Enabling SSO (single sign on)
Parallels DaaS automatically enables Single Sign-On (SSO) in multi-session environments at the host pool level during deployment. SSO allows users to log in once using their primary credentials (e.g., corporate Entra-ID) and gain seamless access to virtual desktops without repeated authentication prompts.
Follow these steps to enable Single Sign-On (SSO) for Parallels DaaS using Microsoft Graph.
1. Sign in to Azure
Use the following command to sign in to Azure with your tenant context and then set the desired subscription context:
Connect-AzAccount -Tenant "<your-tenant-id>" -UseDeviceAuthentication Set-AzContext -SubscriptionId "<your-subscription-id>" -Tenant "<your-tenant-id>"
2. Prepare your environment
Ensure that the PowerShell execution policy allows local scripts:
Set-ExecutionPolicy -ExecutionPolicy RemoteSigned -Scope CurrentUser
3. Install the required Microsoft Graph modules
Install the Microsoft Graph PowerShell module:
Install-Module Microsoft.Graph -Scope CurrentUser -Repository PSGallery -Force
4. Import necessary modules
Import the authentication and applications modules:
Import-Module Microsoft.Graph.Authentication Import-Module Microsoft.Graph.Applications
5. Connect to Microsoft Graph
Connect using Microsoft Graph with the appropriate permissions:
Connect-MgGraph -Scopes "Application.Read.All","Application-RemoteDesktopConfig.ReadWrite.All" -Tenant "<your-tenant-id>"
6. Enable SSO on required service principals
Fetch the service principal IDs for the following two apps:
Microsoft AVD Client: App ID
a4a365df-50f1-4397-bc59-1a1564b8bb9c
Windows Cloud Login: App ID
270efc09-cd0d-444b-a71f-39af4910ec45
Then update their remote desktop security configuration:
$MSRDspId = (Get-MgServicePrincipal -Filter "AppId eq 'a4a365df-50f1-4397-bc59-1a1564b8bb9c'").Id $WCLspId = (Get-MgServicePrincipal -Filter "AppId eq '270efc09-cd0d-444b-a71f-39af4910ec45'").Id Update-MgServicePrincipalRemoteDesktopSecurityConfiguration -ServicePrincipalId $MSRDspId -IsRemoteDesktopProtocolEnabled Update-MgServicePrincipalRemoteDesktopSecurityConfiguration -ServicePrincipalId $WCLspId -IsRemoteDesktopProtocolEnabled
7. Verify SSO is enabled
You can verify the settings using:
Get-MgServicePrincipalRemoteDesktopSecurityConfiguration -ServicePrincipalId $MSRDspId Get-MgServicePrincipalRemoteDesktopSecurityConfiguration -ServicePrincipalId $WCLspId
Last updated
Was this helpful?