Skip to content

TechDirectArchive

Hands-on IT, Cloud, Security & DevOps Insights

  • Home
  • About
  • Advertise With US
  • Contact
  • Reviews
  • Toggle search form
Home » AWS/Azure/OpenShift » Join Bulk Devices using a Provisioning Package to Azure
  • ddf
    How to configure Windows Deployment Services on Windows Server Windows Server
  • images 8
    Microsoft Direct Access: Now Always On VPN Windows Server
  • requestedlogon
    Error 1385: The user has not been granted the requested logon type at this time Network | Monitoring
  • 960x0
    How to resolve request timed out when pinging Windows Server
  • sdf
    Creating an offline local repository in Linux Linux
  • MBAM Client
    How to Check if MBAM Agent is installed on Windows PC Windows
  • logon
    Configure logon hours for users in Active Directory Windows Server
  • Prevent Windows from Saving RDP Connection
    Prevent Windows from Saving RDP Connection History Windows

Join Bulk Devices using a Provisioning Package to Azure

Posted on 25/12/202327/12/2023 Imoh Etuk By Imoh Etuk No Comments on Join Bulk Devices using a Provisioning Package to Azure
WCD

In this guide, you will learn how to join bulk devices using a provisioning package to Azure. I explain how to create a provisioning package and enrol all devices in Intune and Entra ID. Bulk joining of Windows devices to your Microsoft Entra tenant leverages the Windows Configuration Designer (WCD) to generate a provisioning package. Applying this package to company-owned devices facilitates their integration with your Entra ID tenant. Please see automate Infrastructure Deployments in the Cloud with Ansible and Azure Pipelines.

With the provisioning package, devices that are joined to Azure are also joined to Intune for subsequent management. This means that automatic MDM enrollment into Intune is enabled for Azure AD-joined devices. After package deployment, your Microsoft Entra users can sign in and benefit from Intune features.

Enrolling devices using provisioning packages enables the status of those devices to appear as “joined” in the Microsoft Entra ID and Microsoft Intune.

Registering devices to Intune and EntraID using the Company Portal enables device status to be reported as "Registered". See also how to Configure Windows LAPS Management with Microsoft Intune

Also, see Single App Kiosk Mode Configuration using MDM Bridge WMI Provider post. There is also a post on How to set up a Single App Kiosk Mode Configuration using a Local Account / MDM Bridge WMI Provider.

Enrolling Bulk Windows Devices Using Provisioning Package

According to Microsoft, to create a bulk enrollment token. You must have a supported Microsoft Entra role assignment such as Global Administrator, Cloud Device Administrator, Intune Administrator, or Password Administrator.

The role must not be scoped to an administrative unit in Microsoft Entra ID. To enrol bulk Windows devices. You are required to carry out the following steps:.

Install Windows Configuration Designer

Visit the Windows Store and download and install Windows Configuration Designer (WCD)

Windows-Configuration-Designer-
Downloading Windows Configuration Designer

Click on “Install” and then “Get” to download the WCD utility tool.

Create and configure the provisioning package.

Provision Desktop Devices

To configure the provisioning package, launch the WCD utility tool you just installed in step 1. Click on Provision desktop devices to create a project

2-provision-desktop-devices
Provisioning desktop devices

Enter the project, select the directory for the project as the project folder, specify the description for the project, and then click on Finish.

3-create-a-project
Creating a project for bulk Joining Devices

Set up the device

Here, you need to specify the device name. Pay close attention to the highlighted text below the name stating the supported version of Windows 10.

4-Setup-device-with-WCD
Set up device with WCD

From the above screenshot, scroll down the screen and click on “Next” to set up the network.

Set up Network

On the setup network page, turn off “Connect devices to a Wi-Fi network” by toggling the button to the left and clicking on “Next” to continue.

5-deselect-network1
5-deselect-network2

Set up account management

On the account management screen, select “Enroll in Azure AD. Next, toggle the “Refresh AAD credentials” button to “Yes.”

