Skip to content

Commit 8500a58

Browse files
author
Jill Grant
authored
Merge pull request #283754 from davidbel/davidbel-48655784-configure-lock-experience
Configure lock experience - 203118
2 parents fe9cc88 + 6f2ea04 commit 8500a58

File tree

1 file changed

+128
-7
lines changed

1 file changed

+128
-7
lines changed

articles/virtual-desktop/configure-single-sign-on.md

Lines changed: 128 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to configure single sign-on for an Azure Virtual Desktop
44
ms.topic: how-to
55
author: dknappettmsft
66
ms.author: daknappe
7-
ms.date: 12/15/2023
7+
ms.date: 08/28/2024
88
---
99

1010
# Configure single sign-on for Azure Virtual Desktop using Microsoft Entra ID authentication
@@ -31,9 +31,115 @@ Before you enable single sign-on, review the following information for using it
3131

3232
### Disconnection when the session is locked
3333

34-
When single sign-on is enabled, you sign in to Windows using a Microsoft Entra ID authentication token, which provides support for passwordless authentication to Windows. The Windows lock screen in the remote session doesn't support Microsoft Entra ID authentication tokens or passwordless authentication methods, like FIDO keys. The lack of support for these authentication methods means that users can't unlock their screens in a remote session. When you try to lock a remote session, either through user action or system policy, the session is instead disconnected and the service sends a message to the user explaining they were disconnected.
34+
When single sign-on is enabled and the remote session is locked, either by the user or by policy, the session is instead disconnected and a dialog is shown to let users know they were disconnected. Users can choose the **Reconnect** option from the dialog when they are ready to connect again. This is done for security reasons and to ensure full support of passwordless authentication. Disconnecting the session provides the following benefits:
3535

36-
Disconnecting the session also ensures that when the connection is relaunched after a period of inactivity, Microsoft Entra ID reevaluates any applicable conditional access policies.
36+
- Consistent sign-in experience through Microsoft Entra ID when needed.
37+
38+
- Single sign-on experience and reconnection without authentication prompt when allowed by conditional access policies.
39+
40+
- Supports passwordless authentication like passkeys and FIDO2 devices, contrary to the remote lock screen.
41+
42+
- Conditional access policies, including multifactor authentication and sign-in frequency, are re-evaluated when the user reconnects to their session.
43+
44+
- Can require multi-factor authentication to return to the session and prevent users from unlocking with a simple username and password.
45+
46+
If you prefer to show the remote lock screen instead of disconnecting the session, your session hosts must use the following operating systems:
47+
48+
- Windows 11 single or multi-session with the [2024-05 Cumulative Updates for Windows 11 (KB5037770)](https://support.microsoft.com/kb/KB5037770) or later installed.
49+
50+
- Windows 10 single or multi-session, versions 21H2 or later with the [2024-06 Cumulative Updates for Windows 10 (KB5039211)](https://support.microsoft.com/kb/KB5039211) or later installed.
51+
52+
- Windows Server 2022 with the [2024-05 Cumulative Update for Microsoft server operating system (KB5037782)](https://support.microsoft.com/kb/KB5037782) or later installed.
53+
54+
You can configure the session lock behavior of your session hosts by using Intune, Group Policy, or the registry.
55+
56+
# [Intune](#tab/intune)
57+
58+
To configure the session lock experience using Intune, follow these steps. This process creates an Intune [settings catalog](/mem/intune/configuration/settings-catalog) policy.
59+
60+
1. Sign in to the [Microsoft Intune admin center](https://intune.microsoft.com/).
61+
62+
1. Select **Devices** > **Manage devices** > **Configuration** > **Create** > **New policy**.
63+
64+
1. Enter the following properties:
65+
66+
- **Platform**: Select **Windows 10 and later**.
67+
68+
- **Profile type**: Select **Settings catalog**.
69+
70+
1. Select **Create**.
71+
72+
1. In **Basics**, enter the following properties:
73+
74+
- **Name**: Enter a descriptive name for the profile. Name your profile so you can easily identify it later.
75+
76+
- **Description**: Enter a description for the profile. This setting is optional, but recommended.
77+
78+
1. Select **Next**.
79+
80+
1. In **Configuration settings**, select **Add settings**. Then:
81+
82+
1. In the settings picker, expand **Administrative Templates > Windows Components > Remote Desktop Services > Remote Desktop Session Host > Security**.
83+
84+
1. Select the **Disconnect remote session on lock for Microsoft identity platform authentication** setting.
85+
86+
1. Close the settings picker.
87+
88+
1. Configure the setting to "Disabled" to show the remote lock screen when the session locks.
89+
90+
1. Select **Next**.
91+
92+
1. (Optional) Add the **Scope tags**. For more information about scope tags in Intune, see [Use RBAC roles and scope tags for distributed IT](/mem/intune/fundamentals/scope-tags).
93+
94+
1. Select **Next**.
95+
96+
1. For the **Assignments** tab, select the devices, or groups to receive the profile, then select **Next**. For more information on assigning profiles, see [Assign user and device profiles](/mem/intune/configuration/device-profile-assign).
97+
98+
1. On the **Review + create** tab, review the configuration information, then select **Create**.
99+
100+
1. Once the policy configuration is created, the setting will take effect after the session hosts sync with Intune and users initiate a new session.
101+
102+
# [Group Policy](#tab/group-policy)
103+
104+
To configure the session lock experience using Group Policy, follow these steps.
105+
106+
1. Open **Local Group Policy Editor** from the Start menu or by running `gpedit.msc`.
107+
108+
1. Browse to the following policy section:
109+
110+
- `Computer Configuration\Administrative Templates\Windows Components\Remote Desktop Services\Remote Desktop Session Host\Security`
111+
112+
1. Select the **Disconnect remote session on lock for Microsoft identity platform authentication** policy.
113+
114+
1. Set the policy to **Disabled** to show the remote lock screen when the session locks.
115+
116+
1. Select **OK** to save your changes.
117+
118+
1. Once the policy is configured, it will take effect after the user initiates a new session.
119+
120+
> [!TIP]
121+
> To configure the Group Policy centrally on Active Directory Domain Controllers using Windows Server 2019 or Windows Server 2016, copy the `terminalserver.admx` and `terminalserver.adml` administrative template files from a session host to the [Group Policy Central Store](/troubleshoot/windows-client/group-policy/create-and-manage-central-store) on the domain controller.
122+
123+
# [Registry](#tab/registry)
124+
125+
To configure the session lock experience using the registry on a session host, follow these steps.
126+
127+
1. Open **Registry Editor** from the Start menu or by running `regedit.exe`.
128+
129+
1. Set the following registry key and its value.
130+
131+
- **Key**: `HKLM\Software\Policies\Microsoft\Windows NT\Terminal Services`
132+
133+
- **Type**: `REG_DWORD`
134+
135+
- **Value name**: `fdisconnectonlockmicrosoftidentity`
136+
137+
- **Value data**: Enter a value from the following table:
138+
139+
| Value Data | Description |
140+
|--|--|
141+
| `0` | Show the remote lock screen. |
142+
| `1` | Disconnect the session. |
37143

