We have a lot of remote computer that we join to our Azure Active Directory tenant for single sign on. It would be very helpful if we could access those computers with AAD credentials that would have admin access to those devices in the same way we can with on-prem domain joined computers.
You can use Azure AD for SSO login into the product, but currently the host logins don't work when windows would need to authenticate against an azure domain. The login page would redirect to the federated authentication page, so it recognizes the domain and forwards the user there.
In the Azure Active Directory admin center, go to Azure Active Directory , choose Devices and then Device settings. Verify Users may join devices to Azure AD is enabled. To enable all users, set to All.
Ralph, that doesn't have anything to do with the problem I described. The devices are already joined to AAD. But you can't use an AAD credential to access a machine remotely with LMI Central. Even if that account would have local admin access if you were at that computer directly.
Ash, I wouldn't actually mind the redirect on the remote connection side. It would be worth it to be able to completely disable the built in Administrator account on those machines. I wouldn't even mind if you didn't get the credential passthrough as long as my AAD account can get access to the machines.
Hi aferino, have you already tried this ?
Did not work ?
I'm not concerned with access to Central and LogMeIn in general. I want to be able to start a remote session with computers by providing AAD credentials. Would this enable that functionality? From what I've seen, I doubt it. This appears to be for logging in to the LogMeIn Central portal itself.