RealmJoin is designed as a companion to Microsoft Intune to increase the usability in a 100% cloud environment with Microsoft Azure AD. The following pre-requirements are necessary:
- Microsoft Azure with Azure AD
- Windows 10
- Microsoft Intune
RealmJoin runs on every Windows 10 device. A Windows 10 certified device with TPM chip is recommended to ensure Bitlocker initialization.
Initial deployment needs direct internet access. No proxy would be ideal, a transparent proxy should be ok (if really transparent). If there is a proxy unavoidable as a minimum requirement the following services/addresses need to be directly accessible (not recommended, list might not be exhaustive):
For a list of the corresponding IP ranges please see
This file contains the compute IP address ranges (including SQL ranges) used by the Microsoft Azure Datacenters. A new xml file will be uploaded every Wednesday (Pacific Time) with the new planned IP address ranges. New IP address ranges will be effective on the following Monday (Pacific Time). Please download the new xml file and perform the necessary changes on your site before Monday.
This article links a file that contains the compute IP address ranges that you should include in your outbound allow lists to ensure your computers can successfully use Office 365.
WARNING: IP addresses filtering alone is not a complete solution due to dependencies on internet based services such as Domain Name Services, Content Delivery Networks (CDNs), Certificate Revocation Lists, and other third party or dynamic services. These dependencies include dependencies on other Microsoft services such as the Azure Content Delivery Network and will result in network traces or firewall logs indicating connections to IP addresses owned by third parties or Microsoft but not listed on this page. These unlisted IP addresses, whether from third party or Microsoft owned CDN and DNS services are dynamically assigned and can change at any time.
For BranchCache to be effective the clients need to be able to communicate directly with each other. So they shouldn’t be separated by different VLans, WLAN-Isolation or Port-Isolation. For mass rollouts “BranchCache Servers” with pre-populated caches are recommended. BranchCache is limited to a single subnet, if a site has multiple subnets the “BranchCache Servers” must be placed in the same subnet as the clients to be effective.
RealmJoin connection endpoints¶
RealmJoin connects to the following URLs, that might be considered in your firewall settings:
The frontend component of RealmJoin is the RealmJoin client, which is installed on the Windows 10 device. With the installed RealmJoin client the individual user is able to access and install provided software in self service. Packages assigned as required by the administrator are installed automatically on the first Logon after assignment.Realmjoin is responsible for two different processes running on the device:
- The realmjoin.exe process is started up automatically on Logon. The process is always running and sends upstream data (compare to chapter Managing RealmJoin / States) every 15 minutes.
- The realjoinservice.exe is called when a package requires the SYSTEM mode to be processed. It is not running by default.
There are three different version of the RealmJoin client available:
- Stable - Stable release
- Beta - Near to stable, for long time testing
- Canaray - Experimental, first testing
The RealmJoin backend is an Azure web application using an Azure SQL data base and the available Azure services. The backend is hosted on an Azure tenant exclusively used for RealmJoin. All customer realms within this tenant are isolated from each other.
RealmJoin App Publishing Endpoint¶
To provide the BranchCache mechanism (see section BranchCache above), the endpoint has to provide the chunk identifiers, a feature only provided by Microsoft Internet Information Services (IIS) servers. To deliver the maximum scalability he Publishing Endpoint is distributed on multiple Azure nodes hosting Windows 2016 IIS sharing an redundant Azure blob storage.
The RealmJoin client authenticates itself against the Azure AD via a secured HTTPS connection, receiving a identification token. With the token the client now is able to proof its identity to the Microsoft Graph API and the RealmJoin backend. After identifying the client, the backends response to the client is RSA signed. Using the servers public key, the RealmJoin client and service are able to verify the identity of the backend server response.
The RealmJoin.MSI is SHA2 (256 bit) signed by GK and therefore recognizied by Windows as safe to install.