
Originally, Azure Virtual Desktop hosts needed to be domain-joined to on-premises Active Directory or Azure AD domain services. To Access on-premises ADDS from Azure VNET you need to have either a site-to-site virtual private network (VPN) or Azure ExpressRoute. Users had to sign into both Azure AD and AD DS.
AVD now supports Azure AD join for host VMs. It’s a big breakthrough, with Azure AD join you don’t need connectivity to domain controllers using site-to-site VPN or express route. The cloud-only environment is now supported. In this post, I’m going to talk about implementing AAD-joined VMs for Azure virtual desktops.


After deploying the host pool, first, you need to assign users to the host pool. Next, you need to assign User login RBAC permissions to the users in Azure VMs.

Select your Subscription – Access control (IAM) – Add role assignment



RDP access to VMs for administration
When you are accessing Azure AD joined VM, your local PC must meet one of the following conditions.
However, if your local PC does not meet these requirements and it's not joined to Azure AD, you can add targetisaadjoined to custom RDP properties.

Single Sign on
Single sign-on will work by default for Azure AD-joined VMs. however, if you have Hybrid joined VMs in your host pool you need to enable Azure AD Kerberos and add enablerdsaadauth:i:1 for custom RDP properties.
In the next post, I’m going to talk about configuring FSLogix roaming profiles with Azure files on Azure AD Joined AVD scenario, stay tuned.
Hope this post is useful
Support Availability - New Year's Eve and New Year's Day
On December 31st, 2025, our support team will be available:
On January 1st, support is available exclusively via email.
For assistance, please contact us at [email protected], and we will respond to your inquiry as soon as we can.