You can enable multi-factor authentication (MFA) in Parallels DaaS using Microsoft Entra ID (Azure AD). When users sign up to Parallels DaaS User Portal, they will be prompted to complete MFA. For additional security, Parallels DaaS assigns users to virtual machines “just in time”, thus preventing unauthorized access.
Note: Conditional access requires a Microsoft Azure P1 license. For most organizations, this will be included in your Microsoft 365 E3 or Microsoft Business premium licenses.
To enable MFA in Microsoft Entra ID:
Navigate to the Microsoft Azure portal at https://portal.azure.com.
Go to Microsoft Entra Conditional Access.
Select Create new policy.
Specify a name and assign the policy to a group of users. Its recommended to test the effects of the policies on a limited set of users before enabling it for all users.
Set Target resources to include your Parallels DaaS app registration (or all cloud apps) and exclude Azure Windows VM Sign-In.
Go to Grant, and select Grant Access.
Enable Require multifactor authentication.
Choose Select.
Enable the policy and click Create.
Depending on your organization's preferences, policies can be tailored to your specific needs.