Edge 86.0.622.58 On-premises Sync Not Working Over VPN With Cached Local Login

%3CLINGO-SUB%20id%3D%22lingo-sub-1846459%22%20slang%3D%22en-US%22%3EEdge%2086.0.622.58%20On-premises%20Sync%20Not%20Working%20Over%20VPN%20With%20Cached%20Local%20Login%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1846459%22%20slang%3D%22en-US%22%3E%3CDIV%20class%3D%22lia-message-subject-wrapper%20lia-component-subject%20lia-component-message-view-widget-subject-with-options%22%3E%3CSPAN%3EWe%20are%20running%20Edge%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%3E86.0.622.58%26nbsp%3Bon%20Win10%20Enterprise%201909%20domain%20joined%20systems.%3C%2FSPAN%3E%3C%2FDIV%3E%3CDIV%20class%3D%22lia-message-body%20lia-component-message-view-widget-body%20lia-component-body-signature-highlight-escalation%20lia-component-message-view-widget-body-signature-highlight-escalation%22%3E%3CDIV%20class%3D%22lia-message-body-content%22%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EWe%20are%20trying%20to%20configure%20the%20Edge%20GPO%20to%20enable%20local%20sync%20of%20favorites%2C%26nbsp%3Bbut%20we%20are%20unable%20to%20get%20the%20on-prem%20sign-in%20to%20work%20over%20VPN%20and%20so%20the%20local%20profile.pb%20is%20never%20created.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EOur%20settings%20are%20as%20follows%3A%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EBrowserSignin%20%3D%201%3C%2FP%3E%3CP%3EConfigureOnPremisesAccountAutoSignIn%20%3D%201%3C%2FP%3E%3CP%3ERoamingProfileSupportEnabled%20%3D%201%3C%2FP%3E%3CP%3ESyncDisabled%20%3D%200%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EWhen%20we%20login%20to%20Windows%2010%20with%20a%20cached%20credential%2C%20connect%20to%20VPN%2C%20and%20launch%20Edge%20with%20these%20settings%2C%20we%20get%20prompted%20to%20sign-in.%26nbsp%3B%20The%20only%20account%20that%20seems%20to%20work%20is%20the%20%22work%20or%20school%20account%22%20which%20is%20our%20O365%20email%20address.%26nbsp%3B%20Signing%20in%20using%20this%20account%20results%20in%20the%20Edge%20account%20type%20and%20sync%20account%20type%20as%20AAD%20instead%20of%20on-prem%20and%20the%20message%20%22sync%20isn't%20available%20for%20this%20account%22%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI%20believe%20the%20cause%20of%20the%20issue%20is%20the%20AD%20account%20is%20not%20being%20used%20to%20sign%20in%20to%20the%20browser%20even%20though%26nbsp%3BConfigureOnPremisesAccountAutoSignIn%20is%20set%20to%201.%26nbsp%3B%20Doing%20a%20whoami%20at%20a%20command%20prompt%20shows%20my%20account%20name%20in%20domain%5Cusername%20format.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EUsing%20these%20same%20settings%20while%20logged%20into%20an%20on-site%20workstation%20results%20in%20on-premises%20sign%20in%20and%20sync%20working%20properly.%26nbsp%3B%20Is%20there%20any%20reason%20why%20this%20functionality%20would%20not%20work%20on%20a%20cached%20local%20logon%2FVPN%20scenario%3F%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FDIV%3E%3C%2FDIV%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1863003%22%20slang%3D%22en-US%22%3ERe%3A%20Edge%2086.0.622.58%20On-premises%20Sync%20Not%20Working%20Over%20VPN%20With%20Cached%20Local%20Login%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1863003%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F854752%22%20target%3D%22_blank%22%3E%40jdbst56%3C%2FA%3E%26nbsp%3B%20Hi%20Joshua!%26nbsp%3B%20Thanks%20for%20reaching%20out!%26nbsp%3B%20The%20Identity%20Team%20was%20looking%20over%20your%20post%20and%20it%20would%20be%20helpful%20to%20get%20logs%20to%20better%20understand%20your%20specific%20question%2Fscenario.%26nbsp%3B%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EBecause%20of%20the%20sensitive%20information%2FPII%20that%20can%20be%20in%20the%20logs%2C%20there%20are%20a%20couple%20of%20options%3A%26nbsp%3B%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CA%20style%3D%22background-color%3A%20%23ffffff%3B%22%20href%3D%22https%3A%2F%2Fsupport.microsoft.com%2Fen-us%2Fhub%2F4343728%2Fsupport-for-business%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EFile%20a%20customer%20support%20request%3C%2FA%3E%26nbsp%3B%20You%20should%20be%20able%20to%20work%20with%20them%20directly%20to%20investigate%2Fresolve%20your%20specific%20issue.%26nbsp%3B%26nbsp%3B%3C%2FLI%3E%0A%3CLI%3ESubmit%20diagnostic%20data%20through%20our%20in-browser%20feedback%20tool.%20It's%20under%20%22...%22%20menu%20%26gt%3B%20Help%20and%20feedback%20%26gt%3B%20Send%20feedback.%26nbsp%3B%26nbsp%3B%26nbsp%3BYou%20need%20to%26nbsp%3Bturn%20on%20%22Send%20diagnostic%20data%22%20and%20this%20should%20capture%20all%20the%20necessary%20logs.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3EIf%20you%20are%20planning%20to%20use%20the%20in-browser%20feedback%20tool%20please%20get%20into%20a%20clean%20state%20and%20log%20feedback%20only%20after%20the%20issue%20is%20reproduced.