https://catalogartifact.azureedge.net/publicartifacts/microsoft.aadlogin-windows-arc-1.0.9/Icons/Large.png

Microsoft Entra based Windows Server Login

Microsoft Corp. द्वारा

This extension configures your Windows Server VM for Microsoft Entra based login.

Supported operating systems: Windows Server 2025 with Desktop Experience, Windows 11 24H2, or later.

There are many security benefits of using Microsoft Entra login to Windows Server VMs in Azure, including:
    `
  • Use your Microsoft Entra credentials to log in to Azure Windows Server VMs.
  • Reduce reliance on local administrator accounts, credential theft, and weak credentials.
  • Password complexity and password lifetime policies configured for Microsoft Entra help secure Windows Server VMs as well.
  • With Azure role-based access control, specify who can login to a VM as a regular user or with administrator privileges. When users join or leave your team, you can update the Azure RBAC policy for the VM to grant access as appropriate. When employees leave your organization and their user account is disabled or removed from Microsoft Entra, they no longer have access to your resources.
  • With Conditional Access, configure policies to require multi-factor authentication and much more before you can RDP to Windows Server VMs.
  • Use Azure deploy and audit policies to require Microsoft Entra login for Windows Server VMs and to flag use of non-approved local accounts on the VMs.