating a temporary local user account on the VM with RDP access for testing purposes. This can help isolate whether the problem lies with Azure AD user permissions or the RDP configuration on the VM itself.
Troubleshooting Steps:
- Review Azure AD Permissions: Go to the Azure portal, navigate to your Bastion resource or resource group, and verify the assigned roles for the Azure AD users.
- Check NSG Rules: Locate the NSG associated with your VM and ensure the inbound RDP rule is present and configured correctly.
- Bastion Configuration: Review your Bastion configuration to confirm RDP protocol is enabled.
- Test with Local User (Optional): Create a temporary local user on the VM and try RDP access through Bastion with that account.