Windows Hello For Business
Windows Hello For Business
Windows Hello For Business
Applies to
Windows 10
In Windows 10, Windows Hello for Business replaces passwords with strong two-factor authentication on PCs
and mobile devices. This authentication consists of a new type of user credential that is tied to a device and uses
a biometric or PIN.
NOTE
When Windows 10 first shipped, it included Microsoft Passport and Windows Hello, which worked together to provide
multi-factor authentication. To simplify deployment and improve supportability, Microsoft has combined these
technologies into a single solution under the Windows Hello name. Customers who have already deployed these
technologies will not experience any change in functionality. Customers who have yet to evaluate Windows Hello will find
it easier to deploy due to simplified policies, documentation, and semantics.
Biometric sign-in
Windows Hello provides reliable, fully integrated biometric authentication based on facial recognition or
fingerprint matching. Windows Hello uses a combination of special infrared (IR) cameras and software to
increase accuracy and guard against spoofing. Major hardware vendors are shipping devices that have
integrated Windows Hello-compatible cameras. Fingerprint reader hardware can be used or added to devices
that don't currently have it. On devices that support Windows Hello, an easy biometric gesture unlocks users'
credentials.
Facial recognition . This type of biometric recognition uses special cameras that see in IR light, which allows
them to reliably tell the difference between a photograph or scan and a living person. Several vendors are
shipping external cameras that incorporate this technology, and major laptop manufacturers are
incorporating it into their devices, as well.
Fingerprint recognition . This type of biometric recognition uses a capacitive fingerprint sensor to scan
your fingerprint. Fingerprint readers have been available for Windows computers for years, but the current
generation of sensors is significantly more reliable and less error-prone. Most existing fingerprint readers
(whether external or integrated into laptops or USB keyboards) work with Windows 10.
Windows stores biometric data that is used to implement Windows Hello securely on the local device only. The
biometric data doesn't roam and is never sent to external devices or servers. Because Windows Hello only stores
biometric identification data on the device, there's no single collection point an attacker can compromise to steal
biometric data. For more information about biometric authentication with Windows Hello for Business, see
Windows Hello biometrics in the enterprise.
NOTE
Windows Hello as a convenience sign-in uses regular user name and password authentication, without the user entering
the password.
Imagine that someone is looking over your shoulder as you get money from an ATM and sees the PIN that you
enter. Having that PIN won't help them access your account because they don't have your ATM card. In the same
way, learning your PIN for your device doesn't allow that attacker to access your account because the PIN is local
to your specific device and doesn't enable any type of authentication from any other device.
Windows Hello helps protect user identities and user credentials. Because the user doesn't enter a password
(except during provisioning), it helps circumvent phishing and brute force attacks. It also helps prevent server
breaches because Windows Hello credentials are an asymmetric key pair, which helps prevent replay attacks
when these keys are protected by TPMs.
Learn more
Implementing strong user authentication with Windows Hello for Business
Implementing Windows Hello for Business at Microsoft
Introduction to Windows Hello, video presentation on Microsoft Virtual Academy
Windows Hello face authentication
Windows 10: Disrupting the Revolution of Cyber-Threats with Revolutionary Security!
Windows 10: The End Game for Passwords and Credential Theft?
Related topics
How Windows Hello for Business works
Manage Windows Hello for Business in your organization
Why a PIN is better than a password
Prepare people to use Windows Hello
Windows Hello and password changes
Windows Hello errors during PIN creation
Event ID 300 - Windows Hello successfully created
Windows Hello biometrics in the enterprise
Passwordless Strategy
3/5/2021 • 27 minutes to read • Edit Online
Methodology
Four steps to password freedom provides an overall view of how Microsoft envisions the road to eliminating
passwords. But this road is frequently traveled and derailed by many. The scope of work is vast and filled with
many challenges and frustrations. Nearly everyone wants the instant gratification of achieving a passwordless
environment, but can easily become overwhelmed by any of the steps. You are not alone and Microsoft
understands. While there are many ways to accomplish freedom from passwords, here is one recommendation
based on several years of research, investigation, and customer conversations.
Prepare for the Journey
The road to being passwordless is a journey. The duration of that journey varies for each organization. It is
important for IT decision-makers to understand the criteria influencing the length of that journey.
The most intuitive answer is the size of the organization, and that would be correct. However, what exactly
determines size? One way to break down the size of the organization is by creating a summary of the:
Number of departments
Organization or department hierarchy
Number and type of applications and services
Number of work personas
Organization's IT structure
Number of departments
The number of departments within an organization varies. Most organizations have a common set of
departments such as executive leadership, human resources, accounting, sales, and marketing. Other
organizations will have those departments and additional ones such research and development or support.
Small organizations may not segment their departments this explicitly, while larger ones may. Additionally, there
may be sub-departments, and sub-departments of those sub-departments as well.
