AVD AAD-only cannot connect with desktop client

Steve 1 Reputation point
2022-06-22T14:51:22.277+00:00

I deployed (and re-deployed and redeployed) an AVD host pool. The tenant environment is hybrid, but the users that will be logging in aren't being synced with AD and only exist in the cloud. I had to add
enablecredsspsupport:i:0;authentication level:i:2;targetisaadjoined:i:1;
to the host pool RDP custom properties and then manually add the azure users with cmd to the remote desktop users group on the VM before it would even allow an AAD-only user to login.

Users added with net localgroup "remote desktop users" /add "AzureAD\******@domain.com"

I also tried adding them without the "AzureAD\" but got an error saying there is no such global user or group.

Users are able to log in via the web portal entering their username as "AzureAD\username@keyman .com". I've excluded the "Azure Windows VM Sign-in" and "Azure Virtual Desktop" from the CAP requiring MFA. My problem is that the users cannot login via the desktop client. These are remote users that will be using their own equipment and will require camera redirection (which isn't available in the web client). When signing in with the desktop client it allows signing into the app, but just spins when connecting to the session host displaying alternating "Initiating remote connection" and "Securing remote connection" messages. When refreshing the event log on the session host during the login attempt it's showing "Event 4625: Unkown user name or bad password". The other (but not as important) issue is that hybrid users that are synced with onsite-AD cannot log in via the web client or desktop client after being added in the same fashion. We don't need to be able to give them access at this point, but may be useful in the future.
213857-image.png

213934-image.png

Azure Virtual Desktop
Azure Virtual Desktop
A Microsoft desktop and app virtualization service that runs on Azure. Previously known as Windows Virtual Desktop.
Windows for business | Windows Client for IT Pros | User experience | Remote desktop services and terminal services
{count} votes

1 answer

Sort by: Most helpful
  1. James Tighe 51 Reputation points
    2022-07-07T12:33:30.043+00:00

    For the permission to log in to the Azure VM you should just assign the users to one of the following RBACs roles. No need to add them manually to groups on the VM.

    • Virtual Machine User Login - Standard user
    • Virtual Machine Administrator Login - Local Admin

    This allows login to the Azure AD Joined machine.

    That combined with the targetisaadjoined:1 added to the RDP Properties should be all you need to allow access.

    1 person found this answer helpful.
    0 comments No comments

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.