Yandex Cloud
Search
Contact UsGet started
  • Blog
  • Pricing
  • Documentation
  • All Services
  • System Status
    • Featured
    • Infrastructure & Network
    • Data Platform
    • Containers
    • Developer tools
    • Serverless
    • Security
    • Monitoring & Resources
    • ML & AI
    • Business tools
  • All Solutions
    • By industry
    • By use case
    • Economics and Pricing
    • Security
    • Technical Support
    • Customer Stories
    • Cloud credits to scale your IT product
    • Gateway to Russia
    • Cloud for Startups
    • Education and Science
    • Yandex Cloud Partner program
  • Blog
  • Pricing
  • Documentation
© 2025 Direct Cursus Technology L.L.C.
Yandex Cloud Desktop
  • Getting started
    • Desktops and their groups
    • Access control list (ACL)
    • Disks
    • Images
    • User desktop showcase
    • Quotas and limits
  • Access management
  • Pricing policy
  • Cloud Desktop events
  1. Concepts
  2. Desktops and their groups

Desktops and their groups

Written by
Yandex Cloud
Updated at April 9, 2025

In Cloud Desktop, the main resource is a desktop. This is a virtual Linux or Windows-based (soon to come) workspace deployed in the Yandex Cloud infrastructure.

Users connect to desktops over the Remote Desktop Protocol (RDP).

You can create desktops as part of desktop groups. All desktops in a group share the same computing resources, the same network, and the same OS image.

For each group, you can choose one of the options to assign desktops to users:

  • Desktop is assigned to one user.
  • (Soon to come) Desktop is not assigned to a user but provided at the time of connection. After the user is disconnected, the desktop can be taken by another user.

All desktop and desktop group operations are logged.

A desktop is available to organization users created in Cloud Organization.

Cloud Desktop leverages Yandex Identity and Access Management roles and access control lists (ACL) to manage access. This example shows how access control works in Cloud Desktop.

Was the article helpful?

Previous
Viewing operations with resources
Next
Access control list (ACL)
© 2025 Direct Cursus Technology L.L.C.