You need to know all the departments within your organization and you need to know which departments use
computers and which ones do not. It is fine if a department does not use computers (probably rare, but
acceptable). This is one less department with which you need to concern yourself. Nevertheless, ensure this
department is in your list and you have assessed that it is not applicable.
Your count of the departments must be thorough and accurate, as well as knowing the stakeholders for those
departments that will put you and your staff on the road to password freedom. Realistically, many of us lose
sight of our organizational chart and how it grows or shrinks over time. This is why you need to inventory all of
them. Also, do not forget to include external departments such as vendors or federated partners. If your
organization goes password-free, but your partners continue to use passwords and then access your corporate
resources, you should know about it and include them in your passwordless strategy.
Organization or department hierarchy
Organization and department hierarchy is the management layers within the departments or the organization
as a whole. How the device is used, what applications and how they are used, most likely differs between each
department, but also within the structure of the department. To determine the correct passwordless strategy,
you need to know these differences across your organization. An executive leader is likely to use their device
differently compared to a member of middle management in the sales department. Both of those user cases are
probably different to how an individual contributor in the customer service department uses their device.
Number and type of applications and services
The number of applications within an organization is simply astonishing and rarely is there one centralized list
that is accurate. Applications and services are the most critical items in your passwordless assessment.
Applications and services take considerable effort to move to a different type of authentication. That is not to
say changing policies and procedures is not a daunting task, but there is something to be said of updating a
company's set of standard operating procedures and security policies compared to changing 100 lines (or more)
of authentication code in the critical path of your internally developed CRM application.
Capturing the number of applications used is easier once you have the departments, their hierarchy, and their
stakeholders. In this approach, you should have an organized list of departments and the hierarchy in each. You
can now associate the applications that are used by all levels within each department. You'll also want to
document whether the application is internally developed or commercially available off-the-shelf (COTS). If the
latter, document the manufacturer and the version. Also, do not forget web-based applications or services when
inventorying applications.
Number of work personas
Work personas is where the three previous efforts converge. You know the departments, the organizational
levels within each department, the numbers of applications used by each, respectively, and the type of
application. From this you want to create a work persona.
A work persona classifies a category of user, title or role (individual contributor, manager, middle manager, etc.),
within a specific department to a collection of applications used. There is a high probability that you will have
many work personas. These work personas will become units of work, and you will refer to them in
documentation and in meetings. You need to give them a name.
Give your personas easy and intuitive names like Abby Accounting, Mark Marketing, or Sue Sales. If the
organization levels are common across departments, then decide on a first name that represents the common
levels in a department. For example, Abby could be the first name of an individual contributor in any given
department, while the first name Sue could represent someone from middle management in any given
department. Additionally, you can use suffixes such as (I, II, Senior, etc.) to further define departmental structure
for a given persona.
Ultimately, create a naming convention that does not require your stakeholders and partners to read through a
long list of tables or a secret decoder ring. Also, if possible, try to keep the references as names of people. After
all, you are talking about a person who is in that department and who uses that specific software.
Organization's IT structure
IT department structures can vary more than the organization. Some IT departments are centralized while
others are decentralized. Also, the road to password freedom will probably have you interacting with the client
authentication team, the deployment team, the security team, the PKI team, the Active Directory team, the cloud
team, and the list continues. Most of these teams will be your partner on your journey to password freedom.
Ensure there is a passwordless stakeholder on each of these teams, and that the effort is understood and
funded.
Assess your Organization
You have a ton of information. You have created your work personas, you have identified your stakeholders
throughout the different IT groups. Now what?
By now you can see why it is a journey and not a weekend project. You need to investigate user-visible password
surfaces for each of your work personas. Once you have identified the password surfaces, you need to mitigate
them. Resolving some password surfaces are simple - meaning a solution already exists in the environment and
it is only a matter of moving users to it. Resolution to some passwords surfaces may exist, but are not deployed
in your environment. That resolution results in a project which must be planned, tested, and then deployed. That
is likely to span multiple IT departments with multiple people, and potentially one or more distributed systems.
Those types of projects take time and need dedicated cycles. This same sentiment is true with in-house software
development. Even with agile development methodologies, changing the way someone authenticates to an
application is critical. Without the proper planning and testing, it has the potential to severely impact
productivity.
