Skip to content

Commit 5b62726

Browse files
Merge pull request #264480 from dknappettmsft/patch-1
AVD updated session host authentication methods table
2 parents 18dcb4a + 3aa02f4 commit 5b62726

File tree

1 file changed

+5
-6
lines changed

1 file changed

+5
-6
lines changed

articles/virtual-desktop/authentication.md

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -68,18 +68,17 @@ To use a smart card to authenticate to Microsoft Entra ID, you must first [confi
6868

6969
## Session host authentication
7070

71-
If you haven't already enabled [single sign-on](#single-sign-on-sso) or saved your credentials locally, you'll also need to authenticate to the session host when launching a connection. The following list describes which types of authentication each Azure Virtual Desktop client currently supports.
72-
71+
If you haven't already enabled [single sign-on](#single-sign-on-sso) or saved your credentials locally, you'll also need to authenticate to the session host when launching a connection. The following list describes which types of authentication each Azure Virtual Desktop client currently supports. Some clients might require a specific version to be used, which you can find in the link for each authentication type.
7372

7473
|Client |Supported authentication type(s) |
7574
|---------|---------|
7675
|Windows Desktop client | Username and password <br>Smart card <br>[Windows Hello for Business certificate trust](/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-trust) <br>[Windows Hello for Business key trust with certificates](/windows/security/identity-protection/hello-for-business/hello-deployment-rdp-certs) <br>[Microsoft Entra authentication](configure-single-sign-on.md) |
7776
|Azure Virtual Desktop Store app | Username and password <br>Smart card <br>[Windows Hello for Business certificate trust](/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-trust) <br>[Windows Hello for Business key trust with certificates](/windows/security/identity-protection/hello-for-business/hello-deployment-rdp-certs) <br>[Microsoft Entra authentication](configure-single-sign-on.md) |
7877
|Remote Desktop app | Username and password |
79-
|Web client | Username and password |
80-
|Android client | Username and password |
81-
|iOS client | Username and password |
82-
|macOS client | Username and password <br>Smart card: support for smart card-based sign in using smart card redirection at the Winlogon prompt when NLA is not negotiated. |
78+
|Web client | Username and password<br>[Microsoft Entra authentication](configure-single-sign-on.md) |
79+
|Android client | Username and password<br>[Microsoft Entra authentication](configure-single-sign-on.md) |
80+
|iOS client | Username and password<br>[Microsoft Entra authentication](configure-single-sign-on.md) |
81+
|macOS client | Username and password <br>Smart card: support for smart card-based sign in using smart card redirection at the Winlogon prompt when NLA is not negotiated.<br>[Microsoft Entra authentication](configure-single-sign-on.md) |
8382

8483
>[!IMPORTANT]
8584
>In order for authentication to work properly, your local machine must also be able to access the [required URLs for Remote Desktop clients](safe-url-list.md#remote-desktop-clients).

0 commit comments

Comments
 (0)