Skip to content

Commit 3ba0977

Browse files
committed
Two-way trust requirement.
1 parent b2991b1 commit 3ba0977

File tree

1 file changed

+8
-6
lines changed

1 file changed

+8
-6
lines changed

articles/virtual-desktop/configure-single-sign-on.md

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to configure single sign-on for an Azure Virtual Desktop
44
ms.topic: how-to
55
author: dknappettmsft
66
ms.author: daknappe
7-
ms.date: 06/12/2023
7+
ms.date: 12/15/2023
88
---
99

1010
# Configure single sign-on for Azure Virtual Desktop using Microsoft Entra ID authentication
@@ -58,7 +58,7 @@ Before you can enable single sign-on, you must meet the following prerequisites:
5858

5959
- Your session hosts must be [Microsoft Entra joined](/entra/identity/devices/concept-directory-join) or [Microsoft Entra hybrid joined](/entra/identity/devices/concept-hybrid-join). Session hosts joined to Microsoft Entra Domain Services or to Active Directory Domain Services only aren't supported.
6060

61-
- [Install the Microsoft Graph PowerShell SDK](/powershell/microsoftgraph/installation) on your local device, or [Azure Cloud Shell](../cloud-shell/overview.md).
61+
- If your Microsoft Entra hybrid joined session hosts are in a different domain than your user accounts, there must be a two-way trust between the 2 domains. Without the two-way trust, connections will fall back to older authentication protocols.
6262

6363
- A supported Remote Desktop client to connect to a remote session. The following clients are supported:
6464

@@ -86,7 +86,9 @@ To configure the service principal, use the [Microsoft Graph PowerShell SDK](/po
8686

8787
[!INCLUDE [include-cloud-shell-local-powershell](includes/include-cloud-shell-local-powershell.md)]
8888

89-
2. Import the *Authentication* and *Applications* Microsoft Graph modules and connect to Microsoft Graph with the `Application.Read.All` and `Application-RemoteDesktopConfig.ReadWrite.All` scopes by running the following commands:
89+
2. [Install the Microsoft Graph PowerShell SDK](/powershell/microsoftgraph/installation) on your local device, or [Azure Cloud Shell](../cloud-shell/overview.md).
90+
91+
3. Import the *Authentication* and *Applications* Microsoft Graph modules and connect to Microsoft Graph with the `Application.Read.All` and `Application-RemoteDesktopConfig.ReadWrite.All` scopes by running the following commands:
9092

9193
```powershell
9294
Import-Module Microsoft.Graph.Authentication
@@ -95,14 +97,14 @@ To configure the service principal, use the [Microsoft Graph PowerShell SDK](/po
9597
Connect-MgGraph -Scopes "Application.Read.All","Application-RemoteDesktopConfig.ReadWrite.All"
9698
```
9799

98-
3. Get the object ID for each service principal and store them in variables by running the following commands:
100+
4. Get the object ID for each service principal and store them in variables by running the following commands:
99101

100102
```powershell
101103
$MSRDspId = (Get-MgServicePrincipal -Filter "AppId eq 'a4a365df-50f1-4397-bc59-1a1564b8bb9c'").Id
102104
$WCLspId = (Get-MgServicePrincipal -Filter "AppId eq '270efc09-cd0d-444b-a71f-39af4910ec45'").Id
103105
```
104106

105-
4. Set the property `isRemoteDesktopProtocolEnabled` to `true` by running the following commands. There's no output from these commands.
107+
5. Set the property `isRemoteDesktopProtocolEnabled` to `true` by running the following commands. There's no output from these commands.
106108

107109
```powershell
108110
If ((Get-MgServicePrincipalRemoteDesktopSecurityConfiguration -ServicePrincipalId $MSRDspId) -ne $true) {
@@ -114,7 +116,7 @@ To configure the service principal, use the [Microsoft Graph PowerShell SDK](/po
114116
}
115117
```
116118

117-
5. Confirm the property `isRemoteDesktopProtocolEnabled` is set to `true` by running the following commands:
119+
6. Confirm the property `isRemoteDesktopProtocolEnabled` is set to `true` by running the following commands:
118120

119121
```powershell
120122
Get-MgServicePrincipalRemoteDesktopSecurityConfiguration -ServicePrincipalId $MSRDspId

0 commit comments

Comments
 (0)