Greetings,
I'm looking to migrate an old RDS infrastructure to a more modern one. For this project we would like to dissociate notebook clients from the Internal AD and use Azure AD for them. I'm running in an issue with what seems to be the credential delegation part
of the RDP connection. I am being prompted the user password when launching the application. If I type in type password the application launch just fine.
I have followed these guidelines and defined "TERMSRV/*" in my delegation policy for diag purpose:
https://docs.microsoft.com/en-us/archive/blogs/mrsnrub/remote-desktop-services-websso
My AAD Joined Windows 10 session is able to access protected Shares from my local AD without having to do anything.
The same RDS setup accessed with an AD Joined Win10 (same version, image from Azure) works properly, the credential delegation works on this setup, the password is not being requested. I have also forced the use of the RDS Gateway so that the AD client would
use the same path as the AAD one.
This threads hints that it should have worked. Note that I'm not looking for the full SSO experience, just not having to enter the password when launching different applications.
https://social.technet.microsoft.com/Forums/en-US/710eca14-e2f3-45e4-a6c8-734915f83b7b/rdweb-sso-experience-with-azure-ad-join-clients?forum=winserverTS
I'm basically looking for pointers on where to look at, is there any traces that can be enabled that would give a reason to why the credential are not being pushed. Am I trying to do something that should not work?
Thanks for your input,
Dominic