Skip to content

Commit 44fa507

Browse files
authored
some changes
1 parent b24d91c commit 44fa507

1 file changed

Lines changed: 21 additions & 17 deletions

File tree

support/power-platform/power-automate/desktop-flows/msentramachinealwayspromptingforpassword-error.md

Lines changed: 21 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Solves an error that occurs when you run an unattended desktop flow
44
ms.author: moelaabo
55
ms.reviewer: guco, alarnaud
66
ms.custom: sap:Desktop flows\Unattended flow runtime errors
7-
ms.date: 12/09/2024
7+
ms.date: 02/05/2025
88
---
99
# An unattended desktop flow run fails with the MSEntraMachineAlwaysPromptingForPassword error
1010

@@ -29,28 +29,32 @@ Your unattended desktop flow run fails with the "MSEntraMachineAlwaysPromptingFo
2929

3030
Power Automate for desktop can't validate your Microsoft Entra ID (formerly Azure Active Directory) credentials on the machine. This issue is typically caused by a group policy setting on your machine.
3131

32-
## Resolution
33-
There are 3 possible paths to mitigate this issue
32+
## Resolution 1: Use Microsoft Entra authentication for Remote Desktop with a user certificate
3433

35-
### Option 1: Use MSEntra Authentication for Remote Desktop - with a user certificate ###
36-
This option requires PAD 2.50 or above. It is best to use in case no MFA exception can be granted to the desktop flow connection account.
34+
This resolution requires Power Automate for desktop version 2.50 or later.
3735

38-
See [Certificate Base Authenticiation](https://learn.microsoft.com/power-automate/desktop-flows/configure-certificate-based-auth)
36+
It's best to use this resolution when no [multifactor authentication (MFA) exception](~/power-automate/administration/conditional-access-and-multi-factor-authentication-in-flow#details) can be granted to the desktop flow connection account.
3937

40-
### Option 2: Use MSEntra Authentication for Remote Desktop - with a user/password ###
41-
This option requires PAD 2.49 or above. This option can be faster to setup in case an MFA Exception can be granted to the desktop flow connection account.
38+
For more information, see [Configure certificate-based authentication (preview)](/power-automate/desktop-flows/configure-certificate-based-auth).
4239

43-
1. Force MSEntra authentication in PAD via registry key (use regedit, admin required)
44-
45-
|Registry Path|Registry Key| DWORD-32 Value|
46-
|-------------|------------|---------------|
47-
|Computer\HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Power Automate Desktop\Service|UseRdsAadAuthentication|1|
40+
## Resolution 2: Use Microsoft Entra authentication for Remote Desktop with a user/password
4841

49-
2. Configure [Hiding consent prompt for the target devices](https://learn.microsoft.com/power-automate/desktop-flows/run-unattended-desktop-flows#admin-consent-for-unattended-runs-using-cba-or-sign-in-credentials-with-nla-preview)
50-
3. Restart the Power Automate service
51-
4. Use a MSEntraID connection with user/password credentials. An MFA Exception is required for this account.
42+
This resolution requires Power Automate for desktop version 2.49 or later. It can be faster to set up with the following steps if an MFA exception can be granted to the desktop flow connection account.
43+
44+
1. Open the Registry Editor (regedit) with administrative privileges. Navigate to the following registry path, create a new DWORD-32 value with the name `UseRdsAadAuthentication`, and then set the value of `UseRdsAadAuthentication` to **1**.
45+
46+
|Registry path|Registry key| DWORD-32 value|
47+
|-------------|------------|---------------|
48+
|Computer\HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Power Automate Desktop\Service|`UseRdsAadAuthentication`|**1**|
49+
50+
2. [Hide the consent prompt dialog for a target device group](/power-automate/desktop-flows/run-unattended-desktop-flows#admin-consent-for-unattended-runs-using-cba-or-sign-in-credentials-with-nla-preview).
51+
52+
3. Restart the Power Automate service.
53+
54+
4. Use a Microsoft Entra ID connection with user/password credentials. Note that an MFA exception is required for this account.
55+
56+
## Resolution 3: Disable fPromptForPassword
5257

53-
### Option 3: Disable fPromptForPassword
5458
To solve this issue, check the group policy setting on your machine.
5559

5660
1. Press the Windows key+<kbd>R</kbd> to open the **Run** dialog.

0 commit comments

Comments
 (0)