%26nbsp%3B%20You%20can%26nbsp%3Bget%20into%20a%20clean%20state%20by%201)%20deleting%20User%20Data%20folder%20before%20launch%20OR%202)%20Create%20a%20separate%20folder%20and%20launching%20edge%20from%20command%20line%20using%20--user-data-dir%3D%3CTHAT%20folder%3D%22%22%3E%3C%2FTHAT%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAdditionally%2C%20to%20help%20the%20team%20find%20your%20feedback%20quickly%2C%20you%20can%20include%20the%20string%20%22ForumIdentityOnPremisesVPN%22%20and%20comment%20below%20once%20you've%20submitted%20it.%26nbsp%3B%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CEM%3E-Kelly%3C%2FEM%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1867710%22%20slang%3D%22en-US%22%3ERe%3A%20Edge%2086.0.622.58%20On-premises%20Sync%20Not%20Working%20Over%20VPN%20With%20Cached%20Local%20Login%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1867710%22%20slang%3D%22en-US%22%3EI%20have%20a%20similar%20issue.%20Seems%20that%20some%20VLANs%20work%20as%20expedted%2C%20others%20automatically%20want%20me%20to%20sign%20in%20using%20an%20Azure%20AD%20account.%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1867812%22%20slang%3D%22en-US%22%3ERe%3A%20Edge%2086.0.622.58%20On-premises%20Sync%20Not%20Working%20Over%20VPN%20With%20Cached%20Local%20Login%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1867812%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F757644%22%20target%3D%22_blank%22%3E%40Kelly_Y%3C%2FA%3E%26nbsp%3BHello%2C%20I%20have%20submitted%20the%20logs%20through%20the%20in-browser%20feedback%20tool%20today%20per%20your%20rquest.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1868437%22%20slang%3D%22en-US%22%3ERe%3A%20Edge%2086.0.622.58%20On-premises%20Sync%20Not%20Working%20Over%20VPN%20With%20Cached%20Local%20Login%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1868437%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F854752%22%20target%3D%22_blank%22%3E%40jdbst56%3C%2FA%3E%26nbsp%3BThank%20you%20for%20the%20feedback!%26nbsp%3B%20I've%20located%20your%20specific%20report%20and%20routed%20it%20to%20the%20Identity%20Team.%26nbsp%3B%20We%20will%20follow%20up%20if%20there%20is%20any%20additional%20information%20needed%20or%20updates%2Finsights%20to%20share.%26nbsp%3B%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CEM%3E-Kelly%3C%2FEM%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1869044%22%20slang%3D%22en-US%22%3ERe%3A%20Edge%2086.0.622.58%20On-premises%20Sync%20Not%20Working%20Over%20VPN%20With%20Cached%20Local%20Login%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1869044%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F854752%22%20target%3D%22_blank%22%3E%40jdbst56%3C%2FA%3E%26nbsp%3BThe%20team%20has%20investigated%20and%20can%20see%20from%20the%20feedback%20report%20submitted%2C%20on%20MS%20Edge%20launch%2C%20the%20user%20got%20signed%20in%20with%20the%20secondary%20AAD%20account%20on%20the%20machine.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Fdocs.microsoft.com%252Fen-us%252Fdeployedge%252Fmicrosoft-edge-policies%2523configureonpremisesaccountautosignin%26amp%3Bdata%3D04%257C01%257Cv-keyoko%2540microsoft.com%257C06484720daaa4842b2c508d884ec0e35%257C72f988bf86f141af91ab2d7cd011db47%257C1%257C0%257C637405496675280835%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C1000%26amp%3Bsdata%3DyO5lV3W%252B8khM1ihRVbO2AaMQrpMsa1XsPteaE7SKWFA%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EConfigureOnPremisesAccountAutoSignIn%3C%2FA%3E%20policy%20mentions%20that%20MS%20Edge%20will%20give%20preference%20to%20AAD%20accounts%20over%20on-premises%20account.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20class%3D%22lia-indent-padding-left-30px%22%3E%3CEM%3EEnable%20the%20use%20of%20Active%20Directory%20accounts%20for%20automatic%20sign%20in%20if%20your%20users'%20machines%20are%20Domain%20Joined%20and%20%3CSTRONG%3E%3CU%3Eyour%20environment%20is%20not%20hybrid%20joined%3C%2FU%3E%3C%2FSTRONG%3E.%26nbsp%3B%3C%2FEM%3E%3C%2FP%3E%0A%3CP%20class%3D%22lia-indent-padding-left-30px%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20behavior%20currently%20being%20experienced%20is%20to%20be%20expected%20and%20the%20change%20to%20use%20secondary%20account%20was%20made%20in%20MS%20Edge%20V86.%26nbsp%3B%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20current%20suggestion%20from%20the%20team%20is%20to%20consider%20removing%20the%20secondary%20AAD%20account%20from%20machine.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ETo%20provide%20a%20little%20more%20information%2C%20we%20are%20evaluating%2Finvestigating%20creating%20a%20new%20policy%20so%20users%20will%20not%20get%20implicit%20sign-in%20with%20secondary%20AAD%20account%20if%26nbsp%3BConfigureOnPremisesAccountAutoSignIn%20is%20configured.%26nbsp%3B%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F520174%22%20target%3D%22_blank%22%3E%40bin_da%3C%2FA%3E%26nbsp%3B-%20Please%20take%20a%20look%20at%20this%20post%20and%20see%20if%20it%20helps%20your%20situation%20as%20well.