Skip to content

Commit 33b44e4

Browse files
authored
Merge pull request #7088 from ChristianMontoya/patch-3
Adding in that PKU2U must be allowed on physical device too
2 parents 8b03ca9 + 1d38c9d commit 33b44e4

1 file changed

Lines changed: 6 additions & 3 deletions

File tree

windows-365/enterprise/connection-errors.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -35,20 +35,23 @@ The following errors can occur when connecting to a Cloud PC.
3535
## Errors when connecting to an Azure Active Directory (Azure AD) joined Cloud PC
3636

3737
### The logon attempt failed
38-
**Potential cause #1**: The Cloud PC denied PKU2U protocol requests. The PKU2U protocol is only triggered in the following cases:
38+
**Potential cause #1**: Either the Cloud PC or the user's physical device denied PKU2U protocol requests. The PKU2U protocol is only triggered in the following cases:
3939

4040
- The Cloud PC is Azure AD joined.
4141
- The user is connecting from the Windows desktop client.
4242
- The user's physical device is Azure AD registered, Azure AD joined, or hybrid Azure AD joined to the same organization as the Cloud PC.
4343

44-
**Possible solution**: Turn on PKU2U protocol requests on your Cloud PC:
44+
**Possible solution**: Turn on PKU2U protocol requests on both the Cloud PC and the user's physical device:
4545

4646
1. [Create a filter for all Cloud PCs](create-filter.md#create-a-filter-for-all-cloud-pcs).
4747
2. Create a device configuration policy [using the settings catalog](/mem/intune/configuration/settings-catalog).
4848
3. On the **Configuration settings** page, search for and select **Network Security Allow PKU2U Authentication Requests** > **Allow**.
4949
![Screenshot with the **Network Security Allow PKU2U Authentication Requests** set to **Allow**.](./media/connection-errors/allow-pku2u.png)
5050
5. On the **Assignments** page, select **Add all devices** > **Edit filter** > **Include filtered devices in assignment** > select the filter you created for all Cloud PCs.
51-
6. Complete the creation of the device configuration policy.
51+
6. On the **Assignments** page, also select an Azure AD group containing the user or the user's physical device.
52+
7. Complete the creation of the device configuration policy.
53+
54+
If you only manage the user's physical device through Group Policy or you don't manage the user's physical device, you (or the user) can manage this setting through the [allow PKU2U authentication requests to this computer to use online identities](/windows/security/threat-protection/security-policy-settings/network-security-allow-pku2u-authentication-requests-to-this-computer-to-use-online-identities) policy.
5255

5356
**Potential cause #2**: [Per-user multi-factor authentication](/azure/active-directory/authentication/howto-mfa-userstates) is turned on for the user account. Because it blocks sign-in, per-user multi-factor authentication isn't supported for users connecting to Azure AD joined Cloud PCs.
5457

0 commit comments

Comments
 (0)