Hey, since had quite a bit of struggle with this one as well, I just wanted to clarify something I found in another post about the issue. The powershell command
Set-ItemProperty -Path HKLM:\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters -Name 'Domain' -Value 'contoso.com'
seems not to work in my case. Setting the same value in the Windows UI did the trick, and now everything is fine with me. I was running Windows Server 2022 Azure Edition Hotpatch.
How to fix ""the target identifier in the request was not found in the tenant" when logging to AzureVM with AAD web credentials
New Azure VM joined to AzureAD. Followed-default setup. When logging into the AzureVM using web access over rdp client, we get prompted for web interactive login and once authentication completes we receive the error: "the target identifier "" in the request was not found in the tenant"* "*" is the FQDN domain of the VM needed for web access over rdp. How do we resolve this? It seems that the VM's FQDN is not being recognized over web session. No issue accessing with local user login with FQDN.
7 answers
Sort by: Most helpful
-
John Brander 0 Reputation points
2024-04-08T11:31:52.2966667+00:00 -
Andrew McNaughton 0 Reputation points
2025-03-30T18:04:48.08+00:00 This post comes up a lot when people encounter this error in scenarios involving Entra joined RDP Session Hosts.
If you have enabled/permitted access to the host via an Entra group, and not as individual user accounts**, you need to disable NLA (Network Level Authentication) on the host to avoid this error.**
NLA is a legacy approach that doesn't make as much sense on an Entra joined device. The credentials are protected by HTTPS/TLS when authentication takes place. Just like using a browser. So, there will be no interception. These devices won't ever accept on-premises AD credentials for RDP. Only local accounts could be vulnerable and they should be disallowed for RDP.
It's possible all this faffing about with DNS suffixes is playing a role in supporting NLA in believing the two ends of the connection are on the same trusted network. NLA doesn't seem aligned with Zero Trust principles.
You may also need to make sure that PKU2U isn't blocked by policy. This should only be blocked in on-premises-only environments. Hybrid and Entra joined systems should not have this blocked.