Hi!, reaching out in desperation, we have been battling an issue with getting a new AVD environment up for a couple of days now and all help appreciated at this point!
- We have Azure AD joined session host VMs in Azure AVD
- Site to site VPN back to on-prem. The sessions hosts can ping and speak to all on-prem DC's on all ports at this time.
- Identities sync'd from On-prem ADDS
When logging into an Azure session host, we get no on-prem Kerberos ticket. Testing access to file shares gives a 30 second delay where it then prompts for creds (failing from Kerberos to windows credential manager)
We get the following errors on the Azure VM within the Microsoft / Windows / AAD logs:
- Event ID 1104 - AAD Cloud AP plugin call Lookup name name from SID returned error: 0xC00485D3
- Event ID 1025 - Http request status: 400. Method: GET Endpoint Uri: https://login.microsoftonline.com/redacted-tenant-id/sidtoname Correlation ID: 6872DA22-C1F7-4EEF-BB7F-F30BAC67F1E1
- Event ID 1241 - On-prem tgt error: On-prem configuration is missing
If we build a workgroup VM on-prem and then Azure AD join it, on-prem sso works as expected, klist shows kerberos keys from On-Prem DC's, sso access to fileshares works quickly, dsregcmd shows onprem tgt: yes
So our conclusion is that the tenant / AD / Kerberos configuration appears to be ok but something about using SSO to on-prem resources from an Azure AD joined VM in Azure is not working.
A lot of focus has been on the site to site VPN although all testing so far including wiresharks on the azure session hosts suggest that the hosts are not even attempting Kerberos back to on-prem DC's.
Can anyone offer any insight on this one?
Thanks in advance!