%26nbsp%3B%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThanks!%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CEM%3E-Kelly%3C%2FEM%3E%3C%2FP%3E%0A%3CBLOCKQUOTE%3E%3CHR%20%2F%3E%3C%2FBLOCKQUOTE%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1872991%22%20slang%3D%22en-US%22%3ERe%3A%20Edge%2086.0.622.58%20On-premises%20Sync%20Not%20Working%20Over%20VPN%20With%20Cached%20Local%20Login%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1872991%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F757644%22%20target%3D%22_blank%22%3E%40Kelly_Y%3C%2FA%3E%26nbsp%3BThanks%20for%20your%20response.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ESo%20in%20our%20testing%20we%20saw%20that%20both%20AAD%20accounts%20and%20personal%20accounts%20are%20taking%20precedence%20over%20the%20on-premise%20AD%20account.%26nbsp%3B%20We%20had%20to%20remove%20all%20traces%20of%20both%20accounts%20in%20order%20for%20the%20AD%20sync%20to%20work.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EIn%20our%20testing%20scenario%2C%20we%20removed%20the%20AAD%20account%20from%20Access%20work%20or%20school%20in%20Windows%2010.%26nbsp%3B%20After%20doing%20so%20and%20closing%20Edge%2C%20deleting%20the%20the%20User%20Data%20folder%20from%26nbsp%3BAppData%5CLocal%5CMicrosoft%5CEdge%20and%20relaunching%20Edge%2C%20we%20found%20that%20the%20browser%20was%20then%20trying%20to%20sign%20in%20using%20personal%20gmail%2Fhotmail%20accounts.%26nbsp%3B%20We're%20not%20certain%20where%20these%20logins%20were%20coming%20from%20possibly%20the%20Microsoft%20Store%20or%20other%20Microsoft%20resources.%26nbsp%3B%20On%20one%20system%2C%20signing%20out%20of%20all%20Microsoft%20resources%20and%20clearing%20the%20Edge%20User%20Data%20folder%20allowed%20the%20sign-in%2Fsync%20using%20the%20AD%20account%20to%20work%20successfully.%26nbsp%3B%20On%20another%20system%2C%20signing%20out%20of%20all%20resources%20and%20clearing%20Edge%20User%20Data%20folder%20did%20not%20resolve%20the%20signing%20with%20personal%20account.%26nbsp%3B%20On%20this%20system%20we%20had%20to%20completely%20delete%20the%20Windows%20user%20profile%20to%20enable%20sign-in%2Fsync%20with%20the%20on-premise%20AD%20account.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ESo%20in%20order%20to%20make%20this%20functionality%20viable%20for%20our%20enterprise%2C%20there%20needs%20to%20be%20the%20ability%20to%20force%20the%20sync%20to%20use%20on-premise%20AD%20account%20without%20the%20need%20of%20deleting%20the%20Edge%20User%20Data%20folder%20and%2For%20Windows%20user%20profile.%26nbsp%3B%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1874362%22%20slang%3D%22en-US%22%3ERe%3A%20Edge%2086.0.622.58%20On-premises%20Sync%20Not%20Working%20Over%20VPN%20With%20Cached%20Local%20Login%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1874362%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F854752%22%20target%3D%22_blank%22%3E%40jdbst56%3C%2FA%3E%26nbsp%3BThanks%20for%20following%20up%20with%20your%20testing%20results!%26nbsp%3B%20The%20Identity%20Team%20has%20confirmed%20what%20you've%20seen%20is%20to%20be%20expected.%26nbsp%3B%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20auto%20sign-in%20policy%20works%20in%20this%20way%3A%3C%2FP%3E%0A%3COL%3E%0A%3CLI%3EFirst%20tries%20with%20Windows%20OS%20sign-in%20account.%3C%2FLI%3E%0A%3CLI%3EThen%20tries%20with%20secondary%20AAD%20account.%3C%2FLI%3E%0A%3CLI%3EThen%20tries%20with%20secondary%20MSA%20account.%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3CP%3EIn%20this%20case%2C%26nbsp%3Bonce%20the%20AAD%20account%20was%20removed%2C%20step%20%E2%80%9C3%E2%80%9D%20took%20place.%26nbsp%3B%20So%20like%20you%20noticed%20it%20is%20necessary%20to%20remove%20all%20of%20the%20MSA%20and%20AAD%20accounts%20from%20settings.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWe%20appreciate%20your%20feedback!%26nbsp%3B%20It%20is%20helpful%20to%20hear%20directly%20from%20users%20as%20they%20are%20investigating%20the%20new%20policy.%26nbsp%3B%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CEM%3E-Kelly%3C%2FEM%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1878775%22%20slang%3D%22en-US%22%3ERe%3A%20Edge%2086.0.622.58%20On-premises%20Sync%20Not%20Working%20Over%20VPN%20With%20Cached%20Local%20Login%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1878775%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F757644%22%20target%3D%22_blank%22%3E%40Kelly_Y%3C%2FA%3E%26nbsp%3B%20Do%20you%20have%20any%20timeframe%20for%20this%3A%3CBR%20%2F%3E%3CSPAN%3E%22To%20provide%20a%20little%20more%20information%2C%20we%20are%20evaluating%2Finvestigating%20creating%20a%20new%20policy%20so%20users%20will%20not%20get%20implicit%20sign-in%20with%20secondary%20AAD%20account%20if%26nbsp%3BConfigureOnPremisesAccountAutoSignIn%20is%20configured.%22%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E
Occasional Contributor
We are running Edge 86.0.622.58 on Win10 Enterprise 1909 domain joined systems.

