Skip to content

Commit 8dec3f1

Browse files
Merge pull request #301789 from rladbsal/patch-27
Update storage-files-identity-auth-hybrid-identities-enable.md
2 parents f0bccd0 + 8e343f7 commit 8dec3f1

File tree

1 file changed

+7
-0
lines changed

1 file changed

+7
-0
lines changed

articles/storage/files/storage-files-identity-auth-hybrid-identities-enable.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -206,10 +206,17 @@ Use one of the following three methods:
206206

207207
Configure this Intune [Policy CSP](/windows/client-management/mdm/policy-configuration-service-provider) and apply it to the client(s): [Kerberos/CloudKerberosTicketRetrievalEnabled](/windows/client-management/mdm/policy-csp-kerberos#cloudkerberosticketretrievalenabled), set to 1
208208

209+
> > [!NOTE]
210+
> > When configuring **CloudKerberosTicketRetrievalEnabled** via Intune, use the **Settings Catalog** instead of the OMA-URI method.
211+
> The OMA-URI method does **not** work on **Azure Virtual Desktop (AVD) multi-session** devices. AVD multi-session is a common deployment scenario for **Entra Kerberos with hybrid identities**, including configurations involving **Entra ID Join**, **FSLogix**, and **Azure Files**.
212+
213+
209214
# [Group Policy](#tab/gpo)
210215

211216
Configure this group policy on the client(s) to "Enabled": `Administrative Templates\System\Kerberos\Allow retrieving the Azure AD Kerberos Ticket Granting Ticket during logon`
212217

218+
This setting allows the client to retrieve a cloud-based Kerberos Ticket Granting Ticket (TGT) during user logon.
219+
213220
# [Registry Key](#tab/regkey)
214221

215222
Set the following registry value on the client(s) by running this command from an elevated command prompt:

0 commit comments

Comments
 (0)