Prepare access to on-premises resources
In Microsoft Managed Desktop, devices are automatically joined to Microsoft Entra ID. For this reason, if you're using an on-premises Active Directory, you must ensure that devices joined to Microsoft Entra ID can communicate with your on-premises Active Directory.
Note
Hybrid Microsoft Entra join is not supported by Microsoft Managed Desktop.
Microsoft Entra ID lets your users take advantage of Single Sign-On (SSO). Single Sign-on means they typically won't have to provide credentials every time they use resources.
For information about joining Microsoft Entra ID, refer to How to: Plan your Microsoft Entra join implementation. For background information about Single Sign-On (SSO) on devices joined to Microsoft Entra ID, see How SSO to on-premises resources works on Microsoft Entra joined devices.
This article explains the things you must check in order to ensure that apps, and other resources that depend on local Active Directory connectivity, will work smoothly with Microsoft Managed Desktop.
Single Sign-On for on-premises resources
Single Sign-On (SSO) by using UPN and password is enabled by default on Microsoft Managed Desktop Devices. But your users can also use Windows Hello for Business, which requires some extra setup steps.
Single Sign-On by using UPN and password
In most organizations, your users will be able to use SSO to authenticate by UPN and password on Microsoft Managed Desktop Devices. To make sure this function will work, you should double-check the following things:
- Confirm that Microsoft Entra Connect is set up. It must use an on-premises Active Directory server running Windows Server 2008 R2 or later.
- Confirm that Microsoft Entra Connect is running a supported version. It must be set to sync these three attributes with Microsoft Entra ID:
- DNS domain name of the on-premises Active Directory (where the users are located).
- NetBIOS of your on-premises Active Directory (where the users are located).
- SAM account name of the user.
Single Sign-On by using Windows Hello for Business
Microsoft Managed Desktop devices also offer your users a fast, password-less experience by employing Windows Hello for Business. To ensure Windows Hello for Business will work without your users having to provide respective UPN and password, visit Configure Microsoft Entra joined devices for On-premises Single-Sign On using Windows Hello for Business to check the requirements, and then follow the steps provided there.
Apps and resources that use authentication
Refer to Understand considerations for applications and resources in the Azure content set for full guidance on setting up apps to work with Microsoft Entra ID. In summary:
App or service | Task |
---|---|
Cloud-based apps | If you use cloud-based apps, such as those added to the Microsoft Entra app gallery, most don't require any further preparation to work with Microsoft Managed Desktop. However, any Win32 apps that don't use Web Account Manager (WAM) might still prompt users for authentication. |
Apps hosted on-premises | For apps that are hosted on-premises, be sure to add those apps to the trusted sites list in your browsers. This step will enable Windows authentication to work seamlessly, without users being prompted for credentials. To add apps, refer to Trusted sites in the Configurable settings reference. |
Active Directory Federated Services | If you're using Active Directory Federated Services, check that SSO is enabled by using the steps in Verify and manage single sign-on with AD FS. |
On-premises apps using older protocols | For apps that are on-premises and use older protocols, no extra setup is required, as long as the devices have access to an on-premises domain controller to authenticate. To provide secure access for these applications, however, you should deploy Microsoft Entra application proxy. For more information, see Remote access to on-premises applications through Microsoft Entra application proxy. |
On-premises apps with on machine authentication | Apps that run on-premises and rely on machine authentication aren't supported, so you should consider replacing them with newer versions. |
Network shares that use authentication
No extra setup is required for users to access network shares, as long as the devices have access to an on-premises domain controller by using a UNC path.
Printers
Microsoft Managed Desktop devices can't connect to printers that are published to your on-premises Active Directory unless you have configured Hybrid Cloud Print.
While printers can't be automatically discovered in a cloud only environment, your users can use on-premises printers by using the printer path, or printer queue path, as long as the devices have access to an on-premises domain controller.