Skip to content

Commit 4304eb1

Browse files
authored
Update howto-vm-sign-in-azure-ad-windows.md
1 parent 3fbbb60 commit 4304eb1

File tree

1 file changed

+8
-8
lines changed

1 file changed

+8
-8
lines changed

articles/active-directory/devices/howto-vm-sign-in-azure-ad-windows.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ This feature currently supports the following Windows distributions:
5050
- Windows 10 1809 and later
5151

5252
> [!IMPORTANT]
53-
> Remote connection to VMs joined to Azure AD is allowed only from Windows 10 or later PCs that are Azure AD registered (starting with Windows 10 20H1), Azure AD joined, or hybrid Azure AD joined to the *same* directory as the VM.
53+
> Remote connection to VMs that are joined to Azure AD is allowed only from Windows 10 or later PCs that are Azure AD registered (starting with Windows 10 20H1), Azure AD joined, or hybrid Azure AD joined to the *same* directory as the VM.
5454
5555
This feature is now available in the following Azure clouds:
5656

@@ -215,7 +215,7 @@ az role assignment create \
215215
> [!NOTE]
216216
> If your Azure AD domain and login username domain don't match, you must specify the object ID of your user account by using `--assignee-object-id`, not just the username for `--assignee`. You can obtain the object ID for your user account by using [az ad user list](/cli/azure/ad/user#az-ad-user-list).
217217
218-
For more information on how to use Azure RBAC to manage access to your Azure subscription resources, see the following articles:
218+
For more information about how to use Azure RBAC to manage access to your Azure subscription resources, see the following articles:
219219

220220
- [Assign Azure roles by using the Azure CLI](../../role-based-access-control/role-assignments-cli.md)
221221
- [Assign Azure roles by using the Azure portal](../../role-based-access-control/role-assignments-portal.md)
@@ -236,7 +236,7 @@ You can enforce Conditional Access policies, such as multifactor authentication
236236
## Log in by using Azure AD credentials to a Windows VM
237237

238238
> [!IMPORTANT]
239-
> Remote connection to VMs joined to Azure AD is allowed only from Windows 10 or later PCs that are either Azure AD registered (minimum required build is 20H1) or Azure AD joined or hybrid Azure AD joined to the *same* directory as the VM. Additionally, to RDP by using Azure AD credentials, the user must belong to one of the two Azure roles, Virtual Machine Administrator Login or Virtual Machine User Login.
239+
> Remote connection to VMs that are joined to Azure AD is allowed only from Windows 10 or later PCs that are either Azure AD registered (minimum required build is 20H1) or Azure AD joined or hybrid Azure AD joined to the *same* directory as the VM. Additionally, to RDP by using Azure AD credentials, users must belong to one of the two Azure roles, Virtual Machine Administrator Login or Virtual Machine User Login.
240240
>
241241
> If you're using an Azure AD-registered Windows 10 or later PC, you must enter credentials in the `AzureAD\UPN` format (for example, `AzureAD\[email protected]`). At this time, you can use Azure Bastion to log in with Azure AD authentication [via the Azure CLI and the native RDP client mstsc](../../bastion/connect-native-client-windows.md).
242242
@@ -284,7 +284,7 @@ The AADLoginForWindows extension must be installed successfully for the VM to co
284284
| `curl -H Metadata:true "http://169.254.169.254/metadata/identity/oauth2/token?resource=urn:ms-drs:enterpriseregistration.windows.net&api-version=2018-02-01"` | Valid access token issued by Azure Active Directory for the managed identity that is assigned to this VM |
285285

286286
> [!NOTE]
287-
> You can decode the access token by using a tool like [calebb.net](http://calebb.net/). Verify that the `oid` value in the access token matches the managed identity assigned to the VM.
287+
> You can decode the access token by using a tool like [calebb.net](http://calebb.net/). Verify that the `oid` value in the access token matches the managed identity that's assigned to the VM.
288288
289289
1. Ensure that the required endpoints are accessible from the VM via PowerShell:
290290

@@ -331,14 +331,14 @@ Exit code -2145648607 translates to `DSREG_AUTOJOIN_DISC_FAILED`. The extension
331331
>
332332
> Attempts to connect to `enterpriseregistration.windows.net` might return 404 Not Found, which is expected behavior. Attempts to connect to `pas.windows.net` might prompt for PIN credentials or might return 404 Not Found. (You don't need to enter the PIN.) Either one is sufficient to verify that the URL is reachable.
333333
334-
1. If any of the commands fails with "Could not resolve host `<URL>`", try running this command to determine which DNS server the VM is using:
334+
1. If any of the commands fails with "Could not resolve host `<URL>`," try running this command to determine which DNS server the VM is using:
335335

336336
`nslookup <URL>`
337337

338338
> [!NOTE]
339339
> Replace `<URL>` with the fully qualified domain names that the endpoints use, such as `login.microsoftonline.com`.
340340
341-
1. See if specifying a public DNS server allows the command to succeed:
341+
1. See whether specifying a public DNS server allows the command to succeed:
342342

343343
`nslookup <URL> 208.67.222.222`
344344

@@ -364,7 +364,7 @@ You might get the following error message when you initiate a remote desktop con
364364

365365
![Screenshot of the message that says your account is configured to prevent you from using this device.](./media/howto-vm-sign-in-azure-ad-windows/rbac-role-not-assigned.png)
366366

367-
Verify that you have [configured Azure RBAC policies](../../virtual-machines/linux/login-using-aad.md) for the VM that grants the user the Virtual Machine Administrator Login or Virtual Machine User Login role.
367+
Verify that you've [configured Azure RBAC policies](../../virtual-machines/linux/login-using-aad.md) for the VM that grant the user the Virtual Machine Administrator Login or Virtual Machine User Login role.
368368

369369
> [!NOTE]
370370
> If you're having problems with Azure role assignments, see [Troubleshoot Azure RBAC](../../role-based-access-control/troubleshooting.md#azure-role-assignments-limit).
@@ -451,4 +451,4 @@ Another way to verify it is via Graph PowerShell:
451451

452452
## Next steps
453453

454-
For more information on Azure Active Directory, see [What is Azure Active Directory?](../fundamentals/active-directory-whatis.md).
454+
For more information about Azure AD, see [What is Azure Active Directory?](../fundamentals/active-directory-whatis.md).

0 commit comments

Comments
 (0)