diff --git a/docs/pages/access-controls/guides/per-session-mfa.mdx b/docs/pages/access-controls/guides/per-session-mfa.mdx
index 7321d167f4091..0b1a798ed1a5e 100644
--- a/docs/pages/access-controls/guides/per-session-mfa.mdx
+++ b/docs/pages/access-controls/guides/per-session-mfa.mdx
@@ -1,24 +1,27 @@
---
title: Per-session MFA
-description: Require MFA checks for user SSH and Kubernetes sessions.
+description: Require MFA checks to initiate sessions.
videoBanner: j8Ze7HhjFGw
---
# Per-session MFA
-Teleport supports multi-factor authentication on every SSH and Kubernetes
-"connection" (a single `tsh ssh` or `kubectl` call). This is an advanced
-security feature that protects users against compromises of their on-disk
-Teleport certificates.
+Teleport supports requiring additional multi-factor authentication checks
+when starting new:
-
+- SSH connections (a single `tsh` call)
+- Kubernetes sessions (a single `kubectl` call)
+- Desktop sessions
+This is an advanced security feature that protects users against compromises of
+their on-disk Teleport certificates.
+
+
In addition to per-session MFA, enable login MFA in your SSO provider and/or
for all [local Teleport
users](../../setup/reference/authentication.mdx#local-no-authentication-connector)
to improve security.
-
-
+
@@ -93,8 +98,8 @@ spec:
...
```
-Role-specific enforcement only applies when accessing SSH nodes or Kubernetes
-clusters matching that role's `allow` section.
+Role-specific enforcement only applies when accessing resources matching a
+role's `allow` section.
#### Roles example
@@ -174,7 +179,6 @@ $ tsh ssh prod3.example.com
If per-session MFA was enabled cluster-wide, Jerry would be prompted for MFA
even when logging into `dev1.example.com`.
-
## Database access MFA
Database access supports per-connection MFA. When Jerry connects to the database
@@ -213,3 +217,5 @@ Current limitations for this feature are:
If you enable per-session MFA checks cluster-wide, you will not be able to
use Application access. We're working on integrating per-session
MFA checks for these clients.
+- For Desktop Access, only WebAuthn devices are supported. Teleport does not
+ support U2F devices for Desktop Access MFA.