This content has been machine translated dynamically.
Dieser Inhalt ist eine maschinelle Übersetzung, die dynamisch erstellt wurde. (Haftungsausschluss)
Cet article a été traduit automatiquement de manière dynamique. (Clause de non responsabilité)
Este artículo lo ha traducido una máquina de forma dinámica. (Aviso legal)
此内容已经过机器动态翻译。 放弃
このコンテンツは動的に機械翻訳されています。免責事項
이 콘텐츠는 동적으로 기계 번역되었습니다. 책임 부인
Este texto foi traduzido automaticamente. (Aviso legal)
Questo contenuto è stato tradotto dinamicamente con traduzione automatica.(Esclusione di responsabilità))
This article has been machine translated.
Dieser Artikel wurde maschinell übersetzt. (Haftungsausschluss)
Ce article a été traduit automatiquement. (Clause de non responsabilité)
Este artículo ha sido traducido automáticamente. (Aviso legal)
この記事は機械翻訳されています.免責事項
이 기사는 기계 번역되었습니다.책임 부인
Este artigo foi traduzido automaticamente.(Aviso legal)
这篇文章已经过机器翻译.放弃
Questo articolo è stato tradotto automaticamente.(Esclusione di responsabilità))
Translation failed!
Hybrid Azure Active Directory joined
Note:
Since July 2023, Microsoft has renamed Azure Active Directory (Azure AD) to Microsoft Entra ID. In this document, any reference to Azure Active Directory, Azure AD, or AAD now refers to Microsoft Entra ID.
This article describes the requirements to create identity pool of Hybrid Azure Active Directory (HAAD) joined catalogs and Hybrid Azure AD joined catalogs enrolled in Microsoft Intune in addition to the requirements outlined in the system requirements section.
Hybrid Azure AD joined machines use on-premises AD as the authentication provider. You can assign them to domain users or groups in on-premises AD. To enable Azure AD seamless SSO experience, you need to have the domain users synced to Azure AD.
Note:
Hybrid Azure AD joined VMs are supported in both federated and managed identity infrastructures.
Requirements for Hybrid Azure Active Directory joined
- VDA type: Single-session (desktops only) or multi-session (apps and desktops)
- VDA version: 2212 or later
- Provisioning type: Machine Creation Services (MCS), Persistent and Non-persistent
- Assignment type: Dedicated and pooled
- Hosting platform: Any hypervisor or cloud service
Limitations for Hybrid Azure Active Directory joined
- If Citrix Federated Authentication Service (FAS) is used, single sign-on is directed to on-premises AD rather than Azure AD. In this case, it is recommended to configure Azure AD certificate-based authentication so that the primary refresh token (PRT) is generated upon user logon, which facilitates single sign-on to Azure AD resources within the session. Otherwise, the PRT will not be present and SSO to Azure AD resources will not work. For information on achieving Azure AD single sign-on (SSO) to hybrid joined VDAs using Citrix Federated Authentication Service (FAS), see Hybrid-joined VDAs.
- Do not skip image preparation while creating or updating machine catalogs. If you want to skip image preparation, make sure the master VMs are not Azure AD or Hybrid Azure AD joined.
Considerations for Hybrid Azure Active Directory joined
- Creating hybrid Azure Active Directory joined machines requires the
Write userCertificate
permission in the target domain. Make sure that you enter credentials of an administrator with that permission during catalog creation. -
The hybrid Azure AD joining process is managed by Citrix. You need to disable
autoWorkplaceJoin
controlled by Windows in the master VMs as follows. The task of manually disablingautoWorkplaceJoin
is only required for VDA version 2212 or earlier.- Run
gpedit.msc
. - Navigate to Computer Configuration > Administrative Templates > Windows Components > Device Registration.
- Set Register domain joined computers as devices to Disabled.
- Run
-
Select the Organizational Unit (OU) that is configured to be synced with Azure AD when you create the machine identities.
-
For Windows 11 22H2 based master VM, create a scheduled task in the master VM that executes the following commands at system startup using SYSTEM account. This task of scheduling a task in the master VM is only required for VDA version 2212 or earlier.
$VirtualDesktopKeyPath = 'HKLM:\Software\AzureAD\VirtualDesktop' $WorkplaceJoinKeyPath = 'HKLM:\SOFTWARE\Policies\Microsoft\Windows\WorkplaceJoin' $MaxCount = 60 for ($count = 1; $count -le $MaxCount; $count++) { if ((Test-Path -Path $VirtualDesktopKeyPath) -eq $true) { $provider = (Get-Item -Path $VirtualDesktopKeyPath).GetValue("Provider", $null) if ($provider -eq 'Citrix') { break; } if ($provider -eq 1) { Set-ItemProperty -Path $VirtualDesktopKeyPath -Name "Provider" -Value "Citrix" -Force Set-ItemProperty -Path $WorkplaceJoinKeyPath -Name "autoWorkplaceJoin" -Value 1 -Force Start-Sleep 5 dsregcmd /join break } } Start-Sleep 1 } <!--NeedCopy-->
- By default, Azure AD Connect synchronizes every 30 minutes. The provisioned machines can take up to 30 minutes to be hybrid Azure AD joined during the first boot.
