Azure Linux Remote Desktop



Usually you don’t need remote desktop or VNC on Linux servers running in the cloud. But as I wanted to try some scenarios with a Linux desktop and I actually don’t have a physical machine loaded with any Linux OS, I ended up setting up a Ubuntu server on Azure and enabling the remote desktop on it.

  1. Azure Linux Remote Desktop Client
  2. Azure Remote Desktop Client Linux
  3. Linux Remote Desktop To Windows
  4. Azure Linux Vm Remote Desktop

Obviously, I am not the first one who want to use remote desktop on servers running on cloud. There are plenty of posts on the internet talking about how to do it. Most of them are about using xrdp + xcfe4, including this one for Azure VMs. I am using Ubuntu 15.10 image. The only gotcha is that running the following command could uninstall the waagent service.

  1. Azure cloud services are perfect for hosting VM’s and offer ways for businesses to drive IT costs lower. The advantages of VM’s cannot be minimized so creating and accessing them are very important to get up and running as soon as possible as well as gaining access to them with Remote Desktop.
  2. In this post, I’ll walk you through setting up the Ubuntu Desktop on an Azure Virtual Machine and configure it. Tags: Linux, open source, remote desktop.

Install and configure Remote Desktop to connect to a Linux VM in Azure. Linux virtual machines (VMs) in Azure are usually managed from the command line using a secure shell (SSH) connection. When new to Linux, or for quick troubleshooting scenarios, the use of remote desktop may be easier.

Rdp

[code language=”bash”]
$sudo apt-get install ubuntu-desktop
[/code]

This is a known issue that you can track on the github.com. To get waagent back, you have to reinstall it with the following:

[code language=”bash”]
$sudo apt-get install –reinstall walinuxagent
[/code]

I ended up not installing the Ubuntu-desktop. Without it, you also avoid installing applications that you don’t need, such as those Office software. Mac apple store.

Although xcfe4 is good enough as a lightweight window management system, I am more used to a GNOME like desktop environment. So I decided to try the MATE desktop. The configuration of it is very easy. Just run the following:

[code language=”bash”]
sudo apt-get install xrdp
sudo apt-get install mate-desktop-environment
echo mate-session >~/.xsession
sudo service xrdp restart
[/code]

Azure Linux Remote Desktop Client

You may have to reboot the server after installing the desktop environment.

That’s all. I am using it now and so far so good.

Azure cloud services are perfect for hosting VM’s and offer ways for businesses to drive IT costs lower. The advantages of VM’s cannot be minimized so creating and accessing them are very important to get up and running as soon as possible as well as gaining access to them with Remote Desktop. If you are getting started with Azure here are instructions to accomplish creation of a VM and then connect to your virtual environment.

For anyone in need of testing VM’s, Remote Desktop is part of the mix of helpful tools for using Azure hosting services or even developing a virtual footprint.

  • Everything begins with accessing the Azure Portal and creating a virtual machine. Once an account is established on Azure, it is then time to lay some foundations with testing over a remote connection.
  • Within the dashboard, build a VM by clicking on New from the menu.
  • This action will bring you to a choice of operating systems. After clicking your choice, you are then presented with a form where you will name and configure your VM.
  • Among the other settings you will choose are type of disk (SSD or HDD), the login credentials, the type of subscription, a resource group type and name, as well as the region where the VM will reside. Be aware that SSD is costlier than HDD if budget is a concern. If this is a test configuration, it may be best to stay with a HDD configuration and put your money into SSD-based VM’s for your high-end server needs.
  • The next step in the process is choosing your machine type. There will be several choices based on subscription and your choice of disk types. Once you have chosen the type and the amount of vCPU and memory, you’re ready to move to the next step.
  • Networking is the third step, where you will be presented with options to define your virtual network, subnet and other settings. The Auto-Shutdown feature is helpful because up-time is part of you cost in Azure. If the VM is not needed at all times, then this choice can cut costs, especially in a developmental environment. If you choose this setting you can define when the VM will be shutdown.
  • Once you complete all these steps, you are presented with a summary at which point you confirm and launch the VM creation process. After the VM build is completed, you are ready to begin working in your Azure environment. Once the VM is running, RDP (Remote Desktop) is now a primary tool to manage your virtual machine.

However, if you first try to use the connect button, you may find that it will be grayed out. In this case, you need to configure a Network Inbound Rule which will allow connectivity to the machine (via the firewall created with the VM). Creating these rules can be very important since you may have a variety of security configurations and concerns. The main idea is to create a rule that you will be able to use for a number of different VM’s. Also, regarding security, consider how many different IP addresses will be allowed to connect to your VM environment. For security purposes, the fewer addresses you allow the better, so plan appropriately.

Azure Remote Desktop Client Linux

To access Network Inbound Rules, find Network Security Group in your Azure Portal dashboard. You may well find that applying some basic rules to your future VM’s will be helpful. To complete creating the rule, you will need the port number used by RDP which is 3389. With this inbound rule now defined, you can use RDP to connect to your VM.

When using RDP be aware that there are a number of options available. These can range from local accounts to domain logons. It will be up to you to use Azure’s security to manage what accounts will have access over RDP to your VM’s. Policies can be set in place which allow regular users frequent access via domain accounts over the RDP client. Accounts used for support and management can be placed in a separate policy since these may have administrative access. Other account level access can also be managed through security policies which you can create.

Desktop

Linux Remote Desktop To Windows

Azure linux remote desktop server

Azure Linux Vm Remote Desktop

Here are some quick instructions to connect with the RDP client: Mac os x software, free download.

  • From your Azure dashboard, click into Virtual Machines.
  • Select a VM to log onto with RDP.
  • There will be a connect symbol to click at the top of the VM page.
  • Clicking the symbol will trigger the “Connect to Virtual Machine” page from which you choose options and then click to “Download RDP file”.
  • Once downloaded, click to open the file and connect (there may be a notice that the file is from unknown publisher but this is not unusual).
  • The Windows security page will appear where you will enter login credentials for the local VM or domain account you intend to use.

Note that, unless the VM is a domain controller you will either use a local VM account or a domain user account. This means that if you are using a local account, you will enter the name of your VM as the domain name (vmnameusername). Otherwise, if the VM is a domain member, you will enter the domain name and account (domainusername). In both cases there should be a password for the account being use which you already have. If your VM is a domain controller you must login with the credentials for a domain administrator account. Click “Yes” to verify connectivity and you should be logged onto your VM.

VM’s are extremely handy tools for creating virtual desktops and servers, so when you begin your Azure experience make sure you understand how to create and access them. Using security best practices will help you manage users accessing the virtual network appropriately while keeping intrusions to a minimum. Because of the nature of the VM’s, RDP becomes an essential way to access them, so managing inbound rules with security groups and appropriately assigning user account security policies is most important. However, you can create and run VM’s very quickly in your environment with little trouble and begin building your virtual network.

What apps free download. To learn more about Azure products, RDP or RDS, contact the cloud experts at RoyalDiscount.com.





Comments are closed.