6-generate-a-token
Account Management

Supply Login Credentials to Microsoft Azure

After toggling the refresh AAD credentials button to yes, click on “Get Bulk Token”.

The Microsoft official sign-in page will be populated, prompting you to sign in with your Microsoft Azure credentials. 

Depending on your Microsoft Entra ID settings, the next screens will look different and will probably ask you for multi-factor authentication (MFA) alongside your credentials.

7-Enter-LOgin-Credentials
Enter Azure Login Credentials

Follow the prompt through to the “Stay signed in to all your apps” screen, and then click on “No, sign into this app only.”

8-click-on-No-Sign-in-to-this-app-only
Sign-in Management option

Generate Bulk Token

After successful authentication,the bulk token will be fetched successfully, as shown below.

9-Bulk-Token-Generated
Bulk Token Fetched

If you checked through a bulk token user account in your Intune Admin Center, similar to package_d286460b-f469-41dd-88cb-d4e4f42ecf7d@YourFQDN.

11-checked-the-package-user-account-on-Intune-Admin-Center-1
Bulk Token User Account in Microsoft Intune Admin Center

At the finishing part, don’t click on “Create” first; instead, use the button below to switch to the advanced editor.

Finishing-Package-creation
Switching to the Advanced Editor

You will be prompted, as shown below. When you click on “Switch to advanced editor,” click Yes to continue.

12-Switch-to-Advanced-Editor
Confirming switching to Advanced Editor

From the Advanced Editor, locate the DNSComputerName on the right-hand side of the screen. Clearing out the field “TechDirectArchive-PC” in the middle pane of the editor will not work; you will be required to go to the right pane and select “Remove” to remove DNSComputerName altogether, as shown in the screenshot below:

13-DNSComputerName

After removing the DNSComputerName, you should have only the Authority and BPRT left, as shown below:

14-Authority-and-BPRT
Authority-and-BPRT

Export the provisioning package

Now that the provisioning package only contains two items, that’s items and customizations, we are now ready to select “Export” from the menu bar up top, as shown in Figure 17: Export Provisioning Package.

Export-a-provisioning-package
Exporting a provisioning package

The next dialog box gives you the provisioning package metadata, which makes it easier to version the package.

As shown in the screenshot below, the default version is 1.0. We will accept the default version and continue.

15-Decribing-the-Provisioning-package
Package Description and Versioning

The next screen will take you to the Encrypt & Sign package details page. For this demonstration, we will click on Next to skip it.

16-signing-the-package
Pacakge Security Details

For the pre-build stage, as shown in the screenshot below, you are required to choose the right location to store the package.

17-select-where-to-save-the-package

Choose a Storage location for the package

Build Package

The build package stage shows the summary screen and affords you the opportunity to verify package details. This is like a last chance to reverse the process of creating the package in case you want to change something.

If you're satisfied with the information shown on the screen. Click on "Build” to start.
18-Build-the-package
Building the provisioning package

After a few seconds, the package creation will be successful. Click on Finish to close the dialog.

19-Package-created
Provisioning Package Created

Test Package

To test the package, run dsregcmd /status. This helps to confirm that your device is not Azure AD-joined. This is because you have not applied the package yet.

21-Test-the-package
Testing Provisioning Package

As shown in the screenshot above, “Device State,” the AzureAdJoined is set to No because we have not applied the package yet.

To apply the package, navigate to the location where you built and dropped the package, and double-click to run it. Confirm by pressing “Yes, add it.“

You’re simply being prompted by the fact that there is no signed certificate attached to the package.

22-Add-the-package
Applying Provisioning Package

You can also apply the provisioning package using the command line by running:

DISM.exe /Image=C:\ /Add-ProvisioningPackage/PackagePath:C:/Documents\BulkDeviceJoin.ppkg
23-AzureADJoined
Applying Provisioning Package

Finally, you have successfully joined the device to Azure AD using a provisioning package. Feel free to run and apply this package to any device you want to join Microsoft Azure and Intune.

