Skip to content

Commit bd8527e

Browse files
authored
Update storage-files-identity-auth-hybrid-identities-enable.md
intune settings and kerb ticket extra note info
1 parent 188077c commit bd8527e

File tree

1 file changed

+6
-0
lines changed

1 file changed

+6
-0
lines changed

articles/storage/files/storage-files-identity-auth-hybrid-identities-enable.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -206,10 +206,16 @@ Use one of the following three methods:
206206

207207
Configure this Intune [Policy CSP](/windows/client-management/mdm/policy-configuration-service-provider) and apply it to the client(s): [Kerberos/CloudKerberosTicketRetrievalEnabled](/windows/client-management/mdm/policy-csp-kerberos#cloudkerberosticketretrievalenabled), set to 1
208208

209+
> **Note:** When configuring **CloudKerberosTicketRetrievalEnabled** via Intune, use the **Settings Catalog** instead of the OMA-URI method.
210+
> The OMA-URI method does **not** work on **Azure Virtual Desktop (AVD) multi-session** devices. AVD multi-session is a common deployment scenario for **Entra Kerberos with hybrid identities**, including configurations involving **Entra ID Join**, **FSLogix**, and **Azure Files**.
211+
> Using the Settings Catalog ensures proper application of the policy in multi-session environments.
212+
209213
# [Group Policy](#tab/gpo)
210214

211215
Configure this group policy on the client(s) to "Enabled": `Administrative Templates\System\Kerberos\Allow retrieving the Azure AD Kerberos Ticket Granting Ticket during logon`
212216

217+
This setting allows the client to retrieve a cloud-based Kerberos Ticket Granting Ticket (TGT) during user logon.
218+
213219
# [Registry Key](#tab/regkey)
214220

215221
Set the following registry value on the client(s) by running this command from an elevated command prompt:

0 commit comments

Comments
 (0)