You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/virtual-desktop/configure-single-sign-on.md
+3-21Lines changed: 3 additions & 21 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -35,11 +35,11 @@ When single sign-on is enabled, you sign in to Windows using a Microsoft Entra I
35
35
36
36
Disconnecting the session also ensures that when the connection is relaunched after a period of inactivity, Microsoft Entra ID reevaluates any applicable conditional access policies.
37
37
38
-
### Using an Active Directory domain administrator account with single sign-on
38
+
### Active Directory domain administrator accounts with single sign-on
39
39
40
-
In environments with an Active Directory Domain Services (AD DS) and hybrid user accounts, the default *Password Replication Policy* on read-only domain controllers denies password replication for members of *Domain Admins* and *Administrators* security groups. This policy prevents these administrator accounts from signing in to Microsoft Entra hybrid joined hosts and might keep prompting them to enter their credentials. It also prevents administrator accounts from accessing on-premises resources that use Kerberos authentication from Microsoft Entra joined hosts.
40
+
In environments with an Active Directory Domain Services (AD DS) and hybrid user accounts, the default *Password Replication Policy* on read-only domain controllers denies password replication for members of *Domain Admins* and *Administrators* security groups. This policy prevents these administrator accounts from signing in to Microsoft Entra hybrid joined hosts and might keep prompting them to enter their credentials. It also prevents administrator accounts from accessing on-premises resources that use Kerberos authentication from Microsoft Entra joined hosts. We don't recommend connecting to a remote session using an account that is a domain administrator.
41
41
42
-
To allow these admin accounts to connect when single sign-on is enabled, see [Allow Active Directory domain administrator accounts to connect](#allow-active-directory-domain-administrator-accounts-to-connect).
42
+
If you need to make changes to a session host as an administrator, sign in to the session host using a non-administrator account, then use the *Run as administrator* option or [runas](/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/cc771525(v=ws.11)) from a command prompt to change to an administrator.
43
43
44
44
## Prerequisites
45
45
@@ -204,24 +204,6 @@ To enable single sign-on on your host pool, you must configure the following RDP
204
204
- In the Azure portal, set **Microsoft Entra single sign-on** to **Connections will use Microsoft Entra authentication to provide single sign-on**.
205
205
- For PowerShell, set the **enablerdsaadauth** property to **1**.
206
206
207
-
## Allow Active Directory domain administrator accounts to connect
208
-
209
-
To allow Active Directory domain administrator accounts to connect when single sign-on is enabled:
210
-
211
-
1. On a device that you use to manage your Active Directory domain, open the **Active Directory Users and Computers** console using an account that is a member of the **Domain Admins** security group.
212
-
213
-
1. Open the **Domain Controllers** organizational unit for your domain.
214
-
215
-
1. Find the **AzureADKerberos** object, right-click it, then select **Properties**.
216
-
217
-
1. Select the **Password Replication Policy** tab.
218
-
219
-
1. Change the policy for **Domain Admins** from *Deny* to *Allow*.
220
-
221
-
1. Delete the policy for **Administrators**. The Domain Admins group is a member of the Administrators group, so denying replication for administrators also denies it for domain admins.
222
-
223
-
1. Select **OK** to save your changes.
224
-
225
207
## Next steps
226
208
227
209
- Check out [In-session passwordless authentication](authentication.md#in-session-passwordless-authentication) to learn how to enable passwordless authentication.
0 commit comments