Hybrid Azure AD joined catalogs enrolled in Microsoft Intune
Hybrid Azure AD joined catalogs, persistent single and multi-session VMs, enrolled in Microsoft Intune use the device credentials with co-management capability.
Co-management enables you to concurrently manage Windows 10 or later devices by using both Configuration Manager and Microsoft Intune. For more information, see Co-management.
Prerequisites for Hybrid Azure AD joined catalogs enrolled in Microsoft Intune
Before enabling this feature, verify that:
- Your Azure environment meets the licensing requirements to use Microsoft Intune. For more information, see the Microsoft documentation.
- You have a valid Configuration Manager deployment with co-management enabled. For more information, see the Microsoft documentation.
Requirements for Hybrid Azure AD joined catalogs enrolled in Microsoft Intune
- Control plane: Citrix DaaS
- VDA type: Single-session or multi-session
- VDA version: 2407 or later
- Provisioning type: Machine Creation Service (MCS), Persistent. Hybrid Azure AD joined catalogs enrolled in Microsoft Intune for non-persistent single and multi-session VMs is currently under Preview. See Enrollment of Hybrid Entra ID joined non-persistent VMs into Microsoft Intune.
- Assignment type: Dedicated and pooled
- Hosting platform: Any hypervisor or cloud service
Limitations for Hybrid Azure AD joined catalogs enrolled in Microsoft Intune
- Do not skip image preparation while creating or updating machine catalogs.
- Internet-based client management (IBCM) of Configuration Manager is not supported.
Considerations for Hybrid Azure AD joined catalogs enrolled in Microsoft Intune
-
Intune enrollment might be delayed if too many machines in the catalog are powered on simultaneously.
Microsoft imposes a per-tenant Intune enrollment restriction that limits the number of devices that can be enrolled within a specific time frame. The allowable number of devices varies depending on the number of Microsoft Intune licenses associated with the tenant. Consult your Microsoft account team to find out the allowable limit for your tenant. This approach helps Microsoft Intune enrollment scale better for large environments.
For persistent machines, there might be an initial wait time required for all devices to complete Intune enrollment.
For non-persistent machines, consider limiting the concurrent power actions in either Autoscale or manual power actions.
- Configure Cloud Attach of Configuration Manager. For more information, see the Microsoft documentation.
- Manually install Configuration Manager client on the master VM without assigning the site code with
.\CCMSetup.exe /mp:SCCMServer /logon FSP=SCCMServer
. The SCCMServer is the SCCM server name in your environment. For more information, see the Microsoft documentation. -
MCS created machines use the automatic site assignment mechanism to find site boundary groups that are published to Active Directory Domain Services. Ensure that the boundaries and boundary groups of Configuration Manager are configured in your environment. If automatic site assignment is not available, a static Configuration Manager site code can be configured in the master VM through the following registry setting:
Key:
HKEY_LOCAL_MACHINE\SOFTWARE\Citrix\MachineIdentityServiceAgent\DeviceManagement <!--NeedCopy-->
Value name:
MdmSccmSiteCode
Value type: String
Value data:
the site code to be assigned
Where to go next
For more information on creating identity pool of Hybrid Azure Active Directory joined catalogs, see Identity pool of Hybrid Azure Active Directory joined machine identity.
Share
Share
In this article
- Requirements for Hybrid Azure Active Directory joined
- Limitations for Hybrid Azure Active Directory joined
- Considerations for Hybrid Azure Active Directory joined
- Hybrid Azure AD joined catalogs enrolled in Microsoft Intune
- Prerequisites for Hybrid Azure AD joined catalogs enrolled in Microsoft Intune
- Requirements for Hybrid Azure AD joined catalogs enrolled in Microsoft Intune
- Limitations for Hybrid Azure AD joined catalogs enrolled in Microsoft Intune
- Where to go next
This Preview product documentation is Citrix Confidential.
You agree to hold this documentation confidential pursuant to the terms of your Citrix Beta/Tech Preview Agreement.
The development, release and timing of any features or functionality described in the Preview documentation remains at our sole discretion and are subject to change without notice or consultation.
The documentation is for informational purposes only and is not a commitment, promise or legal obligation to deliver any material, code or functionality and should not be relied upon in making Citrix product purchase decisions.
If you do not agree, select I DO NOT AGREE to exit.