How long does it take to become passwordless? The answer is "it depends". It depends on the organizational
alignment of a passwordless strategy. Top-down agreement that a passwordless environment is the
organization's goal makes conversations much easier. Easier conversations means less time spent convincing
people and more time spent moving forward toward the goal. Top-down agreement, as a priority within the
ranks of other on-going IT projects, helps everyone understand how to prioritize existing projects. Agreeing on
priorities should reduce and minimize manager and executive level escalations. After these organizational
discussions, modern project management techniques are used to continue the passwordless effort. The
organization allocates resources based on the priority (after they have agreed on the strategy). Those resources
will:
work through the work personas
organize and deploy user acceptance testing
evaluate user acceptance testing results for user-visible password surfaces
work with stakeholders to create solutions that mitigate user-visible password surfaces
add the solution to the project backlog and prioritize against other projects
deploy the solution
perform user acceptance testing to confirm that the solution mitigates the user-visible password surface
repeat the testing as needed
Your organization's journey to password freedom may take some time. Counting the number of work personas
and the number of applications is probably a good indicator of the investment. Hopefully, your organization is
growing, which means that the list of personas and the list of applications is unlikely to shrink. If the work to go
passwordless today is n, then it is likely that to go passwordless tomorrow is n x 2 or perhaps more, n x n. Do
not let the size or duration of the project be a distraction. As you progress through each work persona, the
actions and tasks will become more familiar for you and your stakeholders. Scope the project to sizable, realistic
phases, pick the correct work personas, and soon you will see parts of your organization transition to a
passwordless state.
Where to start?
What is the best guidance for kicking off the journey to password freedom? You will want to show your
management a proof of concept as soon as possible. Ideally, you want to show this at each step of your
passwordless journey. Keeping your passwordless strategy top of mind and showing consistent progress keeps
everyone focused.
Work persona
You begin with your work personas. These were part of your preparation process. They have a persona name,
such as Abby Accounting II, or any other naming convention your organization defined. That work persona
includes a list of all the applications Abby uses to perform her assigned duties in the accounting department. To
start, you need to pick a work persona. This is the targeted work persona you will enable to climb the steps to
password freedom.
IMPORTANT
Avoid using any work personas from your IT department. This is probably the worst way to start the passwordless
journey. IT roles are very difficult and time consuming. IT workers typically have multiple credentials, run a multitude of
scripts and custom applications, and are the worst offenders of password usage. It is better to save these work personas
for the middle or end of your journey.
Review your collection of work personas. Early in your passwordless journey, identify personas with the fewest
applications. These work personas could represent an entire department or two. These are the perfect work
personas for your proof-of-concept or pilot.
Most organizations host their proof of concept in a test lab or environment. To do that with a password-free
strategy may be more challenging and take more time. To test in a lab, you must first duplicate the environment
of the targeted persona. This could take a few days or several weeks, depending on the complexity of the
targeted work persona.
You will want to balance lab testing with providing results to management quickly. Continuing to show forward
progress on your journey to password freedom is always a good thing. If there are ways you can test in
production with low or no risk, it may be advantageous to your timeline.
The Process
The journey to password freedom is to take each work persona through each step of the process. In the
beginning, we encourage working with one persona at a time to ensure team members and stakeholders are
familiar with the process. Once comfortable with the process, you can cover as many work personas in parallel
as resources allow. The process looks something like this:
1. Passwordless replacement offering (Step 1)
a. Identify test users representing the targeted work persona.
b. Deploy Windows Hello for Business to test users.
c. Validate that passwords and Windows Hello for Business work.
2. Reduce User-visible Password Surface (Step 2)
a. Survey test user workflow for password usage.
b. Identify password usage and plan, develop, and deploy password mitigations.
c. Repeat until all user password usage is mitigated.
d. Remove password capabilities from Windows.
e. Validate that none of the workflows need passwords.
3. Transition into a passwordless scenario (Step 3)
a. Awareness campaign and user education.
b. Include remaining users who fit the work persona.
c. Validate that none of the users of the work personas need passwords.
d. Configure user accounts to disallow password authentication.
After successfully moving a work persona to password freedom, you can prioritize the remaining work personas
and repeat the process.
Passwordless replacement offering (Step 1)
The first step to password freedom is providing an alternative to passwords. Windows 10 provides an affordable
and easy in-box alternative to passwords, Windows Hello for Business, a strong, two-factor authentication to
Azure Active Directory and Active Directory.
Identify test users that represent the targeted work persona
A successful transition relies on user acceptance testing. It is impossible for you to know how every work
persona goes about their day-to-day activities, or how to accurately validate them. You need to enlist the help of
users who fit the targeted work persona. You only need a few users from the targeted work persona. As you
cycle through step 2, you may want to change a few of the users (or add a few) as part of your validation
process.
Deploy Windows Hello for Business to test users
Next, you will want to plan your Windows Hello for Business deployment. Your test users will need an alternative
way to sign-in during step 2 of the journey to becoming passwordless. Use the Windows Hello for Business
Planning Guide to help learning which deployment is best suited for your environment. Next, use the Windows
Hello for Business deployment guides to deploy Windows Hello for Business.