The device will also report on the Microsoft Entra ID as “joined.“

24-DeviceJoined-Azure-AD-1
Azure AD Device Joined

I hope you found this article useful on how to join bulk devices using a provisioning package to Azure. Please feel free to leave a comment below.

Rate this post

Thank you for reading this post. Kindly share it with others.

  • Share on X (Opens in new window) X
  • Share on Reddit (Opens in new window) Reddit
  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Facebook (Opens in new window) Facebook
  • Share on Pinterest (Opens in new window) Pinterest
  • Share on Tumblr (Opens in new window) Tumblr
  • Share on Telegram (Opens in new window) Telegram
  • Share on WhatsApp (Opens in new window) WhatsApp
  • Share on Pocket (Opens in new window) Pocket
  • Share on Mastodon (Opens in new window) Mastodon
  • Share on Bluesky (Opens in new window) Bluesky
  • Share on Threads (Opens in new window) Threads
  • Share on Nextdoor (Opens in new window) Nextdoor
AWS/Azure/OpenShift, Windows Tags:Azure AD, Microsoft Azure

Post navigation

Previous Post: How to Fix Scanning and Repairing Drive on Every Boot
Next Post: Stay protected on Windows device with Windows Security

Related Posts

  • bypass windows login main img
    How to disable auto login in Windows Windows
  • jmeterimage
    Apache JMeter Load Testing: Test Mobile Apps on Windows Configuration Management Tool
  • How to Enable and use Sudo in Windows 11
    How to Enable and use Sudo in Windows 11 Windows
  • change keyboard layout windows 10 thumb800
    How to use the On-Screen Keyboard Windows
  • WinRM set up for specific IP
    Configure WinRM to accept connection from a specific IP Address Windows
  • OpenSSL on Windows
    How to Install OpenSSL on Windows Computers Windows

More Related Articles

bypass windows login main img How to disable auto login in Windows Windows
jmeterimage Apache JMeter Load Testing: Test Mobile Apps on Windows Configuration Management Tool
How to Enable and use Sudo in Windows 11 How to Enable and use Sudo in Windows 11 Windows
change keyboard layout windows 10 thumb800 How to use the On-Screen Keyboard Windows
WinRM set up for specific IP Configure WinRM to accept connection from a specific IP Address Windows
OpenSSL on Windows How to Install OpenSSL on Windows Computers Windows

Leave a Reply Cancel reply

You must be logged in to post a comment.

Microsoft MVP

VEEAMLEGEND

vexpert-badge-stars-5

Virtual Background

GoogleNews

Categories

veeaam100

sysadmin top30a

  • ddf
    How to configure Windows Deployment Services on Windows Server Windows Server
  • images 8
    Microsoft Direct Access: Now Always On VPN Windows Server
  • requestedlogon
    Error 1385: The user has not been granted the requested logon type at this time Network | Monitoring
  • 960x0
    How to resolve request timed out when pinging Windows Server
  • sdf
    Creating an offline local repository in Linux Linux
  • MBAM Client
    How to Check if MBAM Agent is installed on Windows PC Windows
  • logon
    Configure logon hours for users in Active Directory Windows Server
  • Prevent Windows from Saving RDP Connection
    Prevent Windows from Saving RDP Connection History Windows

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,836 other subscribers
  • RSS - Posts
  • RSS - Comments
  • About
  • Authors
  • Write for us
  • Advertise with us
  • General Terms and Conditions
  • Privacy policy
  • Feedly
  • Telegram
  • Youtube
  • Facebook
  • Instagram
  • LinkedIn
  • Tumblr
  • Pinterest
  • Twitter
  • mastodon

Tags

Active Directory AWS Azure Bitlocker Microsoft Windows PowerShell WDS Windows 10 Windows 11 Windows Server 2016

Copyright © 2025 TechDirectArchive

 

Loading Comments...
 

You must be logged in to post a comment.