You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/devices/howto-vm-sign-in-azure-ad-windows.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -50,7 +50,7 @@ This feature currently supports the following Windows distributions:
50
50
- Windows 10 1809 and later
51
51
52
52
> [!IMPORTANT]
53
-
> Remote connection to VMs joined to Azure AD is allowed only from Windows 10 or later PCs that are Azure AD registered (starting with Windows 10 20H1), Azure AD joined, or hybrid Azure AD joined to the *same* directory as the VM.
53
+
> Remote connection to VMs that are joined to Azure AD is allowed only from Windows 10 or later PCs that are Azure AD registered (starting with Windows 10 20H1), Azure AD joined, or hybrid Azure AD joined to the *same* directory as the VM.
54
54
55
55
This feature is now available in the following Azure clouds:
56
56
@@ -215,7 +215,7 @@ az role assignment create \
215
215
> [!NOTE]
216
216
> If your Azure AD domain and login username domain don't match, you must specify the object ID of your user account by using `--assignee-object-id`, not just the username for `--assignee`. You can obtain the object ID for your user account by using [az ad user list](/cli/azure/ad/user#az-ad-user-list).
217
217
218
-
For more information on how to use Azure RBAC to manage access to your Azure subscription resources, see the following articles:
218
+
For more information about how to use Azure RBAC to manage access to your Azure subscription resources, see the following articles:
219
219
220
220
-[Assign Azure roles by using the Azure CLI](../../role-based-access-control/role-assignments-cli.md)
221
221
-[Assign Azure roles by using the Azure portal](../../role-based-access-control/role-assignments-portal.md)
@@ -236,7 +236,7 @@ You can enforce Conditional Access policies, such as multifactor authentication
236
236
## Log in by using Azure AD credentials to a Windows VM
237
237
238
238
> [!IMPORTANT]
239
-
> Remote connection to VMs joined to Azure AD is allowed only from Windows 10 or later PCs that are either Azure AD registered (minimum required build is 20H1) or Azure AD joined or hybrid Azure AD joined to the *same* directory as the VM. Additionally, to RDP by using Azure AD credentials, the user must belong to one of the two Azure roles, Virtual Machine Administrator Login or Virtual Machine User Login.
239
+
> Remote connection to VMs that are joined to Azure AD is allowed only from Windows 10 or later PCs that are either Azure AD registered (minimum required build is 20H1) or Azure AD joined or hybrid Azure AD joined to the *same* directory as the VM. Additionally, to RDP by using Azure AD credentials, users must belong to one of the two Azure roles, Virtual Machine Administrator Login or Virtual Machine User Login.
240
240
>
241
241
> If you're using an Azure AD-registered Windows 10 or later PC, you must enter credentials in the `AzureAD\UPN` format (for example, `AzureAD\[email protected]`). At this time, you can use Azure Bastion to log in with Azure AD authentication [via the Azure CLI and the native RDP client mstsc](../../bastion/connect-native-client-windows.md).
242
242
@@ -284,7 +284,7 @@ The AADLoginForWindows extension must be installed successfully for the VM to co
284
284
|`curl -H Metadata:true "http://169.254.169.254/metadata/identity/oauth2/token?resource=urn:ms-drs:enterpriseregistration.windows.net&api-version=2018-02-01"`| Valid access token issued by Azure Active Directory for the managed identity that is assigned to this VM |
285
285
286
286
> [!NOTE]
287
-
> You can decode the access token by using a tool like [calebb.net](http://calebb.net/). Verify that the `oid` value in the access token matches the managed identity assigned to the VM.
287
+
> You can decode the access token by using a tool like [calebb.net](http://calebb.net/). Verify that the `oid` value in the access token matches the managed identity that's assigned to the VM.
288
288
289
289
1. Ensure that the required endpoints are accessible from the VM via PowerShell:
290
290
@@ -331,14 +331,14 @@ Exit code -2145648607 translates to `DSREG_AUTOJOIN_DISC_FAILED`. The extension
331
331
>
332
332
> Attempts to connect to `enterpriseregistration.windows.net` might return 404 Not Found, which is expected behavior. Attempts to connect to `pas.windows.net` might prompt for PIN credentials or might return 404 Not Found. (You don't need to enter the PIN.) Either one is sufficient to verify that the URL is reachable.
333
333
334
-
1. If any of the commands fails with "Could not resolve host `<URL>`", try running this command to determine which DNS server the VM is using:
334
+
1. If any of the commands fails with "Could not resolve host `<URL>`," try running this command to determine which DNS server the VM is using:
335
335
336
336
`nslookup <URL>`
337
337
338
338
> [!NOTE]
339
339
> Replace `<URL>` with the fully qualified domain names that the endpoints use, such as `login.microsoftonline.com`.
340
340
341
-
1. See if specifying a public DNS server allows the command to succeed:
341
+
1. See whether specifying a public DNS server allows the command to succeed:
342
342
343
343
`nslookup <URL> 208.67.222.222`
344
344
@@ -364,7 +364,7 @@ You might get the following error message when you initiate a remote desktop con
364
364
365
365

366
366
367
-
Verify that you have [configured Azure RBAC policies](../../virtual-machines/linux/login-using-aad.md) for the VM that grants the user the Virtual Machine Administrator Login or Virtual Machine User Login role.
367
+
Verify that you've [configured Azure RBAC policies](../../virtual-machines/linux/login-using-aad.md) for the VM that grant the user the Virtual Machine Administrator Login or Virtual Machine User Login role.
368
368
369
369
> [!NOTE]
370
370
> If you're having problems with Azure role assignments, see [Troubleshoot Azure RBAC](../../role-based-access-control/troubleshooting.md#azure-role-assignments-limit).
@@ -451,4 +451,4 @@ Another way to verify it is via Graph PowerShell:
451
451
452
452
## Next steps
453
453
454
-
For more information on Azure Active Directory, see [What is Azure Active Directory?](../fundamentals/active-directory-whatis.md).
454
+
For more information about Azure AD, see [What is Azure Active Directory?](../fundamentals/active-directory-whatis.md).
0 commit comments