Managing external identities to enable secure access for partners, customers, and other non-employees
Hello Wojciech Błażejewski,
This is expected behavior and not a configuration issue.
AADLoginForWindows does not support B2B guest users for interactive sign‑in to Entra‑joined Azure VMs. When a guest user signs in, authentication happens in the user’s home tenant, but the VM’s device object exists only in your tenant. As a result, the home tenant cannot resolve the target device, leading to AADSTS293004, which is by design.
Currently, only member users from the same tenant that owns the VM can sign in to Entra‑joined VMs using AADLoginForWindows. Cross‑tenant (B2B) OS‑level sign‑in is not supported.
Supported alternatives:
- Create member user accounts in your tenant and assign Virtual Machine User Login
- Use local or domain accounts for VM access
- Use Azure Virtual Desktop (AVD), which does support B2B guest access scenarios
So there is no workaround to enable this with guest accounts today—you’ve reached a product limitation, not a misconfiguration.