With the Windows Hello for Business infrastructure in place, you can limit Windows Hello for Business
enrollments to the targeted work personas. The great news is that you will only need to deploy the
infrastructure once. When other targeted work personas need to provision Windows Hello for Business, you can
simply add them to a group. You will use the first work persona to validate your Windows Hello for Business
deployment.
NOTE
There are many different ways to connect a device to Azure. Deployments may vary based on how the device is joined to
Azure Active Directory. Review your planning guide and deployment guide to ensure additional infrastructure is not
needed for an additional Azure joined devices.
You can use Group Policy to deploy an interactive logon security policy setting to the computer. This policy
setting is found under Computer Configuration > Policies > Windows Settings > Local Policy >
Security Options . The name of the policy setting depends on the version of the operating systems you use to
configure Group Policy.
Windows Ser ver 2016 and earlier The policy name for these operating systems is Interactive logon:
Require smar t card .
Windows 10, version 1703 or later using Remote Ser ver Administrator Tools The policy name for
these operating systems is Interactive logon: Require Windows Hello for Business or smar t card .
When you enable this security policy setting, Windows prevents users from signing in or unlocking with a
password. The password credential provider remains visible to the user. If a user tries to use a password,
Windows informs the user they must use Windows Hello for Business or a smart card.
Excluding the password credential provider
You can use Group Policy to deploy an administrative template policy setting to the computer. This policy setting
is found under Computer Configuration > Policies > Administrative Templates > System > Logon
The name of the policy setting is Exclude credential providers . The value to enter in the policy to hide the
password credential provider is 60b78e88-ead8-445c-9cfd-0b87f74ea6cd .
Excluding the password credential provider hides the password credential provider from Windows and any
application that attempts to load it. This prevents the user from entering a password using the credential
provider. However, this does not prevent applications from creating their own password collection dialogs and
prompting the user for a password using custom dialogs.
Validate that none of the workflows needs passwords
This is the big moment. You have identified password usage, developed solutions to mitigate password usage,
and have removed or disabled password usage from Windows. In this configuration, your users will not be able
to use a password. Users will be blocked if any of their workflows ask them for a password. Ideally, your test
users should be able to complete all the work flows of the targeted work persona without any password usage.
Do not forget those low percentage work flows, such as provisioning a new user or a user that forgot their PIN
or cannot use their strong credential. Ensure those scenarios are validated as well.
Transition into a passwordless deployment (Step 3)
Congratulations! You are ready to transition one or more portions of your organization to a passwordless
deployment. You have validated that the targeted work persona is ready to go where the user no longer needs
to know or use their password. You are just a few steps away from declaring success.
Awareness and user education
In this last step, you are going to include the remaining users that fit the targeted work persona to the wonderful
world of password freedom. Before you do this, you want to invest in an awareness campaign.
An awareness campaign introduces the users to the new way of authenticating to their device, such as using
Windows Hello for Business. The idea of the campaign is to positively promote the change to the users in
advance. Explain the value and why your company is changing. The campaign should provide dates and
encourage questions and feedback. This campaign can coincide with user education, where you can show the
users the changes and, if your environment allows, enable the users to try out the experience.
Including remaining users that fit the work persona
You have implemented the awareness campaign for the targeted users. These users are informed and ready to
transition to being passwordless. Add the remaining users that match the targeted work persona to your
deployment.
Validate that none of the users of the work personas needs passwords
You have successfully transitioned all users for the targeted work persona to being passwordless. Monitor the
users within the work persona to ensure they do not encounter any issues while working in a passwordless
environment.
Track all reported issues. Set priority and severity to each reported issue and have your team triage the issues
appropriately. As you triage issues, some things to consider are:
Is the reporting user performing a task outside the work persona?
Is the reported issue affecting the entire work persona, or only specific users?
Is the outage a result of a misconfiguration?
Is the outage a overlooked gap from step 2?
Each organization's priority and severity will differ. However, most organizations consider work stoppages to be
fairly significant. Your team should predefine levels of priority and severity. With each of these levels, create
service level agreements (SLAs) for each combination of severity and priority, and hold everyone accountable to
those agreements. Reactive planning enables people to spend more time on the issue and resolving it, and less
time on the process.
Resolve the issues per your service level agreements. Higher severity items may require returning some or all of
the user's password surface. Clearly this is not the end goal, but do not let this slow down your momentum
towards becoming passwordless. Refer to how you reduced the user's password surface in step 2 and progress
forward to a solution, deploying that solution and validating it.
Configure user accounts to disallow password authentication.
You transitioned all the users for the targeted work persona to a passwordless environment and you have
successfully validated all their workflows. The last step to complete the passwordless transition is to remove the
user's knowledge of the password and prevent the authenticating authority from accepting passwords.
You can change the user's password to random data and prevent domain controllers from allowing users to use
passwords for interactive sign-ins using an account configuration on the user object.
