Skip to content

Commit 237c5f5

Browse files
committed
AVD on HCI identity minor tweak
1 parent 924a068 commit 237c5f5

File tree

2 files changed

+5
-3
lines changed

2 files changed

+5
-3
lines changed

articles/virtual-desktop/azure-stack-hci-overview.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -85,6 +85,8 @@ Azure Virtual Desktop with Azure Stack HCI has the following limitations:
8585

8686
- Azure Stack HCI supports many types of hardware and on-premises networking capabilities, so performance and user density might vary compared to session hosts running on Azure. Azure Virtual Desktop's [virtual machine sizing guidelines](/windows-server/remote/remote-desktop-services/virtual-machine-recs) are broad, so you should use them for initial performance estimates and monitor after deployment.
8787

88+
- You can only join session hosts on Azure Stack HCI to an Active Directory Domain Services domain.
89+
8890
## Next steps
8991

9092
To learn how to deploy Azure Virtual Desktop with Azure Stack HCI, see [Deploy Azure Virtual Desktop](deploy-azure-virtual-desktop.md).

articles/virtual-desktop/prerequisites.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -92,15 +92,15 @@ To access desktops and applications from your session hosts, your users need to
9292

9393
You need to join session hosts that provide desktops and applications to the same Microsoft Entra tenant as your users, or an Active Directory domain (either AD DS or Microsoft Entra Domain Services).
9494

95+
> [!NOTE]
96+
> Adding session hosts on Azure Stack HCI only is only supported with Active Directory Domain Services.
97+
9598
To join session hosts to Microsoft Entra ID or an Active Directory domain, you need the following permissions:
9699

97100
- For Microsoft Entra ID, you need an account that can join computers to your tenant. For more information, see [Manage device identities](../active-directory/devices/manage-device-identities.md#configure-device-settings). To learn more about joining session hosts to Microsoft Entra ID, see [Microsoft Entra joined session hosts](azure-ad-joined-session-hosts.md).
98101

99102
- For an Active Directory domain, you need a domain account that can join computers to your domain. For Microsoft Entra Domain Services, you would need to be a member of the [*AAD DC Administrators* group](../active-directory-domain-services/tutorial-create-instance-advanced.md#configure-an-administrative-group).
100103

101-
> [!NOTE]
102-
> Adding session hosts on Azure Stack HCI only supports using Active Directory Domain Services.
103-
104104
### Users
105105

106106
Your users need accounts that are in Microsoft Entra ID. If you're also using AD DS or Microsoft Entra Domain Services in your deployment of Azure Virtual Desktop, these accounts need to be [hybrid identities](../active-directory/hybrid/whatis-hybrid-identity.md), which means the user accounts are synchronized. You need to keep the following things in mind based on which identity provider you use:

0 commit comments

Comments
 (0)