Skip to content

Commit a502d44

Browse files
authored
minor changes
1 parent 7635f16 commit a502d44

1 file changed

Lines changed: 5 additions & 9 deletions

File tree

support/power-platform/power-automate/desktop-flows/msentramachinealwayspromptingforpassword-error.md

Lines changed: 5 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -2,9 +2,9 @@
22
title: Unattended Desktop Flow Run Fails with MSEntraMachineAlwaysPromptingForPassword
33
description: Solves an error that occurs when you run an unattended desktop flow in Microsoft Power Automate for desktop.
44
ms.author: moelaabo
5-
ms.reviewer: guco, alarnaud
5+
ms.reviewer: guco, alarnaud, johndund
66
ms.custom: sap:Desktop flows\Unattended flow runtime errors
7-
ms.date: 02/05/2025
7+
ms.date: 02/08/2025
88
---
99
# An unattended desktop flow run fails with the MSEntraMachineAlwaysPromptingForPassword error
1010

@@ -31,17 +31,13 @@ Power Automate for desktop can't validate your Microsoft Entra ID (formerly Azur
3131

3232
## Resolution 1: Use Microsoft Entra authentication for Remote Desktop with a user certificate
3333

34-
This resolution requires Power Automate for desktop version 2.50 or later.
34+
This resolution requires Power Automate for desktop version 2.50 or later and must be used when no [multifactor authentication (MFA) exception](~/power-automate/administration/conditional-access-and-multi-factor-authentication-in-flow.md#details) can be granted to the desktop flow connection account.
3535

36-
This resolution must be used when no [multifactor authentication (MFA) exception](~/power-automate/administration/conditional-access-and-multi-factor-authentication-in-flow#details) can be granted to the desktop flow connection account.
36+
For steps on how to set up Microsoft Entra certificate based authentication for Power Automate, see [Configure certificate-based authentication (preview)](/power-automate/desktop-flows/configure-certificate-based-auth).
3737

38-
39-
4038
## Resolution 2: Use Microsoft Entra authentication for Remote Desktop with a user/password
4139

42-
43-
44-
This resolution requires Power Automate for desktop version 2.49 or later. It can be faster to set up with the following steps if an MFA exception can be granted to the desktop flow connection account.
40+
This resolution requires Power Automate for desktop version 2.49 or later. If you don't have MFA enabled for the account used by the desktop flows connection, you can set up Microsoft Entra authentication using a username and password instead.
4541

4642
1. Open the Registry Editor (regedit) with administrative privileges. Navigate to the following registry path, create a new DWORD-32 value with the name `UseRdsAadAuthentication`, and then set the value of `UseRdsAadAuthentication` to **1**.
4743

0 commit comments

Comments
 (0)