The account options on a user account includes an option -- Smar t card is required for interactive logon ,
also known as (SCRIL).
NOTE
Do not confuse the Interactive Logon security policy for SCRIL. Security policies are enforced on the client (locally). A user
account configured for SCRIL is enforced at the domain controller.
SCRIL setting for a user on Active Director y Users and Computers.
When you configure a user account for SCRIL, Active Directory changes the affected user's password to a
random 128 bits of data. Additionally, domain controllers hosting the user account do not allow the user to sign-
in interactively with a password. Also, users will no longer be troubled with needing to change their password
when it expires, because passwords for SCRIL users in domains with a Windows Server 2012 R2 or early
domain functional level do not expire. The users are effectively passwordless because:
the do not know their password.
their password is 128 random bits of data and is likely to include non-typable characters.
the user is not asked to change their password
domain controllers do not allow passwords for interactive authentication
SCRIL setting for a user in Active Director y Administrative Center on Windows Ser ver 2012.
NOTE
Although a SCRIL user's password never expires in early domains, you can toggle the SCRIL configuration on a user
account (clear the check box, save the settings, select the check box and save the settings) to generate a new random 128
bit password. However, you should consider upgrading the domain to Windows Server 2016 domain forest functional
level and allow the domain controller to do this for you automatically.
SCRIL setting for a user in Active Director y Administrative Center on Windows Ser ver 2016.
NOTE
Windows Hello for Business was formerly known as Microsoft Passport.
A u t o m a t i c p a ssw o r d c h a n g e fo r SC R I L c o n fi g u r e d u se r s
Domains configured for Windows Server 2016 domain functional level can further secure the unknown
password for SCRIL-enabled users by configuring the domain to automatically change the password for SCRIL
users.
In this configuration, passwords for SCRIL-configured users expire based on Active Directory password policy
settings. When the SCRIL user authenticates from a domain controller, the domain controller recognizes the
password has expired, and automatically generates a new random 128 bit password for the user as part of the
authentication. What is great about this feature is your users do not experience any change password
notifications or any authentication outages.
NOTE
Some components within Windows 10, such as Data Protection APIs and NTLM authentication, still need artifacts of a
user possessing a password. This configuration provides interoperability by reducing the usage surface while Microsoft
continues to close the gaps to remove the password completely.
Applies to
Windows 10
Windows Hello in Windows 10 enables users to sign in to their device using a PIN. How is a PIN different from
(and better than) a password? On the surface, a PIN looks much like a password. A PIN can be a set of numbers,
but enterprise policy might allow complex PINs that include special characters and letters, both upper-case and
lower-case. Something like t758A! could be an account password or a complex Hello PIN. It isn't the structure of
a PIN (length, complexity) that makes it better than a password, it's how it works.
Watch Dana Huang explain why a Windows Hello for Business PIN is more secure than a password.
NOTE
For details on how Hello uses asymetric key pairs for authentication, see Windows Hello for Business.
Related topics
Windows Hello for Business
How Windows Hello for Business works
Manage Windows Hello for Business in your organization
Prepare people to use Windows Hello
Windows Hello and password changes
Windows Hello errors during PIN creation
Event ID 300 - Windows Hello successfully created
Windows Hello biometrics in the enterprise
Windows Hello biometrics in the enterprise
3/5/2021 • 5 minutes to read • Edit Online
Applies to:
Windows 10
Windows Hello is the biometric authentication feature that helps strengthen authentication and helps to guard
against potential spoofing through fingerprint matching and facial recognition.
NOTE
When Windows 10 first shipped, it included Microsoft Passport and Windows Hello, which worked together to provide
multi-factor authentication. To simplify deployment and improve supportability, Microsoft has combined these
technologies into a single solution under the Windows Hello name. Customers who have already deployed these
technologies will not experience any change in functionality. Customers who have yet to evaluate Windows Hello will find
it easier to deploy due to simplified policies, documentation, and semantics.
Because we realize your employees are going to want to use this new technology in your enterprise, we've been
actively working with the device manufacturers to create strict design and performance recommendations that
help to ensure that you can more confidently introduce Windows Hello biometrics into your organization.
NOTE
Each sensor on a device will have its own biometric database file where template data is stored. Each database has a
unique, randomly generated key that is encrypted to the system. The template data for the sensor will be encrypted with
this per-database key using AES with CBC chaining mode. The hash is SHA256. Some fingerprint sensors have the
capability to complete matching on the fingerprint sensor module instead of in the OS. These sensors will store biometric
data on the fingerprint module instead of in the database file.
NOTE
Windows Hello face authentication does not currently support wearing a mask during enrollment or authentication.
Wearing a mask to enroll is a security concern because other users wearing a similar mask may be able to unlock you
device. The product group is aware of this behavior and is investigating this topic further. Please remove a mask if you are
wearing one when you enroll or unlock with Windows Hello face authentication. If your working environment doesn’t
allow you to remove a mask temporarily, please consider unenrolling from face authentication and only using PIN or
fingerprint.
