Hi, if you hit the “logon attempt failed” loop when using Entra ID with Bastion or native RDP, here's the fastest fix:
-Update the AAD extension on the VM to version ≥ 2.2.0 — older versions (like 1.3.0) don’t support Entra over Bastion.
-Use --auth-type AAD when launching Bastion via CLI — without it, the RDP file won’t trigger web-based auth and Entra login will fail.
-Log in using AzureAD******@domain.com (or just the UPN if a web prompt appears).
-Make sure your client PC is Entra registered or joined — otherwise AAD login isn’t allowed.
-Check RBAC: you need at least Reader + Virtual Machine User/Admin Login on the VM, NIC, and Bastion.
-If it still fails, check that the RDP file has enablerdsaadauth:i:1, make sure the VM name matches its Entra device object, avoid using guest accounts, and ensure the VM is properly Entra-joined (dsregcmd /status inside the VM).
One-liner to do it all:
az network bastion rdp -n BastionName -g BastionRG --target-resource-id <VMID> --auth-type AAD --enable-mfa true --configure
Bottom line: upgrade the extension, pass the right flag, and log in from an Entra-aware device , that fixes almost every case.