Some users unable to connect to Azure Virtual Desktop host via Windows App

Daniel Monroe 15 Reputation points
2025-03-25T19:19:25.22+00:00

We currently have an AVD host pool of 3 session hosts joined to an Entra Domain Services domain. Some of our users are able to connect successfully by entering their AD credentials in the login prompt after clicking Connect. Others never receive the login prompt. Connections through the web client are working, so we have ruled out any permissions or specific AD authentication issues. Connection through the Windows App also succeeds on fresh machines. The issue only occurs with existing Windows installations that have signed in to organization accounts before installing Windows App. These machines are all Entra Registered and not Entra Joined.

We suspect there is some kind of token being passed by those users' workstations. This appears to be confirmed by the Entra sign-in logs. See below.

User's image

Under Authentication Details, the sign-in attempts show Authentication method: Previously satisfied and Result detail: First factor requirement satisfied by claim in the token. See below.

User's image

Unfortunately, Entra-only authentication is not an option for this implementation and we must stick with Entra Domain Services for these session hosts. Any help and insight would be greatly appreciated!

Azure Virtual Desktop
Azure Virtual Desktop
A Microsoft desktop and app virtualization service that runs on Azure. Previously known as Windows Virtual Desktop.
1,835 questions
{count} votes

1 answer

Sort by: Most helpful
  1. Christian Gamwo 5 Reputation points
    2025-06-06T08:07:34.28+00:00

    Hello,

    After months of troubleshooting, we successfully resolved our authentication issue yesterday.

    The problem stemmed from Windows applications on all Azure AD-joined computers attempting to authenticate against an on-premises Active Directory that was decommissioned two years ago.

    To address this, we modified the RDP properties on the host pools as follows: Navigate to Settings > RDP Properties > Advanced, then add the following value:

    ;enablerdsaadauth:i:1

    After saving the changes, authentication is now correctly routed through Microsoft Entra.

    This simple adjustment resolved the issue for us, and I hope it proves useful for others facing similar challenges.

    1 person found this answer helpful.

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.