 

We are trying to configure the Edge GPO to enable local sync of favorites, but we are unable to get the on-prem sign-in to work over VPN and so the local profile.pb is never created.

 

Our settings are as follows:

 

BrowserSignin = 1

ConfigureOnPremisesAccountAutoSignIn = 1

RoamingProfileSupportEnabled = 1

SyncDisabled = 0

 

When we login to Windows 10 with a cached credential, connect to VPN, and launch Edge with these settings, we get prompted to sign-in.  The only account that seems to work is the "work or school account" which is our O365 email address.  Signing in using this account results in the Edge account type and sync account type as AAD instead of on-prem and the message "sync isn't available for this account"

 

I believe the cause of the issue is the AD account is not being used to sign in to the browser even though ConfigureOnPremisesAccountAutoSignIn is set to 1.  Doing a whoami at a command prompt shows my account name in domain\username format.

 

Using these same settings while logged into an on-site workstation results in on-premises sign in and sync working properly.  Is there any reason why this functionality would not work on a cached local logon/VPN scenario?

 

 

16 Replies

@jdbst56  Hi Joshua!  Thanks for reaching out!  The Identity Team was looking over your post and it would be helpful to get logs to better understand your specific question/scenario.  

 

Because of the sensitive information/PII that can be in the logs, there are a couple of options: 

  • File a customer support request  You should be able to work with them directly to investigate/resolve your specific issue.  
  • Submit diagnostic data through our in-browser feedback tool. It's under "..." menu > Help and feedback > Send feedback.   You need to turn on "Send diagnostic data" and this should capture all the necessary logs.

If you are planning to use the in-browser feedback tool please get into a clean state and log feedback only after the issue is reproduced.  You can get into a clean state by 1) deleting User Data folder before launch OR 2) Create a separate folder and launching edge from command line using --user-data-dir=<that folder>

 

Additionally, to help the team find your feedback quickly, you can include the string "ForumIdentityOnPremisesVPN" and comment below once you've submitted it.  

