You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/virtual-desktop/configure-single-sign-on.md
+164-6Lines changed: 164 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Learn how to configure single sign-on for an Azure Virtual Desktop
4
4
ms.topic: how-to
5
5
author: dknappettmsft
6
6
ms.author: daknappe
7
-
ms.date: 12/15/2023
7
+
ms.date: 08/27/2024
8
8
---
9
9
10
10
# Configure single sign-on for Azure Virtual Desktop using Microsoft Entra ID authentication
@@ -31,9 +31,167 @@ Before you enable single sign-on, review the following information for using it
31
31
32
32
### Disconnection when the session is locked
33
33
34
-
When single sign-on is enabled, you sign in to Windows using a Microsoft Entra ID authentication token, which provides support for passwordless authentication to Windows. The Windows lock screen in the remote session doesn't support Microsoft Entra ID authentication tokens or passwordless authentication methods, like FIDO keys. The lack of support for these authentication methods means that users can't unlock their screens in a remote session. When you try to lock a remote session, either through user action or system policy, the session is instead disconnected and the service sends a message to the user explaining they were disconnected.
34
+
When single sign-on is enabled and the remote session is locked, either by the user or by policy, the session is instead disconnected and a dialog is shown. Users can select the Reconnect option from the dialog when they are ready to connect again. This is done for security reason and to ensure full support of passwordless authentication. Disconnecting provides the following benefits:
35
35
36
-
Disconnecting the session also ensures that when the connection is relaunched after a period of inactivity, Microsoft Entra ID reevaluates any applicable conditional access policies.
36
+
- Consistent sign-in experience through Microsoft Entra ID when needed.
37
+
- Supports passwordless authentication like passkeys and FIDO2 devices, contrary to the remote lock screen.
38
+
- Can require multi-factor authentication to return to the session and prevent users from unlocking with a simple username and password.
39
+
- Reevaluates any applicable Microsoft Entra conditional access policies including sign-in frequency.
40
+
- When meeting all conditional access requirements, users benefit from Entra single sign-on when reconnecting and are not prompted to re-authenticate.
41
+
42
+
If you prefer to show the remote lock screen instead of disconnecting the session, you can configure your session hosts using Intune, Group Policy or the registry.
43
+
44
+
# [Intune](#tab/intune)
45
+
46
+
To configure the clipboard using Intune, follow these steps. This process creates an Intune [settings catalog](/mem/intune/configuration/settings-catalog) policy.
47
+
48
+
1. Sign in to the [Microsoft Intune admin center](https://intune.microsoft.com/).
-**Name**: Enter a descriptive name for the profile. Name your profile so you can easily identify it later.
61
+
-**Description**: Enter a description for the profile. This setting is optional, but recommended.
62
+
63
+
1. Select **Next**.
64
+
65
+
1. In **Configuration settings**, select **Add settings**. Then:
66
+
67
+
1. In the settings picker, expand **Administrative Templates > Windows Components > Remote Desktop Services > Remote Desktop Session Host > Device and Resource Redirection**.
68
+
69
+
1. Select the following settings and make sure you select the settings with the correct scope. The `(User)` settings apply to the user scope. The other settings apply to the device scope. To determine which scope is correct for your scenario, go to [Settings catalog - Device scope vs. user scope settings](/mem/intune/configuration/settings-catalog#device-scope-vs-user-scope-settings):
70
+
71
+
- Restrict clipboard transfer from server to client
72
+
- Restrict clipboard transfer from client to server
73
+
74
+
**OR**
75
+
76
+
- Restrict clipboard transfer from server to client (User)
77
+
- Restrict clipboard transfer from client to server (User)
78
+
79
+
1. Close the settings picker.
80
+
81
+
1. Configure the settings:
82
+
83
+
-**Restrict clipboard transfer from server to client**: Select **Enabled**.
84
+
-**Restrict clipboard transfer from server to client**: Select the type of clipboard data you want to prevent or allow. Your options:
85
+
86
+
- Disable clipboard transfers from server to client
87
+
- Allow plain text
88
+
- Allow plain text and images
89
+
- Allow plain text, images, and Rich Text Format
90
+
- Allow plain text, images, Rich Text Format, and HTML
91
+
92
+
-**Restrict clipboard transfer from client to server**: Select **Enabled**.
93
+
-**Restrict clipboard transfer from client to server**: Select the type of clipboard data you want to prevent or allow. Your options:
94
+
95
+
- Disable clipboard transfers from server to client
96
+
- Allow plain text
97
+
- Allow plain text and images
98
+
- Allow plain text, images, and Rich Text Format
99
+
- Allow plain text, images, Rich Text Format, and HTML
100
+
101
+
1. Select **Next**.
102
+
103
+
1. At the **Scope tags** tab (optional), you can skip this step. For more information about scope tags in Intune, see [Use RBAC roles and scope tags for distributed IT](/mem/intune/fundamentals/scope-tags).
104
+
105
+
Select **Next**.
106
+
107
+
1. For the **Assignments** tab, select the users, devices, or groups to receive the profile, then select **Next**. For more information on assigning profiles, see [Assign user and device profiles](/mem/intune/configuration/device-profile-assign).
108
+
109
+
1. On the **Review + create** tab, review the configuration information, then select **Create**.
110
+
111
+
1. Once the policy configuration is created, resync your session hosts and reboot them for the settings to take effect.
112
+
113
+
1. Connect to a remote session with a supported client and test the clipboard settings you configured are working by trying to copy and paste content.
114
+
115
+
# [Group Policy](#tab/group-policy)
116
+
117
+
To configure the clipboard using Group Policy, follow these steps.
