You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The following errors can occur when connecting to a Cloud PC.
34
34
35
-
## Errors when connecting to an Azure AD joined Cloud PC
35
+
## Errors when connecting to an Azure Active Directory (Azure AD) joined Cloud PC
36
36
37
37
### The logon attempt failed
38
-
**Potential cause #1**: The Cloud PC VM is denying PKU2U protocol requests. The PKU2U protocol is only triggered in the following cases:
38
+
**Potential cause #1**: The Cloud PC denied PKU2U protocol requests. The PKU2U protocol is only triggered in the following cases:
39
39
40
40
- The Cloud PC is Azure AD joined.
41
41
- The user is connecting from the Windows desktop client.
42
-
- The user's physical device is either Azure AD registered, Azure AD joined, or Hybrid Azure AD joined to the same organization as the Cloud PC.
42
+
- The user's physical device is Azure AD registered, Azure AD joined, or hybrid Azure AD joined to the same organization as the Cloud PC.
43
43
44
-
**Possible solution**: Enable PKU2U protocol requests on your Cloud PC. To do this:
44
+
**Possible solution**: Turn on PKU2U protocol requests on your Cloud PC:
45
45
46
-
1.[Create a filter for all Cloud PCs](create-filter.md).
46
+
1.[Create a filter for all Cloud PCs](create-filter.md#create-a-filter-for-all-cloud-pcs).
47
47
2. Create a device configuration policy [using the settings catalog](/mem/intune/configuration/settings-catalog.md).
48
-
3. On the **Configuration settings** page, search for and select **Network Security Allow PKU2U Authentication Requests**, then select**Allow**.
48
+
3. On the **Configuration settings** page, search for and select **Network Security Allow PKU2U Authentication Requests** >**Allow**.
49
49

50
50
5. On the **Assignments** page, select **Add all devices** > **Edit filter** > **Include filtered devices in assignment** > select the filter you created for all Cloud PCs.
51
51
6. Complete the creation of the device configuration policy.
52
52
53
-
**Potential cause #2**: [Per-user multi-factor authentication](/azure/active-directory/authentication/howto-mfa-userstates.md) is enabled for the user account. Per-user multi-factor authentication is not supported for users connecting to Azure AD joined Cloud PCs since it blocks login.
53
+
**Potential cause #2**: [Per-user multi-factor authentication](/azure/active-directory/authentication/howto-mfa-userstates.md) is turned on for the user account. Because it blocks sign-in, per-user multi-factor authentication isn't supported for users connecting to Azure AD joined Cloud PCs.
54
54
55
-
**Possible solution**: [Disable per-user multi-factor authentication](/azure/active-directory/devices/howto-vm-sign-in-azure-ad-windows#mfa-sign-in-method-required.md) for all users connecting to Cloud PCs. Then, [set an Azure AD conditional access policy](set-conditional-access-policies.md) and assign it to the appropriate users.
55
+
**Possible solution**: [Remove per-user multi-factor authentication](/azure/active-directory/devices/howto-vm-sign-in-azure-ad-windows#mfa-sign-in-method-required.md) for all users connecting to Cloud PCs. Then, [set an Azure AD conditional access policy](set-conditional-access-policies.md) and assign it to the appropriate users.
0 commit comments