Skip to content

Commit c89d000

Browse files
Adding in that PKU2U must be allowed on physical device too
1 parent 7754d5f commit c89d000

1 file changed

Lines changed: 4 additions & 2 deletions

File tree

windows-365/enterprise/connection-errors.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -35,13 +35,13 @@ The following errors can occur when connecting to a Cloud PC.
3535
## Errors when connecting to an Azure Active Directory (Azure AD) joined Cloud PC
3636

3737
### The logon attempt failed
38-
**Potential cause #1**: The Cloud PC denied PKU2U protocol requests. The PKU2U protocol is only triggered in the following cases:
38+
**Potential cause #1**: Either the Cloud PC or the user's physical device denied PKU2U protocol requests. The PKU2U protocol is only triggered in the following cases:
3939

4040
- The Cloud PC is Azure AD joined.
4141
- The user is connecting from the Windows desktop client.
4242
- The user's physical device is Azure AD registered, Azure AD joined, or hybrid Azure AD joined to the same organization as the Cloud PC.
4343

44-
**Possible solution**: Turn on PKU2U protocol requests on your Cloud PC:
44+
**Possible solution**: Turn on PKU2U protocol requests on both the Cloud PC and the user's physical device:
4545

4646
1. [Create a filter for all Cloud PCs](create-filter.md#create-a-filter-for-all-cloud-pcs).
4747
2. Create a device configuration policy [using the settings catalog](/mem/intune/configuration/settings-catalog).
@@ -50,6 +50,8 @@ The following errors can occur when connecting to a Cloud PC.
5050
5. On the **Assignments** page, select **Add all devices** > **Edit filter** > **Include filtered devices in assignment** > select the filter you created for all Cloud PCs.
5151
6. Complete the creation of the device configuration policy.
5252

53+
If the user's physical device is managed, assign the user or the user's physical device to the same device configuration policy. If the user's physical device is unmanaged or you manage through Group Policy, create a Group Policy Object (GPO) to [allow PKU2U authentication requests to this computer to use online identities](/windows/security/threat-protection/security-policy-settings/network-security-allow-pku2u-authentication-requests-to-this-computer-to-use-online-identities).
54+
5355
**Potential cause #2**: [Per-user multi-factor authentication](/azure/active-directory/authentication/howto-mfa-userstates) is turned on for the user account. Because it blocks sign-in, per-user multi-factor authentication isn't supported for users connecting to Azure AD joined Cloud PCs.
5456

5557
**Possible solution**: [Remove per-user multi-factor authentication](/azure/active-directory/devices/howto-vm-sign-in-azure-ad-windows#mfa-sign-in-method-required) for all users connecting to Cloud PCs. Then, [set an Azure AD conditional access policy](set-conditional-access-policies.md) and assign it to the appropriate users.

0 commit comments

Comments
 (0)