A Microsoft desktop and app virtualization service that runs on Azure. Previously known as Windows Virtual Desktop.
Hello Sergey,
In a pure Azure AD-joined (cloud-only) Azure Virtual Desktop environment, per-user FSLogix authentication to Azure Files using Azure AD Kerberos is currently supported in preview. It does not require Hybrid Join or on-prem AD, but it has strict prerequisites and limitations. Azure AD Domain Services is not mandatory, however it is still the only fully GA and production-proven option for per-user FSLogix authentication without preview constraints.
The behavior you’re seeing typically means Azure AD Kerberos tickets are not being issued. That explains why klist shows zero tickets, FSLogix reports it cannot contact a domain controller, and sessions fail with 0xF errors. In cloud-only setups, Azure AD Kerberos replaces the domain controller. If ticket retrieval fails for any reason, profiles will not mount.
Please check the following required configurations are as mentioned:
- Make sure the CloudKerberosTicketRetrievalEnabled setting is deployed through Intune Settings Catalog. OMA-URI does not work reliably on AVD multi-session and can silently fail.
- Confirm these Windows services are running on the session hosts:
WinHttpAutoProxySvcandIP Helper(iphlpsvc). If either is disabled, Kerberos tickets will not be retrieved. - Verify that admin consent has been granted to the enterprise application created for your storage account, in the format storageaccount.file.core.windows.net.
- If you are using Private Endpoints, ensure the app registration also includes storageaccount.privatelink.file.core.windows.net in the identifier URIs. This is a common cause of failure even when DNS and port 445 are working.
- Confirm the storage account enterprise app is excluded from Conditional Access policies that enforce MFA. Azure AD Kerberos does not support MFA.
To answer your specific questions:
- CloudKerberosTicketRetrievalEnabled works with pure Azure AD Join and cloud-only remains in preview.
- Hybrid Join is not required.
- Azure AD Domain Services is not mandatory, but it is the only fully globally available (GA) option today.
- There is no GA alternative for cloud-only FSLogix with Azure Files.
- If no Kerberos tickets are issued, the issue is usually policy delivery, required services, app consent, Private Endpoint configuration, or Conditional Access, not RBAC or networking alone.
References: