How to fix ""the target identifier in the request was not found in the tenant" when logging to AzureVM with AAD web credentials

IWSIT admin 65 Reputation points
2023-04-25T01:13:32.8766667+00:00

New Azure VM joined to AzureAD. Followed-default setup. When logging into the AzureVM using web access over rdp client, we get prompted for web interactive login and once authentication completes we receive the error: "the target identifier "" in the request was not found in the tenant"* "*" is the FQDN domain of the VM needed for web access over rdp. How do we resolve this? It seems that the VM's FQDN is not being recognized over web session. No issue accessing with local user login with FQDN.

Azure Virtual Machines
Azure Virtual Machines
An Azure service that is used to provision Windows and Linux virtual machines.
8,626 questions
Azure Virtual Desktop
Azure Virtual Desktop
A Microsoft desktop and app virtualization service that runs on Azure. Previously known as Windows Virtual Desktop.
1,739 questions
Remote Desktop
Remote Desktop
A Microsoft app that connects remotely to computers and to virtual apps and desktops.
4,754 questions
Microsoft Entra ID
Microsoft Entra ID
A Microsoft Entra identity service that provides identity management and access control capabilities. Replaces Azure Active Directory.
23,959 questions
{count} votes

7 answers

Sort by: Most helpful
  1. John Brander 0 Reputation points
    2024-04-08T11:31:52.2966667+00:00

    Hey, since had quite a bit of struggle with this one as well, I just wanted to clarify something I found in another post about the issue. The powershell command
    Set-ItemProperty -Path HKLM:\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters -Name 'Domain' -Value 'contoso.com'
    seems not to work in my case. Setting the same value in the Windows UI did the trick, and now everything is fine with me. I was running Windows Server 2022 Azure Edition Hotpatch.


  2. Andrew McNaughton 0 Reputation points
    2025-03-30T18:04:48.08+00:00

    This post comes up a lot when people encounter this error in scenarios involving Entra joined RDP Session Hosts.

    If you have enabled/permitted access to the host via an Entra group, and not as individual user accounts**, you need to disable NLA (Network Level Authentication) on the host to avoid this error.**

    NLA is a legacy approach that doesn't make as much sense on an Entra joined device. The credentials are protected by HTTPS/TLS when authentication takes place. Just like using a browser. So, there will be no interception. These devices won't ever accept on-premises AD credentials for RDP. Only local accounts could be vulnerable and they should be disallowed for RDP.

    It's possible all this faffing about with DNS suffixes is playing a role in supporting NLA in believing the two ends of the connection are on the same trusted network. NLA doesn't seem aligned with Zero Trust principles.

    You may also need to make sure that PKU2U isn't blocked by policy. This should only be blocked in on-premises-only environments. Hybrid and Entra joined systems should not have this blocked.

    0 comments No comments

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.