Related topics
Windows Hello for Business
How Windows Hello for Business works
Manage Windows Hello for Business in your organization
Why a PIN is better than a password
Prepare people to use Windows Hello
Windows Hello and password changes
Windows Hello errors during PIN creation
Event ID 300 - Windows Hello successfully created
How Windows Hello for Business works
3/5/2021 • 2 minutes to read • Edit Online
Applies to
Windows 10
Windows Hello for Business is a modern, two-factor credential that is the more secure alternative to passwords.
Whether you are cloud or on-premises, Windows Hello for Business has a deployment option for you. For cloud
deployments, you can use Windows Hello for Business with Azure Active Directory joined, Hybrid Azure Active
Directory joined, or Azure Active Directory registered devices. Windows Hello for Business also works for
domain joined devices.
Watch this quick video where Pieter Wigleven gives a simple explanation of how Windows Hello for Business
works and some of its supporting features.
Related topics
Technology and Terminology
Windows Hello for Business
Manage Windows Hello for Business in your organization
Why a PIN is better than a password
Prepare people to use Windows Hello
Windows Hello and password changes
Windows Hello errors during PIN creation
Event ID 300 - Windows Hello successfully created
Windows Hello biometrics in the enterprise
Windows Hello for Business and Device Registration
5/13/2020 • 9 minutes to read • Edit Online
Applies to:
Windows 10
Device Registration is a prerequisite to Windows Hello for Business provisioning. Device registration occurs
regardless of a cloud, hybrid, or on-premises deployments. For cloud and hybrid deployments, devices register
with Azure Active Directory. For on-premises deployments, devices registered with the enterprise device
registration service hosted by Active Directory Federation Services (AD FS).
Azure AD joined in Managed environments
Azure AD joined in Federated environments
Hybrid Azure AD joined in Managed environments
Hybrid Azure AD joined in Federated environments
P H A SE DESC RIP T IO N
P H A SE DESC RIP T IO N
C After the user provides their user name (in UPN format), the
application sends a GET request to Azure to discover
corresponding realm information for the user. This
determines if the environment is managed or federated.
Azure returns the information in a JSON object. The
application determines the environment is managed (non-
federated).
The last step in this phase has the application create an
authentication buffer and if in OOBE, temporarily caches it
for automatic sign-in at the end of OOBE. The application
POSTs the credentials to Azure Active Directory where they
are validated. Azure Active Directory returns an ID token
with claims.
Return to top
P H A SE DESC RIP T IO N
C After the user provides their user name (in UPN format), the
application sends a GET request to Azure to discover
corresponding realm information for the user. This
determines if the environment is managed or federated.
Azure returns the information in a JSON object. The
application determines the environment is federated.
The application redirects to the AuthURL value (on-premises
STS sign-in page) in the returned JSON realm object. The
application collects credentials through the STS web page.
Return to top
E The Automatic Device Join task triggers with each user sign-
in or every hour, and tries to authenticate the computer to
Azure Active Directory using the corresponding private key
of the public key in the userCertificate attribute. Azure Active
Directory authenticates the computer and issues a ID token
to the computer.
F The task creates TPM bound (preferred) RSA 2048 bit key-
pair known as the device key (dkpub/dkpriv). The application
create a certificate request using dkpub and the public key
and signs the certificate request with using dkpriv. Next, the
application derives second key pair from the TPM's storage
root key. This is the transport key (tkpub/tkpriv).
Return to top
Return to top
Windows Hello for Business Provisioning
11/2/2020 • 13 minutes to read • Edit Online
NOTE
The flows in this section are not exhaustive for every possible scenario. For example, Federated Key Trust is also a
supported configuration.
Return to top
P H A SE DESC RIP T IO N
P H A SE DESC RIP T IO N
Return to top
IMPORTANT
The newly provisioned user will not be able to sign in using Windows Hello for Business until Azure AD Connect
successfully synchronizes the public key to the on-premises Active Directory.
Return to top
Return to top
P H A SE DESC RIP T IO N
P H A SE DESC RIP T IO N
Return to top
Return to top
Windows Hello for Business and Authentication
7/22/2020 • 10 minutes to read • Edit Online
Applies to:
Windows 10
Windows Hello for Business authentication is passwordless, two-factor authentication. Authenticating with
Windows Hello for Business provides a convenient sign-in experience that authenticates the user to both Azure
Active Directory and Active Directory resources.
Azure Active Directory joined devices authenticate to Azure during sign-in and can optional authenticate to
Active Directory. Hybrid Azure Active Directory joined devices authenticate to Active Directory during sign-in,
and authenticate to Azure Active Directory in the background.
