AVD is the Microsoft VDI solution that has global Microsoft managed PAAS components such as Remote gateway, Web Access, and Broker services. Now, you can use Azure private links to connect to these remote resources privately and securely. With private endpoints, you no longer expose your services to the public internet. Using Microsoft's backbone, session hosts will connect to the PAAS components by internal IP addresses. Also, if required, you can configure clients to connect only through the Site-to-site VPN or Express route.
This is a two-part article series, and from this first article, I will configure private endpoints for the session host to the Microsoft AVD control plan and make that connectivity private.
AVD is a half PAAS solution, meaning Microsoft maintains VDI components such as Gateway, Broker, and Web services. Since these services are hosted in Microsoft's internal network, we had to connect to these services through the public internet. However, with the latest introduction of private links for AVD, we can now connect to these services through private endpoints. There are three corresponding resources we can configure with private endpoints.
Initial feed discovery - This is the end user's client device identification of the AVD feed URL - https://rdweb.wvd.microsoft.com/api/arm/feeddiscovery. Through private network.
Feed Download – AVD client downloading user application group resources
Connection to host pools – Configuring the connectivity between session hosts and AVD control plane traffic through private networks.
You don't need to configure all the private endpoints mentioned above. You can decide what components need to be enabled for internal network connectivity according to your requirements. For example, if your users need to connect from the public internet, but you want to secure session hosts to Microsoft-managed AVD components, you can only Implement Private endpoints for Connections to host pools.
Here are the supported scenarios.
You need to enable this from the subscription level. Navigate to Subscription – Preview features – search for Azure Virtual Desktop Private link - Register
So I'm selecting the second option – Enable public access for end users, use private access for session hosts.
This step is required if you use on-premise DNS as your primary DNS service in Azure and AVD session hosts.
If all works fine, your session hosts will connect to managed services using a private IP address, and now it's not a requirement to enable outbound internet to Microsoft managed services. In my next post - Configuring Private Links for Azure Virtual Desktop – Part 2 Private Endpoints for Feed Discovery and Download, let's discuss how to make Feed Discovery and Feed Download work through private networks.
I hope this post is helpful.