118
+
119
+
> [!IMPORTANT]
120
+
> These policy settings appear in both **Computer Configuration** and **User Configuration**. If both policy settings are configured, the stricter restriction is used.
121
+
122
+
1. Open **Local Group Policy Editor** from the Start menu or by running `gpedit.msc`.
123
+
124
+
1. Browse to one of the following policy sections. Use the policy section in **Computer Configuration** to the session host you target, and use the policy section in **User Configuration** applies to specific users you target.
1. Open one of the following policy settings, depending on whether you want to configure the clipboard from session host (server) to client, or client to session host:
130
+
131
+
- To configure the clipboard from **session host to client**, open the policy setting **Restrict clipboard transfer from server to client**, then select **Enabled**. Choose from the following options:
132
+
-**Disable clipboard transfers from server to client**.
133
+
-**Allow plain text.**
134
+
-**Allow plain text and images.**
135
+
-**Allow plain text, images, and Rich Text Format.**
136
+
-**Allow plain text, images, Rich Text Format, and HTML.**
137
+
138
+
- To configure the clipboard from **client to session host**, open the policy setting **Restrict clipboard transfer from client to server**, then select **Enabled** . Choose from the following options:
139
+
-**Disable clipboard transfers from client to server**.
140
+
-**Allow plain text.**
141
+
-**Allow plain text and images.**
142
+
-**Allow plain text, images, and Rich Text Format.**
143
+
-**Allow plain text, images, Rich Text Format, and HTML.**
144
+
145
+
1. Select **OK** to save your changes.
146
+
147
+
1. Once you configured settings, restart your session hosts for the settings to take effect.
148
+
149
+
1. Connect to a remote session with a supported client and test the clipboard settings you configured are working by trying to copy and paste content.
150
+
151
+
> [!TIP]
152
+
> During the preview, you can also configure Group Policy centrally in an Active Directory domain by copying the `terminalserver.admx` and `terminalserver.adml` administrative template files from a session host to the [Group Policy Central Store](/troubleshoot/windows-client/group-policy/create-and-manage-central-store) in a test environment.
153
+
154
+
# [Registry](#tab/registry)
155
+
156
+
To configure the clipboard using the registry on a session host, follow these steps.
157
+
158
+
1. Open **Registry Editor** from the Start menu or by running `regedit.exe`.
159
+
160
+
1. Set one of the following registry keys and its value, depending on whether you want to configure the clipboard from session host to client, or client to session host.
161
+
162
+
- To configure the clipboard from **session host to client**, set one of the following registry keys and its value. Using the value for the machine applies to all users, and using the value for the user applies to the current user only.
-**Value data**: Enter a value from the following table:
169
+
170
+
| Value Data | Description |
171
+
|--|--|
172
+
|`0`| Disable clipboard transfers from session host to client. |
173
+
|`1`| Allow plain text. |
174
+
|`2`| Allow plain text and images. |
175
+
|`3`| Allow plain text, images, and Rich Text Format. |
176
+
|`4`| Allow plain text, images, Rich Text Format, and HTML. |
177
+
178
+
- To configure the clipboard from **client to session host**, set one of the following registry keys and its value. Using the value for the machine applies to all users, and using the value for the user applies to the current user only.
-**Value data**: Enter a value from the following table:
185
+
186
+
| Value Data | Description |
187
+
|--|--|
188
+
|`0`| Disable clipboard transfers from client to session host. |
189
+
|`1`| Allow plain text. |
190
+
|`2`| Allow plain text and images. |
191
+
|`3`| Allow plain text, images, and Rich Text Format. |
192
+
|`4`| Allow plain text, images, Rich Text Format, and HTML. |
193
+
194
+
37
195
38
196
### Active Directory domain administrator accounts with single sign-on
39
197
@@ -131,11 +289,11 @@ To configure the service principal, use the [Microsoft Graph PowerShell SDK](/po
131
289
id True
132
290
```
133
291
134
-
## Configure the target device groups
292
+
## Hide the consent prompt dialog
135
293
136
-
After you enable Microsoft Entra authentication for RDP, you need to configure the target device groups. By default when enabling single sign-on, users are prompted to authenticate to Microsoft Entra ID and allow the Remote Desktop connection when launching a connection to a new session host. Microsoft Entra remembers up to 15 hosts for 30 days before prompting again. If you see a dialogue to allow the Remote Desktop connection, select **Yes** to connect.
294
+
By default when single sign-on is enabled, users will see a dialog to allow the Remote Desktop connection when connecting to a new session host. Microsoft Entra remembers up to 15 hosts for 30 days before prompting again. If users see this dialogue to allow the Remote Desktop connection, the can select **Yes** to connect.
137
295
138
-
You can hide this dialog and provide single sign-on for connections to all your session hosts by configuring a list of trusted devices. You need to create one or more groups in Microsoft Entra ID that contains your session hosts, then set a property on the service principals for the same *Microsoft Remote Desktop* and *Windows Cloud Login* applications, as used in the previous section, for the group.
296
+
You can hide this dialog by configuring a list of trusted devices. To configure the list of devices, create one or more groups in Microsoft Entra ID that contains your session hosts, then add the group IDs to a property on the SSO service principals, *Microsoft Remote Desktop* and *Windows Cloud Login*.
139
297
140
298
> [!TIP]
141
299
> We recommend you use a dynamic group and configure the dynamic membership rules to includes all your Azure Virtual Desktop session hosts. You can use the device names in this group, but for a more secure option, you can set and use [device extension attributes](/graph/extensibility-overview) using [Microsoft Graph API](/graph/api/resources/device). While dynamic groups normally update within 5-10 minutes, large tenants can take up to 24 hours.
0 commit comments