Azure AD join authentication to Azure Active Directory
Azure AD join authentication to Active Directory using a Key
Azure AD join authentication to Active Directory using a Certificate
Hybrid Azure AD join authentication using a Key
Hybrid Azure AD join authentication using a Certificate
P H A SE DESC RIP T IO N
P H A SE DESC RIP T IO N
P H A SE DESC RIP T IO N
P H A SE DESC RIP T IO N
P H A SE DESC RIP T IO N
Applies to
Windows 10, version 1703 or later
Windows Hello for Business is the springboard to a world without passwords. It replaces username and
password sign-in to Windows with strong user authentication based on an asymmetric key pair.
This deployment overview is to guide you through deploying Windows Hello for Business. Your first step should
be to use the Passwordless Wizard in the Microsoft 365 admin center or the Planning a Windows Hello for
Business Deployment guide to determine the right deployment model for your organization.
Once you've chosen a deployment model, the deployment guide for the that model will provide you with the
information needed to successfully deploy Windows Hello for Business in your environment.
NOTE
Read the Windows Hello for Business Deployment Prerequisite Overview for a summary of the prerequisites for each
different Windows Hello for Business deployment model.
Assumptions
This guide assumes that baseline infrastructure exists which meets the requirements for your deployment. For
either hybrid or on-premises deployments, it is expected that you have:
A well-connected, working network
Internet access
Multi-factor Authentication Server to support MFA during Windows Hello for Business provisioning
Proper name resolution, both internal and external names
Active Directory and an adequate number of domain controllers per site to support authentication
Active Directory Certificate Services 2012 or later
One or more workstation computers running Windows 10, version 1703
If you are installing a server role for the first time, ensure the appropriate server operating system is installed,
updated with the latest patches, and joined to the domain. This document provides guidance to install and
configure the specific roles on that server.
Do not begin your deployment until the hosting servers and infrastructure (not roles) identified in your
prerequisite worksheet are configured and properly working.
NOTE
RDP does not support authentication with Windows Hello for Business key trust deployments as a supplied credential.
RDP is only supported with certificate trust deployments as a supplied credential at this time. Windows Hello for Business
key trust can be used with Windows Defender Remote Credential Guard.
Following are the various deployment guides and models included in this topic:
Hybrid Azure AD Joined Key Trust Deployment
Hybrid Azure AD Joined Certificate Trust Deployment
Azure AD Join Single Sign-on Deployment Guides
On Premises Key Trust Deployment
On Premises Certificate Trust Deployment
NOTE
For Windows Hello for Business hybrid certificate trust prerequisites and key trust prerequisites deployments, you will
need Azure Active Directory Connect to synchronize user accounts in the on-premises Active Directory with Azure Active
Directory. For on-premises deployments, both key and certificate trust, use the Azure MFA server where the credentials
are not synchronized to Azure Active Directory. Learn how to deploy Multifactor Authentication Services (MFA) for key
trust and for certificate trust deployments.
Provisioning
Windows Hello for Business provisioning begins immediately after the user has signed in, after the user profile
is loaded, but before the user receives their desktop. Windows only launches the provisioning experience if all
the prerequisite checks pass. You can determine the status of the prerequisite checks by viewing the User
Device Registration in the Event Viewer under Applications and Ser vices Logs\Microsoft\Windows .
NOTE
You need to allow access to the URL account.microsoft.com to initiate Windows Hello for Business provisioning. This URL
launches the subsequent steps in the provisioning process and is required to successfully complete Windows Hello for
Business provisioning. This URL does not require any authentication and as such, does not collect any user data.
Planning a Windows Hello for Business Deployment
3/5/2021 • 22 minutes to read • Edit Online
Applies to
Windows 10
Congratulations! You are taking the first step forward in helping move your organizations away from password
to a two-factor, convenience authentication for Windows — Windows Hello for Business. This planning guide
helps you understand the different topologies, architectures, and components that encompass a Windows Hello
for Business infrastructure.
This guide explains the role of each component within Windows Hello for Business and how certain deployment
decisions affect other aspects of the infrastructure. Armed with your planning worksheet, you'll use that
information to select the correct deployment guide for your needs.
NOTE
If you have an Azure tenant, you can use our online, interactive Passwordless Wizard which walks through the same
choices instead of using our manual guide below. The Passwordless Wizard is available in the Microsoft 365 admin center.
The cloud only deployment model is for organizations who only have cloud identities and do not access on-
premises resources. These organizations typically join their devices to the cloud and exclusively use resources in
the cloud such as SharePoint, OneDrive, and others. Also, because these users do not use on-premises
resources, they do not need certificates for things like VPN because everything they need is hosted in Azure.
Hybr i d
IMPORTANT
Hybrid deployments support non-destructive PIN reset that works with both the certificate trust and key trust models.
