Skip to content

Commit c633560

Browse files
Merge pull request #277715 from dknappettmsft/avd-security-account-type-fix
AVD removed domain admin in SSO
2 parents 07da1dd + 8b93158 commit c633560

File tree

1 file changed

+3
-21
lines changed

1 file changed

+3
-21
lines changed

articles/virtual-desktop/configure-single-sign-on.md

Lines changed: 3 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -35,11 +35,11 @@ When single sign-on is enabled, you sign in to Windows using a Microsoft Entra I
3535

3636
Disconnecting the session also ensures that when the connection is relaunched after a period of inactivity, Microsoft Entra ID reevaluates any applicable conditional access policies.
3737

38-
### Using an Active Directory domain administrator account with single sign-on
38+
### Active Directory domain administrator accounts with single sign-on
3939

40-
In environments with an Active Directory Domain Services (AD DS) and hybrid user accounts, the default *Password Replication Policy* on read-only domain controllers denies password replication for members of *Domain Admins* and *Administrators* security groups. This policy prevents these administrator accounts from signing in to Microsoft Entra hybrid joined hosts and might keep prompting them to enter their credentials. It also prevents administrator accounts from accessing on-premises resources that use Kerberos authentication from Microsoft Entra joined hosts.
40+
In environments with an Active Directory Domain Services (AD DS) and hybrid user accounts, the default *Password Replication Policy* on read-only domain controllers denies password replication for members of *Domain Admins* and *Administrators* security groups. This policy prevents these administrator accounts from signing in to Microsoft Entra hybrid joined hosts and might keep prompting them to enter their credentials. It also prevents administrator accounts from accessing on-premises resources that use Kerberos authentication from Microsoft Entra joined hosts. We don't recommend connecting to a remote session using an account that is a domain administrator.
4141

42-
To allow these admin accounts to connect when single sign-on is enabled, see [Allow Active Directory domain administrator accounts to connect](#allow-active-directory-domain-administrator-accounts-to-connect).
42+
If you need to make changes to a session host as an administrator, sign in to the session host using a non-administrator account, then use the *Run as administrator* option or [runas](/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/cc771525(v=ws.11)) from a command prompt to change to an administrator.
4343

4444
## Prerequisites
4545

@@ -204,24 +204,6 @@ To enable single sign-on on your host pool, you must configure the following RDP
204204
- In the Azure portal, set **Microsoft Entra single sign-on** to **Connections will use Microsoft Entra authentication to provide single sign-on**.
205205
- For PowerShell, set the **enablerdsaadauth** property to **1**.
206206

207-
## Allow Active Directory domain administrator accounts to connect
208-
209-
To allow Active Directory domain administrator accounts to connect when single sign-on is enabled:
210-
211-
1. On a device that you use to manage your Active Directory domain, open the **Active Directory Users and Computers** console using an account that is a member of the **Domain Admins** security group.
212-
213-
1. Open the **Domain Controllers** organizational unit for your domain.
214-
215-
1. Find the **AzureADKerberos** object, right-click it, then select **Properties**.
216-
217-
1. Select the **Password Replication Policy** tab.
218-
219-
1. Change the policy for **Domain Admins** from *Deny* to *Allow*.
220-
221-
1. Delete the policy for **Administrators**. The Domain Admins group is a member of the Administrators group, so denying replication for administrators also denies it for domain admins.
222-
223-
1. Select **OK** to save your changes.
224-
225207
## Next steps
226208

227209
- Check out [In-session passwordless authentication](authentication.md#in-session-passwordless-authentication) to learn how to enable passwordless authentication.

0 commit comments

Comments
 (0)