Hi @Kay Jay ,
In order to use Microsoft Entra credentials to connect to the VM, using RDP, you need to meet the following requirements after the Azure AD Login Window extension is installed:
- Enable Microsoft Entra login for the VM by following the steps here (either creating the VM with the login enabled via the portal, or using Azure Cloud Shell to enable the login on an existing VM).
- Then you need to assign the Virtual Machine Administrator Login or Virtual Machine User Login role for the VM through either the Microsoft Entra admin center experience or Azure Cloud Shell.
- Sign in either via passwordless or WHFB method with an account that has the correct role assigned. https://learn.microsoft.com/en-us/entra/identity/devices/howto-vm-sign-in-azure-ad-windows#log-in-using-passwordless-authentication-with-microsoft-entra-id
Note that the Windows client machine is required to be either Microsoft Entra registered, or Microsoft Entra joined or Microsoft Entra hybrid joined to the same directory as the VM.
https://learn.microsoft.com/en-us/entra/identity/devices/howto-vm-sign-in-azure-ad-windows
If you have followed the steps from the deployment guide but still run into issues, you can follow the troubleshooting steps from the same guide. https://learn.microsoft.com/en-us/entra/identity/devices/howto-vm-sign-in-azure-ad-windows#troubleshoot-deployment-problems
Note that the feature currently supports the following distributions:
- Windows Server 2019 Datacenter and later
- Windows 10 1809 and later
- Windows 11 21H2 and later
If you have confirmed all of these steps but still run into any issues, please let me know and share more details about the errors you are facing, and I will gladly help troubleshoot.
If the information helped you, please Accept the answer. This will help us as well as others in the community who may be researching similar questions.