Skip to content

Commit 0ca2cda

Browse files
authored
Merge pull request #182000 from Heidilohr/work-auth-links
Updating authorization article with link note
2 parents 69e012a + 03580b1 commit 0ca2cda

File tree

1 file changed

+4
-1
lines changed

1 file changed

+4
-1
lines changed

articles/virtual-desktop/authentication.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: Heidilohr
66

77
ms.service: virtual-desktop
88
ms.topic: conceptual
9-
ms.date: 08/16/2021
9+
ms.date: 12/07/2021
1010
ms.author: helohr
1111
manager: femila
1212
---
@@ -68,6 +68,9 @@ If you haven't already enabled [single sign-on](#single-sign-on-sso) or saved yo
6868
- macOS
6969
- Username and password
7070

71+
>[!IMPORTANT]
72+
>In order for authentication to work properly, your local machine must also be able to access the URLs in the [Remote Desktop clients](safe-url-list.md#remote-desktop-clients) section of our [required URL list](safe-url-list.md).
73+
7174
Azure Virtual Desktop supports both NT LAN Manager (NTLM) and Kerberos for session host authentication. Smart card and Windows Hello for Business can only use Kerberos to sign in. To use Kerberos, the client needs to get Kerberos security tickets from a Key Distribution Center (KDC) service running on a domain controller. To get tickets, the client needs a direct networking line-of-sight to the domain controller. You can get a line-of-sight by connecting directly within your corporate network, using a VPN connection or setting up a [KDC Proxy server](key-distribution-center-proxy.md).
7275

7376
### Single sign-on (SSO)

0 commit comments

Comments
 (0)