Skip to content

Commit bde0ab4

Browse files
authored
Merge pull request #1776 from alarnaudy/patch-4
Update msentramachinealwayspromptingforpassword-error.md with possible mitigations
2 parents 64cf255 + 7d95f07 commit bde0ab4

1 file changed

Lines changed: 25 additions & 3 deletions

File tree

support/power-platform/power-automate/desktop-flows/msentramachinealwayspromptingforpassword-error.md

Lines changed: 25 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,9 +2,9 @@
22
title: Unattended Desktop Flow Run Fails with MSEntraMachineAlwaysPromptingForPassword
33
description: Solves an error that occurs when you run an unattended desktop flow in Microsoft Power Automate for desktop.
44
ms.author: moelaabo
5-
ms.reviewer: guco, alarnaud
5+
ms.reviewer: guco, alarnaud, johndund
66
ms.custom: sap:Desktop flows\Unattended flow runtime errors
7-
ms.date: 12/09/2024
7+
ms.date: 02/11/2025
88
---
99
# An unattended desktop flow run fails with the MSEntraMachineAlwaysPromptingForPassword error
1010

@@ -29,7 +29,29 @@ Your unattended desktop flow run fails with the "MSEntraMachineAlwaysPromptingFo
2929

3030
Power Automate for desktop can't validate your Microsoft Entra ID (formerly Azure Active Directory) credentials on the machine. This issue is typically caused by a group policy setting on your machine.
3131

32-
## Resolution
32+
## Resolution 1: Use Microsoft Entra authentication for Remote Desktop with a user certificate
33+
34+
This resolution requires Power Automate for desktop version 2.50 or later and must be used when no [multifactor authentication (MFA) exception](~/power-platform/power-automate/administration/conditional-access-and-multi-factor-authentication-in-flow.md#details) can be granted to the desktop flow connection account.
35+
36+
For steps on how to set up Microsoft Entra certificate based authentication for Power Automate, see [Configure certificate-based authentication (preview)](/power-automate/desktop-flows/configure-certificate-based-auth).
37+
38+
## Resolution 2: Use Microsoft Entra authentication for Remote Desktop with a username and password
39+
40+
This resolution requires Power Automate for desktop version 2.49 or later. If you don't have MFA enabled for the account used by the desktop flows connection, you can set up Microsoft Entra authentication using a username and password instead.
41+
42+
1. Open the Registry Editor (regedit) with administrative privileges. Navigate to the following registry path, create a new DWORD-32 value with the name `UseRdsAadAuthentication`, and then set the value of `UseRdsAadAuthentication` to **1**.
43+
44+
|Registry path|Registry key| DWORD-32 value|
45+
|-------------|------------|---------------|
46+
|Computer\HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Power Automate Desktop\Service|`UseRdsAadAuthentication`|**1**|
47+
48+
2. [Hide the consent prompt dialog for a target device group](/power-automate/desktop-flows/run-unattended-desktop-flows#admin-consent-for-unattended-runs-using-cba-or-sign-in-credentials-with-nla-preview).
49+
50+
3. Restart the Power Automate service.
51+
52+
4. Use a Microsoft Entra ID connection with username and password credentials. Note that an MFA exception is required for this account.
53+
54+
## Resolution 3: Disable fPromptForPassword
3355

3456
To solve this issue, check the group policy setting on your machine.
3557

0 commit comments

Comments
 (0)