You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# An unattended desktop flow run fails with the MSEntraMachineAlwaysPromptingForPassword error
10
10
@@ -31,17 +31,13 @@ Power Automate for desktop can't validate your Microsoft Entra ID (formerly Azur
31
31
32
32
## Resolution 1: Use Microsoft Entra authentication for Remote Desktop with a user certificate
33
33
34
-
This resolution requires Power Automate for desktop version 2.50 or later.
34
+
This resolution requires Power Automate for desktop version 2.50 or later and must be used when no [multifactor authentication (MFA) exception](~/power-automate/administration/conditional-access-and-multi-factor-authentication-in-flow.md#details) can be granted to the desktop flow connection account.
35
35
36
-
This resolution must be used when no [multifactor authentication (MFA) exception](~/power-automate/administration/conditional-access-and-multi-factor-authentication-in-flow#details) can be granted to the desktop flow connection account.
36
+
For steps on how to set up Microsoft Entra certificate based authentication for Power Automate, see [Configure certificate-based authentication (preview)](/power-automate/desktop-flows/configure-certificate-based-auth).
37
37
38
-
39
-
40
38
## Resolution 2: Use Microsoft Entra authentication for Remote Desktop with a user/password
41
39
42
-
43
-
44
-
This resolution requires Power Automate for desktop version 2.49 or later. It can be faster to set up with the following steps if an MFA exception can be granted to the desktop flow connection account.
40
+
This resolution requires Power Automate for desktop version 2.49 or later. If you don't have MFA enabled for the account used by the desktop flows connection, you can set up Microsoft Entra authentication using a username and password instead.
45
41
46
42
1. Open the Registry Editor (regedit) with administrative privileges. Navigate to the following registry path, create a new DWORD-32 value with the name `UseRdsAadAuthentication`, and then set the value of `UseRdsAadAuthentication` to **1**.
0 commit comments