38144
### Active Directory domain administrator accounts with single sign-on
39145

@@ -46,14 +152,19 @@ If you need to make changes to a session host as an administrator, sign in to th
46152
Before you can enable single sign-on, you must meet the following prerequisites:
47153

48154
- To configure your Microsoft Entra tenant, you must be assigned one of the following [Microsoft Entra built-in roles](/entra/identity/role-based-access-control/manage-roles-portal):
155+
49156
- [Application Administrator](/entra/identity/role-based-access-control/permissions-reference#application-administrator)
157+
50158
- [Cloud Application Administrator](/entra/identity/role-based-access-control/permissions-reference#cloud-application-administrator)
159+
51160
- [Global Administrator](/entra/identity/role-based-access-control/permissions-reference#global-administrator)
52161

53162
- Your session hosts must be running one of the following operating systems with the relevant cumulative update installed:
54163

55164
- Windows 11 Enterprise single or multi-session with the [2022-10 Cumulative Updates for Windows 11 (KB5018418)](https://support.microsoft.com/kb/KB5018418) or later installed.
165+
56166
- Windows 10 Enterprise single or multi-session with the [2022-10 Cumulative Updates for Windows 10 (KB5018410)](https://support.microsoft.com/kb/KB5018410) or later installed.
167+
57168
- Windows Server 2022 with the [2022-10 Cumulative Update for Microsoft server operating system (KB5018421)](https://support.microsoft.com/kb/KB5018421) or later installed.
58169

59170
- Your session hosts must be [Microsoft Entra joined](/entra/identity/devices/concept-directory-join) or [Microsoft Entra hybrid joined](/entra/identity/devices/concept-hybrid-join). Session hosts joined to Microsoft Entra Domain Services or to Active Directory Domain Services only aren't supported.
@@ -65,9 +176,13 @@ Before you can enable single sign-on, you must meet the following prerequisites:
65176
- A supported Remote Desktop client to connect to a remote session. The following clients are supported:
66177

67178
- [Windows Desktop client](users/connect-windows.md) on local PCs running Windows 10 or later. There's no requirement for the local PC to be joined to Microsoft Entra ID or an Active Directory domain.
179+
68180
- [Web client](users/connect-web.md).
181+
69182
- [macOS client](users/connect-macos.md), version 10.8.2 or later.
183+
70184
- [iOS client](users/connect-ios-ipados.md), version 10.5.1 or later.
185+
71186
- [Android client](users/connect-android-chrome-os.md), version 10.0.16 or later.
72187

