Skip to content

Commit efa9e81

Browse files
authored
Merge pull request #167090 from davidbel/davidbel-urdc-not-supported
Marking URDC unsupported
2 parents a1e0f82 + 6910b2b commit efa9e81

File tree

1 file changed

+10
-7
lines changed

1 file changed

+10
-7
lines changed

articles/virtual-desktop/deploy-azure-ad-joined-vm.md

Lines changed: 10 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: lizross
77

88
ms.service: virtual-desktop
99
ms.topic: how-to
10-
ms.date: 07/23/2021
10+
ms.date: 07/27/2021
1111
ms.author: helohr
1212
---
1313
# Deploy Azure AD joined virtual machines in Azure Virtual Desktop
@@ -37,7 +37,7 @@ User accounts can be cloud-only or hybrid users from the same Azure AD tenant. E
3737
> [!IMPORTANT]
3838
> During public preview, you must configure your host pool to be in the [validation environment](create-validation-host-pool.md).
3939
40-
You can deploy Azure AD-joined VMs directly from the Azure portal when [creating a new host pool](create-host-pools-azure-marketplace.md) or [expanding an existing host pool](expand-existing-host-pool.md). On the Virtual Machines tab, select whether to join the VM to Active Directory or Azure Active Directory. Selecting **Azure Active Directory** gives you the option to **Enroll the VM with Intune** automatically so you can easily manage [Windows 10 ENT](/mem/intune/fundamentals/windows-virtual-desktop) and [Windows 10 ENT multi-session](/mem/intune/fundamentals/windows-virtual-desktop-multi-session) VMs. Keep in mind that the Azure Active Directory option will join VMs to the same Azure AD tenant as the subscription you're in.
40+
You can deploy Azure AD-joined VMs directly from the Azure portal when [creating a new host pool](create-host-pools-azure-marketplace.md) or [expanding an existing host pool](expand-existing-host-pool.md). On the Virtual Machines tab, select whether to join the VM to Active Directory or Azure Active Directory. Selecting **Azure Active Directory** gives you the option to **Enroll the VM with Intune** automatically so you can easily manage [Windows 10 Enterprise](/mem/intune/fundamentals/windows-virtual-desktop) and [Windows 10 Enterprise multi-session](/mem/intune/fundamentals/windows-virtual-desktop-multi-session) VMs. Keep in mind that the Azure Active Directory option will join VMs to the same Azure AD tenant as the subscription you're in.
4141

4242
> [!NOTE]
4343
> - Host pools should only contain VMs of the same domain join type. For example, AD-joined VMs should only be with other AD VMs, and vice-versa.
@@ -53,12 +53,15 @@ To grant users access to Azure AD-joined VMs, you must [configure role assignmen
5353

5454
This section explains how to access Azure AD-joined VMs from different Azure Virtual Desktop clients.
5555

56+
> [!NOTE]
57+
> Connecting to Azure AD-joined VMs isn't currently supported using the Windows Store client.
58+
5659
> [!NOTE]
5760
> Azure Virtual Desktop doesn't currently support single sign-on for Azure AD-joined VMs.
5861
5962
### Connect using the Windows Desktop client
6063

61-
The default configuration supports connections from Windows 10 using the Windows Desktop client. You can use your credentials, smart card, [Windows Hello for Business certificate trust](/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-trust) or [Windows Hello for Business key trust with certificates](/windows/security/identity-protection/hello-for-business/hello-deployment-rdp-certs) to sign in to the session host. However, to access the session host, your local PC must meet one of the following conditions:
64+
The default configuration supports connections from Windows 10 using the [Windows Desktop client](user-documentation/connect-windows-7-10.md). You can use your credentials, smart card, [Windows Hello for Business certificate trust](/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-trust) or [Windows Hello for Business key trust with certificates](/windows/security/identity-protection/hello-for-business/hello-deployment-rdp-certs) to sign in to the session host. However, to access the session host, your local PC must meet one of the following conditions:
6265

6366
- The local PC is Azure AD-joined to the same Azure AD tenant as the session host
6467
- The local PC is hybrid Azure AD-joined to the same Azure AD tenant as the session host
@@ -68,11 +71,11 @@ To enable access from Windows devices not joined to Azure AD, add **targetisaadj
6871

6972
### Connect using the other clients
7073

71-
To access Azure AD-joined VMs using the web, Android, macOS, iOS, and Microsoft Store clients, you must add **targetisaadjoined:i:1** as a [custom RDP property](customize-rdp-properties.md) to the host pool. These connections are restricted to entering user name and password credentials when signing in to the session host.
74+
To access Azure AD-joined VMs using the web, Android, macOS and iOS clients, you must add **targetisaadjoined:i:1** as a [custom RDP property](customize-rdp-properties.md) to the host pool. These connections are restricted to entering user name and password credentials when signing in to the session host.
7275

7376
### Enabling MFA for Azure AD joined VMs
7477

75-
You can enable [multifactor authentication](set-up-mfa.md) for Azure AD joined VMs by setting a Conditional Access policy on the "Azure Virtual Desktop" app. Unless you want to restrict sign in to strong authentication methods like Windows Hello, you should exclude the "Azure Windows VM Sign-In" app from the list of cloud apps as described in the [MFA sign-in method requirements](../active-directory/devices/howto-vm-sign-in-azure-ad-windows.md#mfa-sign-in-method-required) for Azure AD joined VMs. If you are using non-Windows clients, you must disable the MFA policy on "Azure Windows VM Sign-In".
78+
You can enable [multifactor authentication](set-up-mfa.md) for Azure AD joined VMs by setting a Conditional Access policy on the "Azure Virtual Desktop" app. Unless you want to restrict sign in to strong authentication methods like Windows Hello, you should exclude the "Azure Windows VM Sign-In" app from the list of cloud apps as described in the [MFA sign-in method requirements](../active-directory/devices/howto-vm-sign-in-azure-ad-windows.md#mfa-sign-in-method-required) for Azure AD joined VMs. If you're using non-Windows clients, you must disable the MFA policy on "Azure Windows VM Sign-In".
7679

7780
## User profiles
7881

@@ -82,6 +85,6 @@ Azure Virtual Desktop currently only supports local profiles for Azure AD-joined
8285

8386
Now that you've deployed some Azure AD joined VMs, you can sign in to a supported Azure Virtual Desktop client to test it as part of a user session. If you want to learn how to connect to a session, check out these articles:
8487

85-
- [Connect with the Windows Desktop client](connect-windows-7-10.md)
86-
- [Connect with the web client](connect-web.md)
88+
- [Connect with the Windows Desktop client](user-documentation/connect-windows-7-10.md)
89+
- [Connect with the web client](user-documentation/connect-web.md)
8790
- [Troubleshoot connections to Azure AD-joined VMs](troubleshoot-azure-ad-connections.md)

0 commit comments

Comments
 (0)