 

-Kelly

I have a similar issue. Seems that some VLANs work as expedted, others automatically want me to sign in using an Azure AD account.

@Kelly_Y Hello, I have submitted the logs through the in-browser feedback tool today per your rquest.

@jdbst56 Thank you for the feedback!  I've located your specific report and routed it to the Identity Team.  We will follow up if there is any additional information needed or updates/insights to share.  

 

-Kelly

@jdbst56 The team has investigated and can see from the feedback report submitted, on MS Edge launch, the user got signed in with the secondary AAD account on the machine.

 

ConfigureOnPremisesAccountAutoSignIn policy mentions that MS Edge will give preference to AAD accounts over on-premises account.

 

Enable the use of Active Directory accounts for automatic sign in if your users' machines are Domain Joined and your environment is not hybrid joined

 

The behavior currently being experienced is to be expected and the change to use secondary account was made in MS Edge V86.  

 

The current suggestion from the team is to consider removing the secondary AAD account from machine.

 

To provide a little more information, we are evaluating/investigating creating a new policy so users will not get implicit sign-in with secondary AAD account if ConfigureOnPremisesAccountAutoSignIn is configured.  

 

@bin_da - Please take a look at this post and see if it helps your situation as well.  

 

Thanks! 

 

-Kelly


@Kelly_Y Thanks for your response.

 

So in our testing we saw that both AAD accounts and personal accounts are taking precedence over the on-premise AD account.  We had to remove all traces of both accounts in order for the AD sync to work.

 

In our testing scenario, we removed the AAD account from Access work or school in Windows 10.  After doing so and closing Edge, deleting the the User Data folder from AppData\Local\Microsoft\Edge and relaunching Edge, we found that the browser was then trying to sign in using personal gmail/hotmail accounts.  We're not certain where these logins were coming from possibly the Microsoft Store or other Microsoft resources.  On one system, signing out of all Microsoft resources and clearing the Edge User Data folder allowed the sign-in/sync using the AD account to work successfully.  On another system, signing out of all resources and clearing Edge User Data folder did not resolve the signing with personal account.  On this system we had to completely delete the Windows user profile to enable sign-in/sync with the on-premise AD account.

 

So in order to make this functionality viable for our enterprise, there needs to be the ability to force the sync to use on-premise AD account without the need of deleting the Edge User Data folder and/or Windows user profile.  

@jdbst56 Thanks for following up with your testing results!  The Identity Team has confirmed what you've seen is to be expected.  

 

The auto sign-in policy works in this way:

  1. First tries with Windows OS sign-in account.
  2. Then tries with secondary AAD account.
  3. Then tries with secondary MSA account.

In this case, once the AAD account was removed, step “3” took place.  So like you noticed it is necessary to remove all of the MSA and AAD accounts from settings.

 

We appreciate your feedback!  It is helpful to hear directly from users as they are investigating the new policy.  

 

-Kelly

@Kelly_Y  Do you have any timeframe for this:
"To provide a little more information, we are evaluating/investigating creating a new policy so users will not get implicit sign-in with secondary AAD account if ConfigureOnPremisesAccountAutoSignIn is configured."

@benhealy Hello!  Sorry, no ETA yet.  I can follow up here once we have updates to share.  :smile:

 

Is this blocking the adoption or deployment of MS Edge in your organization?  

 

-Kelly

@Kelly_Y Yes it is stopping us deploying currently.

 

Our Windows 10 devices are hybrid joined and our Security/Architecture team are not endorsing cloud sync. As On-Premises sync doesn't work with this setup, if we roll out our users will be forced to export and import their bookmarks whenever they log into a new computer or get re-imaged. Not as user friendly as they are used to with Favourites and folder redirection.

@benhealy Thank you!  I've passed this information on to the team.  

 

-Kelly

@Kelly_Y  Hi, Do you have any update on when we can expect a new GPO setting to force on-prem account sign-in?

@jdbst56 Hi!  Still no ETA but we’ll keep you updated when we know more!  Thanks!

 

-Kelly

@Kelly_Y 

"The current suggestion from the team is to consider removing the secondary AAD account from machine."

how? :)

Our machines are not hybrid joined - we also see this behaviour (Edge not recognizing on-prem sync) even on Servers not having Office 365 installed. 

@Kelly_Y 

 

Hello, do you have any update ? :)

@So_224 Hi!  No updates from the team yet but we will follow up here with information.  Thanks!

 

-Kelly