When connecting to an Azure VM with AAD enabled, the accounts do not work

Hannes Brunner 16 Reputation points
2021-02-08T12:02:44.047+00:00

My assigned user accounts for admin and normal users from AAD are not accepted in a Windows VM. The following error messages occur in the event viewer on the VM:

AAD Cloud AP plugin call Lookup name name from SID returned error: 0xC00485D3

and

Http request status: 400. Method: GET Endpoint Uri: https://login.microsoftonline.com/<Removed> Correlation ID: <Removed>

AzureAdPrt is NO

Windows 10
Windows 10
A Microsoft operating system that runs on personal computers and tablets.
10,655 questions
Azure Virtual Machines
Azure Virtual Machines
An Azure service that is used to provision Windows and Linux virtual machines.
7,157 questions
Microsoft Entra ID
Microsoft Entra ID
A Microsoft Entra identity service that provides identity management and access control capabilities. Replaces Azure Active Directory.
19,559 questions
{count} votes

6 answers

Sort by: Most helpful
  1. Roger Platt 0 Reputation points
    2023-08-07T16:30:21.3766667+00:00

    We experienced this issue during a POC of Dev Box and tracked it down to WS-Trust protocol being disabled on the ADFS servers in our environment last month due to the documented Microsoft best practice document to eliminate inherent vulnerabilities. https://learn.microsoft.com/en-us/windows-server/identity/ad-fs/deployment/best-practices-securing-ad-fs#disable-ws-trust-windows-endpoints-on-the-proxy-from-extranet As such, any federated organization that has followed this best practice to disable this protocol will be unable to authenticate to a Dev Box or likely other VM's using a federated login relying on WS-trust.

    0 comments No comments