Jump to content


anyweb

Windows 365 and the External Identity preview – using a guest account to access Cloud PCs

Recommended Posts

Introduction

Ever wished you could spin up a Cloud PC not just for your employees, but for contractors, partners, or even external collaborators? Good news—External Identity (preview) support in Entra ID now makes that possible. You can invite external users into your tenant and give them access to Cloud PCs, extending the same secure, managed experience your internal users already enjoy.

Of course, there are a few strings attached. Prior to deploying out Cloud PCs to outside identities, you will need to be aware of a number of significant requirements and limitations so that everything runs smoothly.

In this blog post, myself and my good friend Paul Winstanley took a look at what you need to be aware of and how to set up and access.

Requirements

  • The Cloud PC must be running Windows 11 Enterprise with the 2025-09 Cumulative Updates for Windows 11, version 24H2 (KB5065789) or later installed.
  • The Cloud PC must be Entra only joined, hybrid is not supported.
  • Single-sign on must be enabled in the provisioning policy.
  • Connection to the Cloud PC must be via the Windows App or browser.

Limitations

  • User based Intune device configurations profiles will not be applied to the external users Cloud PC. Ensure you target the profiles to devices.
  • Windows 365 Enterprise, Business, and Frontline are supported, Windows 365 Government is not.
  • Cross-cloud users are not supported, i.e. you can’t invite users from Microsoft Azure Government or Microsoft Azure operated by 21Vianet.
  • Be aware of the token limitations for external identities – https://learn.microsoft.com/en-us/entra/identity/conditional-access/concept-token-protection#known-limitations
  • Authentication to on-premises resources with Kerberos or NTLM is not supported for external identities.

Assigning the Windows 365 licence

Assigning the licence should be a simple case of heading over to the Microsoft 365 admin center, navigating to Billing | Licenses and selecting the required Windows 365 subscription.

When selected, we clicked Assign licenses and chose the guest user, in our case Niall’s guest account in Paul’s tenant. When finished we clicked Assign licenses.

1.webp

In our tenant, we received the following error message ‘Failed to assign license for Niall Brady: Cannot process request because a referenced item has an invalid usage location.’ You may not receive this error and not have to perform the fix.

2.webp

To fix this up for us, we went to the Entra admin center and clicked on Users. We located Niall’s guest account and clicked Edit properties.

3.webp

Under the Settings menu, we clicked the Usage location drop-down and selected a location for his account, then clicked Save.

4.webp

After a short period of time, we were able to assign a licence to Niall’s account with no issue.

5.webp
6.webp

Provisioning the Cloud PC for the External Identity

Back in the Intune admin center, under Devices | Device onboarding | Windows 365 | All Cloud PCs there should be a Not provisioned Cloud PC. It reports as Not provisioned as the user has not been assigned a provisioning policy.

7.webp

To resolve this we can either create a provisioning policy and assign this or we can use an existing policy, so long as we have single sign-on enabled and that the Cloud PC is running with 2025-09 Cumulative Updates for Windows 11, version 24H2 (KB5065789) or later. If using an existing policy, take a look at the assignment to ensure that Niall’s account is targeted.

We decided to create a new provisioning policy using the new 25H2 release of Windows 11. We navigated to Devices | Device onboarding | Windows 365 | Provisioning policies in our tenant and clicked Create policy.

As mentioned, ensure Use Microsoft Entra single sign-on is enabled and Microsoft Entra Join is selected for Join type as hybrid is not supported.

8.webp

We selected the Windows 11 Enterprise + Microsoft 365 Apps 25H2 gallery image to ensure that we met the O/S requirements.

9.webp

When assigning the policy, we targeted a group called Windows 365 External Identities.

10-1.webp

After completing the provisioning policy wizard, the policy was visible.

11.webp

Next, we simply added Niall’s guest account to the Windows 365 External Identities group. We navigated to Groups and searched for the group and added his account.

12.webp

Back in All Cloud PCs, a Cloud PC now reported a Status of Provisioning.

13.webp

After a period of time, the Cloud PC reported as Provisioned.

14.webp

Accessing the Cloud PC

The Cloud PC can be accessed via the Windows App or web browser, however prior to attempting to access the following registry key needs to be created on the host device.

Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsApp\Flights
DWORD - EnableIdSignInUx
Value - 0
image-23.webp

There are slight variations to accessing via the app or the browser so let’s take a look at both. Also, thanks to our MVP friend Sune Thomsen for providing the details that steered us in the right direction to make this work!

Windows App

The user must be authenticated in the Windows App. They need to click their account profile picture on the top right of the application and click Sign in with another account.

image-24.webp

If the registry key has been entered, then the following Sign in window will be displayed. Note Sign-in options is available. This would not be displayed if the registry key is not present. Click Sign-in options.

image-26.webp

The next step is to click the Sign in to an organization option.

image-27.webp

and enter the domain of the organization hosting the Windows 365 Cloud PC. In our case, sccmsolutions.co.uk.

image-28.webp

Now, the guest account must authenticate in the tenant using their account credentials, and respond to any multi-factor authentication or other prompts.

image-29.webp

When authentication is complete, the user will be presented with their Cloud PC in the Windows app.

image-30.webp

The user is able to switch between organizations by clicking their account profile and selecting accordingly.

image-31.webp

Web Browser

When navigating to windows365.microsoft.com, the user will authenticate with their account. Then in the top right hand corner of the web page, the user clicks their profile and then chooses Sign in with another account.

image-33.webp

Now, choose Use another account.

image-34.webp

The user will then have the Sign-in options available to select (if the reg key is present on the device).

image-35.webp

After selecting Sign-in options, choose Sign in to an organization.

image-36.webp

As with the Windows App, they enter the domain name of the organization hosting the Windows 365 Cloud PC.

image-37.webp

and authenticate with their user account.

image-38.webp

Finally, the user will be presented with the provisioned Cloud PC in the web browser.

image-39.webp

Using either Windows App or the web browser to log on to the Cloud PC, will allow the guest account access to the device, where previously they would have had to have had an account created in that tenant for them to have a Cloud PC assigned.

As we can see, Niall’s account is accessing CPC-niall-ZMTAD in the sccmsolutions tenant.

image-40.webp

This is a hotly awaited addition to Windows 365 Cloud PC features. We look forward to using this feature with our customers. We hope that the registry key requirement is soon removed and is added as part of the installation of the Windows App, as this will help reduce steps required for onboarding for guest accounts.

See you next time.

Share this post


Link to post
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...


×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.