Share via


Windows 365 identity and authentication

A Cloud PC user's identity defines which access management services manage that user and Cloud PC. This identity defines:

  • The types of Cloud PCs the user has access to.
  • The types of non-Cloud PC resources the user has access to.

A device can also have an identity determined by its join type to Microsoft Entra ID. For a device, the join type defines:

  • If the device requires line of sight to a domain controller.
  • How the device is managed.
  • How users authenticate to the device.

Identity types

There are four identity types:

  • Hybrid identity: Users or devices that are created in on-premises Active Directory Domain Services, then synchronized to Microsoft Entra ID.
  • Cloud-only identity: Users or devices that are created and only exist in Microsoft Entra ID.
  • Federated identity: Users that are created in a third-party identity provider, other that Microsoft Entra ID or Active Directory Domain Services, then federated with Microsoft Entra ID.
  • External identity: Users who are created and managed outside of your Microsoft Entra tenant but are invited in to your Microsoft Entra tenant to access your organization's resources.

Note

External identity (preview)

External identity (preview) support allows you to invite users to your Entra ID tenant and provide them Cloud PCs. There are several requirements and limitations when providing Cloud PCs to external identities:

  • Requirements
    • Cloud PC operating system: The Cloud PC must be running Windows 11 Enterprise, versions 24H2 or later with the 2025-09 Cumulative Updates for Windows 11 (KB5065789) or later installed.
    • Cloud PC join type: The Cloud PC must be Entra joined.
    • Single sign-on: Single sign-on must be configured for the Cloud PC.
    • Windows App client: The external identity must connect from the Windows App on Windows or a web browser.
    • Licensing: Ensure that external identities have the proper entitlements for software and services on the Cloud PC. See Windows 365 licensing guidance for more details.
  • Limitations
    • Intune device configuration policies: Device configuration policies assigned to the external identity won't be applied to the user's Cloud PC. Instead, assign device configuration policies to the device.
    • Windows 365 Government availability: Only Windows 365 commercial (Enterprise, Business, and Frontline) editions are supported. Windows 365 Government isn't supported.
    • Cross cloud invites: Cross-cloud users aren't supported. You can only provide Cloud PCs to users you invite from social identity providers, Microsoft Entra users from the Microsoft Azure commercial cloud, or other identity providers registered in your workforce tenant. You can't provision Cloud PCs for users you invite from Microsoft Azure Government or Microsoft Azure operated by 21Vianet.
    • Token protection: Microsoft Entra has certain limitations for token protection for external identities. Learn more about Windows App support for token protection by platform.
    • Kerberos authentication: External identities can't authenticate to on-premises resources using Kerberos or NTLM protocols.
    • Windows App clients: When using the Windows App on Windows, you must set a registry key on the device running the Windows App to complete the B2B login. Learn more about the required registry key.

See Microsoft Entra B2B best practices for recommendations on configuring your environment for external identities and Windows 365 licensing guidance.

Device join types

There are two join types that you can select from when provisioning a Cloud PC:

The following table shows key capabilities or requirements based on the selected join type:

Capability or requirement Microsoft Entra hybrid join Microsoft Entra join
Azure subscription Required Optional
Azure virtual network with line of sight to the domain controller Required Optional
User identity type supported for login Hybrid users only Hybrid users, cloud-only users, or external identities (preview)
Policy management Group Policy Objects (GPO) or Intune MDM Intune MDM only
Windows Hello for Business sign-in supported Yes, and the connecting device must have line of sight to the domain controller through the direct network or a VPN Yes

Authentication

When a user accesses a Cloud PC, there are three separate authentication phases:

  • Cloud service authentication: Authenticating to the Windows 365 service, which includes subscribing to resources and authenticating to the Gateway, is with Microsoft Entra ID.
  • Remote session authentication: Authenticating to the Cloud PC. There are multiple ways to authenticate to the remote session, including the recommended single sign-on (SSO).
  • In-session authentication: Authenticating to applications and web sites within the Cloud PC.

For the list of credential available on the different clients for each of the authentication phase, compare the clients across platforms.

Important

In order for authentication to work properly, the user's local machine must also be able to access the URLs in the Remote Desktop clients section of the Azure Virtual Desktop required URL list.

Windows 365 offers single sign-on (defined as a single authentication prompt that can satisfy both the Windows 365 service authentication and Cloud PC authentication) as part of the service. For more information, see single sign-on.

The following sections provide more information on these authentication phases.

Cloud service authentication

Users must authenticate with the Windows 365 service when:

To access the Windows 365 service, users must first authenticate to the service by signing in with a Microsoft Entra ID account.

Multifactor authentication

Follow the instructions in Set Conditional Access policies to learn how to enforce Microsoft Entra multifactor authentication for your Cloud PCs. That article also tells you how to configure how often your users are prompted to enter their credentials.

Passwordless authentication

Users can use any authentication type supported by Microsoft Entra ID, such as Windows Hello for Business and other passwordless authentication options (for example, FIDO keys), to authenticate to the service.

Smart card authentication

To use a smart card to authenticate to Microsoft Entra ID, you must first configure Microsoft Entra certificate-based authentication or configure AD FS for user certificate authentication.

Third-party identity providers

You can use third-party identity providers as long as they federate with Microsoft Entra ID.

Remote session authentication

If you haven't already enabled single sign-on and users haven't saved their credentials locally, they also need to authenticate to the Cloud PC when launching a connection.

Single sign-on (SSO)

Single sign-on (SSO) allows the connection to skip the Cloud PC credential prompt and automatically sign the user in to Windows through Microsoft Entra authentication. Microsoft Entra authentication provides other benefits including passwordless authentication and support for third-party identity providers. To get started, review the steps to configure single sign-on.

Important

SSO must be configured for external identities to login to the Cloud PC. If SSO isn't configured, the user will be stuck at the remote session authentication prompt.

Without SSO, the client prompts users for their Cloud PC credentials for every connection. The only way to avoid being prompted is to save the credentials in the client. We recommend you only save credentials on secure devices to prevent other users from accessing your resources.

In-session authentication

After you connect to your Cloud PC, you may be prompted for authentication inside the session. This section explains how to use credentials other than username and password in this scenario.

In-session passwordless authentication

Windows 365 supports in-session passwordless authentication using Windows Hello for Business or security devices like FIDO keys when using the Windows Desktop client. Passwordless authentication is enabled automatically when the Cloud PC and local PC are using the following operating systems:

When enabled, all WebAuthn requests in the session are redirected to the local PC. You can use Windows Hello for Business or locally attached security devices to complete the authentication process.

To access Microsoft Entra resources with Windows Hello for Business or security devices, you must enable the FIDO2 Security Key as an authentication method for your users. To enable this method, follow the steps in Enable FIDO2 security key method.

In-session smart card authentication

To use a smart card in your session, make sure you install the smart card drivers on the Cloud PC and allow smart card redirection as part of managing RDP device redirections for Cloud PCs. Review the client comparison chart to make sure your client supports smart card redirection.

Next steps

Learn about the Cloud PC lifecycle.