Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
As part of setting up your organization's environment to support Windows 365 Link, you must make sure that your Conditional Access policies accommodate both the login through and connection from Windows Cloud PC devices. If Conditional Access is used to protect resources used to access Windows 365 Cloud PCs as described in Set conditional access policies for Windows 365, another Conditional Access policy must also be used to protect the user action to register or join devices. Failure to create this second policy may cause Windows 365 Link authentication to fail.
To decide if you need a user action policy, follow these steps:
- Check if any policies are triggered when connecting to Windows 365 resources.
- Create a new user action policy with the same access controls.
How Windows 365 Link authentication works
Windows 365 Cloud PC devices authenticate in two consecutive stages:
- Interactive sign-in: When the user signs in on the Windows 365 Link sign in screen, it can trigger Conditional Access policies applied to Register or Join devices actions. Users can be shown messages or get challenged for stronger, multifactor authentication methods. This stage generates the token that is used in the second stage.
- Non-interactive connections to Cloud PC resources using single sign-on: This stage can trigger Conditional Access policies on resources like Windows 365, Windows Cloud Login, and All resources. Users can't be prompted or challenged in this stage. If stronger authentication is needed, the connection is interrupted, and the user is shown an error that an interactive window can't be shown.
Review existing policies
You can use the What if tool to determine if any Conditional Access policies are applied to relevant Windows 365 Resources during the non-interactive connection stage. This includes a policy that is applied to All resources (formerly All cloud apps).
- Sign in to the Microsoft Entra admin center > Protection > Conditional Access > Policies > What if.
- For User or Workload identity select a user to test with.
- For Cloud apps, actions, or authentication context, select Any cloud app.
- For Select target type leave Cloud app selected.
- Select Select apps then select the following resources, if they're available:
- Windows 365 (app ID 0af06dc6-e4b5-4f28-818e-e78e62d137a5).
- Azure Virtual Desktop (app ID 9cdead84-a844-4324-93f2-b2e6bb768d07).
- Microsoft Remote Desktop (app ID a4a365df-50f1-4397-bc59-1a1564b8bb9c).
- Windows Cloud Login (app ID 270efc09-cd0d-444b-a71f-39af4910ec45).
- Select What If.
Review each of the Policies that will apply and determine the access controls used to grant access to those resources and session settings. Note these policies for use when creating the new user action policies in the next section.
Create new Conditional Access policy for interactive sign-in stage
Using the information you gathered from the What if tool in the previous section, you can now create a new Conditional Access policy to require the same controls for the sign-in stage.
- Sign in to the Microsoft Entra admin center > Protection > Conditional Access > Policies > New policy
- Give your policy a name. Consider using a meaningful standard for policy names.
- Under Assignments > Users, select 0 users and groups selected.
- Under Include, select All users or select a group of users who will sign-in through Windows 365 Link devices.
- Under Exclude, select Users and groups > select your organization's emergency access or break-glass accounts.
- Under Target resources > User actions, select Register or join devices.
- Under Access controls > Grant, use the same controls found earlier using the What If tool.
- Confirm your settings and set Enable policy to Report-only.
- Select Create.
- After confirming the settings using report-only mode, change the Enable policy toggle from Report-only to On.
While these steps are specifically for enabling interactive authentication on Windows 365 Link devices, the resulting user action policy is also applied when users Register or Join devices to Microsoft Entra ID.
For more information about creating Conditional Access policies for device registration, including potential conflicts, see Require multifactor authentication for device registration.
For more information about user actions with Conditional Access, see User actions.
For more information about creating Conditional Access policies for resources used for Windows 365, see Set Conditional Access policies.