73188
- To configure allowing Active Directory domain administrator account to connect when single sign-on is enabled, you need an account that is a member of the **Domain Admins** security group.
@@ -131,14 +246,14 @@ To configure the service principal, use the [Microsoft Graph PowerShell SDK](/po
131246
id True
132247
```
133248

134-
## Configure the target device groups
249+
## Hide the consent prompt dialog
135250

136-
After you enable Microsoft Entra authentication for RDP, you need to configure the target device groups. By default when enabling single sign-on, users are prompted to authenticate to Microsoft Entra ID and allow the Remote Desktop connection when launching a connection to a new session host. Microsoft Entra remembers up to 15 hosts for 30 days before prompting again. If you see a dialogue to allow the Remote Desktop connection, select **Yes** to connect.
251+
By default when single sign-on is enabled, users will see a dialog to allow the Remote Desktop connection when connecting to a new session host. Microsoft Entra remembers up to 15 hosts for 30 days before prompting again. If users see this dialogue to allow the Remote Desktop connection, they can select **Yes** to connect.
137252

138-
You can hide this dialog and provide single sign-on for connections to all your session hosts by configuring a list of trusted devices. You need to create one or more groups in Microsoft Entra ID that contains your session hosts, then set a property on the service principals for the same *Microsoft Remote Desktop* and *Windows Cloud Login* applications, as used in the previous section, for the group.
253+
You can hide this dialog by configuring a list of trusted devices. To configure the list of devices, create one or more groups in Microsoft Entra ID that contains your session hosts, then add the group IDs to a property on the SSO service principals, *Microsoft Remote Desktop* and *Windows Cloud Login*.
139254

140255
> [!TIP]
141-
> We recommend you use a dynamic group and configure the dynamic membership rules to includes all your Azure Virtual Desktop session hosts. You can use the device names in this group, but for a more secure option, you can set and use [device extension attributes](/graph/extensibility-overview) using [Microsoft Graph API](/graph/api/resources/device). While dynamic groups normally update within 5-10 minutes, large tenants can take up to 24 hours.
256+
> We recommend you use a dynamic group and configure the dynamic membership rules to include all your Azure Virtual Desktop session hosts. You can use the device names in this group, but for a more secure option, you can set and use [device extension attributes](/graph/extensibility-overview) using [Microsoft Graph API](/graph/api/resources/device). While dynamic groups normally update within 5-10 minutes, large tenants can take up to 24 hours.
142257
>
143258
> Dynamic groups requires the Microsoft Entra ID P1 license or Intune for Education license. For more information, see [Dynamic membership rules for groups](/entra/identity/users/groups-dynamic-membership).
144259
@@ -183,6 +298,7 @@ To configure the service principal, use the [Microsoft Graph PowerShell SDK](/po
183298
If your session hosts meet the following criteria, you must [Create a Kerberos Server object](../active-directory/authentication/howto-authentication-passwordless-security-key-on-premises.md#create-a-kerberos-server-object):
184299

185300
- Your session host is Microsoft Entra hybrid joined. You must have a Kerberos Server object to complete authentication to a domain controller.
301+
186302
- Your session host is Microsoft Entra joined and your environment contains Active Directory domain controllers. You must have a Kerberos Server object for users to access on-premises resources, such as SMB shares, and Windows-integrated authentication to websites.
187303

188304
> [!IMPORTANT]
@@ -202,12 +318,17 @@ When single sign-on is enabled, a new Microsoft Entra ID app is introduced to au
202318
To enable single sign-on on your host pool, you must configure the following RDP property, which you can do using the Azure portal or PowerShell. You can find the steps to do configure RDP properties in [Customize Remote Desktop Protocol (RDP) properties for a host pool](customize-rdp-properties.md).
203319

204320
- In the Azure portal, set **Microsoft Entra single sign-on** to **Connections will use Microsoft Entra authentication to provide single sign-on**.
321+
205322
- For PowerShell, set the **enablerdsaadauth** property to **1**.
206323

207324
## Next steps
208325

209326
- Check out [In-session passwordless authentication](authentication.md#in-session-passwordless-authentication) to learn how to enable passwordless authentication.
327+
210328
- For more information about Microsoft Entra Kerberos, see [Deep dive: How Microsoft Entra Kerberos works](https://techcommunity.microsoft.com/t5/itops-talk-blog/deep-dive-how-azure-ad-kerberos-works/ba-p/3070889)
329+
211330
- If you're accessing Azure Virtual Desktop from our Windows Desktop client, see [Connect with the Windows Desktop client](./users/connect-windows.md).
331+
212332
- If you're accessing Azure Virtual Desktop from our web client, see [Connect with the web client](./users/connect-web.md).
333+
213334
- If you encounter any issues, go to [Troubleshoot connections to Microsoft Entra joined VMs](troubleshoot-azure-ad-connections.md).

0 commit comments

Comments
 (0)