Cannot Log Into Windows via RDP with Azure Users

Marica Khatijah 161 Reputation points
2022-12-12T17:22:40.167+00:00

I'm working on setting up a Windows 10 Pro machine so that its user can log in using RDP.

The user is logging in with their AAD credential, User@OurDomain.com. When using this credential, RDP asks for the user's password, not PIN. We have had zero success with the user's password. We've cross-checked the password a number of different ways to no avail. We've done the same with the user's email address. "The logon attempt failed."

269743-image.png

269679-image.png

When initiating the RDP session, RDP asks for the user's email address, and RDP does recognize that this computer is connected to AAD as it displays a note telling us as much if we use an invalid username:

269669-image.png

Setting up a local user account, we're able to get into the machine just fine.

So, seems that there's something funky with RDP that it won't let AzureAD users log in.

What am I missing?

Windows 10
Windows 10
A Microsoft operating system that runs on personal computers and tablets.
11,972 questions
Remote Desktop
Remote Desktop
A Microsoft app that connects remotely to computers and to virtual apps and desktops.
4,679 questions
Microsoft Entra ID
Microsoft Entra ID
A Microsoft Entra identity service that provides identity management and access control capabilities. Replaces Azure Active Directory.
22,899 questions
0 comments No comments
{count} votes

2 answers

Sort by: Most helpful
  1. Marica Khatijah 161 Reputation points
    2022-12-12T21:54:51.273+00:00

    @rafalzak ,

    Digging into that article you linked:

    *Both PCs (local and remote) must be running Windows 10, version 1607 or later. Remote connections to an Azure AD-joined PC running earlier versions of Windows 10 aren't supported.
    **Host PC is running Windows 10 Pro 22H2, so we ought to be good on this one.
    **Guest (local) PC is running Windows 10 Pro 22H2, so we ought to be good there as well.

    *Your local PC (where you're connecting from) must be either Azure AD-joined or Hybrid Azure AD-joined if using Windows 10, version 1607 and above, or Azure AD registered if using Windows 10, version 2004 and above. Remote connections to an Azure AD-joined PC from an unjoined device or a non-Windows 10 device aren't supported.
    **The local PC we're trying to remote from is connected to the work account. We can see this in Access Work or School:

    bfzEpL.jpg

    Clicking on Manage your Account in that Access Work or School window, then clicking on Devices at myaccount.microsoft.com, I can see that desktop computer in the list of devices:

    ICYK3w.jpg

    Logging into the tenant at portal.office.com, going to active users, then clicking on devices, I see that this user doesn't have any devices enrolled in Intune. This is to be expected, we're not using Intune as we only have 365 Business Standard. Visiting aad.portal.azure.com and looking at the list of the user's devices, I see this workstation listed as "Azure AD registered:"

    UitEFy.jpg

    So I think we have this second criteria appeased.

    *Ensure Remote Credential Guard, a new feature in Windows 10, version 1607, is turned off on the client PC you're using to connect to the remote PC.
    **This is NOT checked:

    X30Dkn.jpg

    A note on this point: if we try to log into this workstation using a local user from this same PC, we are successful. It's only when we try to access the AAD user that we cannot log in.

    Double and triple checking the list of allowed users, the user that we're trying to log into from the remote computer is included in the list:

    zAFUkm.jpg

    So, unless I'm missing something, I think we comply with that article.

    I did set up a virtual machine, properly joined it to the Azure domain, and we were able to log in with that user's credentials just fine. So I think it has something to do with the fact that we're only an Azure AD registered PC. There is no local AD server running, and looking in the Azure Active Directory admin center, I don't see any policies that may be preventing Azure AD registered devices from being able to authenticate via RDP.

    With this revelation, I was able to refine my Googleing and found the following thread on Stack Overflow, which talked me into adding the following two lines to the RDP file for this user's log-in:

    enablecredsspsupport:i:0  
    authentication level:i:2  
    

    Adding those two lines and logging the user in with AzureAD\User@OurDomain.com was successful.

    3 people found this answer helpful.

  2. rafalzak 3,236 Reputation points
    2022-12-12T18:22:54.777+00:00

    Hi @Marica Khatijah ,

    I would suggest to look into below instruction.
    https://learn.microsoft.com/en-us/windows/client-management/connect-to-remote-aadj-pc
    Please ensure both pc's are aad joined to the same tenant and also user is a part of remote desktop user group.

    0 comments No comments

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.