Requirements:
Microsoft PIN Reset Service - Windows 10, versions 1709 to 1809, Enterprise Edition. There is no licensing requirement
for this service since version 1903
Reset above lock screen (I forgot my PIN link) - Windows 10, version 1903
O n - p r e m i se s
The on-premises deployment model is for organizations that do not have cloud identities or use applications
hosted in Azure Active Directory.
IMPORTANT
On-premises deployments support destructive PIN reset that works with both the certificate trust and the key trust
models.
Requirements:
Reset from settings - Windows 10, version 1703, Professional
Reset above lock screen - Windows 10, version 1709, Professional
Reset above lock screen (I forgot my PIN link) - Windows 10, version 1903
It's fundamentally important to understand which deployment model to use for a successful deployment. Some
aspects of the deployment may have already been decided for you based on your current infrastructure.
Trust types
A deployment's trust type defines how each Windows Hello for Business client authenticates to the on-premises
Active Directory. There are two trust types: key trust and certificate trust.
The key trust type does not require issuing authentication certificates to end users. Users authenticate using a
hardware-bound key created during the built-in provisioning experience. This requires an adequate distribution
of Windows Server 2016 or later domain controllers relative to your existing authentication and the number of
users included in your Windows Hello for Business deployment. Read the Planning an adequate number of
Windows Server 2016 or later Domain Controllers for Windows Hello for Business deployments to learn more.
The certificate trust type issues authentication certificates to end users. Users authenticate using a certificate
requested using a hardware-bound key created during the built-in provisioning experience. Unlike key trust,
certificate trust does not require Windows Server 2016 domain controllers (but still requires Windows Server
2016 or later Active Directory schema). Users can use their certificate to authenticate to any Windows Server
2008 R2, or later, domain controller.
NOTE
RDP does not support authentication with Windows Hello for Business key trust deployments as a supplied credential.
RDP is only supported with certificate trust deployments as a supplied credential at this time. Windows Hello for Business
key trust can be used with Windows Defender Remote Credential Guard.
Device registration
All devices included in the Windows Hello for Business deployment must go through device registration. Device
registration enables devices to authenticate to identity providers. For cloud only and hybrid deployment, the
identity provider is Azure Active Directory. For on-premises deployments, the identity provider is the on-
premises server running the Windows Server 2016 Active Directory Federation Services (AD FS) role.
Key registration
The built-in Windows Hello for Business provisioning experience creates a hardware bound asymmetric key pair
as their user's credentials. The private key is protected by the device's security modules; however, the credential
is a user key (not a device key). The provisioning experience registers the user's public key with the identity
provider. For cloud only and hybrid deployments, the identity provider is Azure Active Directory. For on-
premises deployments, the identity provider is the on-premises server running Windows Server 2016 Active
Directory Federation Services (AD FS) role.
Multifactor authentication
IMPORTANT
As of July 1, 2019, Microsoft will no longer offer MFA Server for new deployments. New customers who require multi-
factor authentication for their users should use cloud-based Azure AD Multi-Factor Authentication. Existing customers
who have activated MFA Server prior to July 1, 2019 will be able to download the latest version, future updates and
generate activation credentials as usual. See Getting started with the Azure AD Multi-Factor Authentication Server for
more details.
The goal of Windows Hello for Business is to move organizations away from passwords by providing them a
strong credential that provides easy two-factor authentication. The built-in provisioning experience accepts the
user's weak credentials (username and password) as the first factor authentication; however, the user must
provide a second factor of authentication before Windows provisions a strong credential.
Cloud only and hybrid deployments provide many choices for multi-factor authentication. On-premises
deployments must use a multi-factor authentication that provides an AD FS multi-factor adapter to be used in
conjunction with the on-premises Windows Server 2016 AD FS server role. Organizations can use the on-
premises Azure AD Multi-Factor Authentication server, or choose from several third parties (Read Microsoft and
third-party additional authentication methods for more information).
NOTE
Azure AD Multi-Factor Authentication is available through:
Microsoft Enterprise Agreement
Open Volume License Program
Cloud Solution Providers program
Bundled with
Azure Active Directory Premium
Enterprise Mobility Suite
Enterprise Cloud Suite
Directory synchronization
Hybrid and on-premises deployments use directory synchronization, however, each for a different purpose.
Hybrid deployments use Azure Active Directory Connect to synchronize Active Directory identities or credentials
between itself and Azure Active Directory. This helps enable single sign-on to Azure Active Directory and its
federated components. On-premises deployments use directory synchronization to import users from Active
Directory to the Azure MFA Server, which sends data to the Azure MFA cloud service to perform the verification.
Management
Windows Hello for Business provides organizations with a rich set of granular policy settings with which they
can use to manage their devices and users. There are three ways in which you can manage Windows Hello for
Business: Group Policy, Modern Management, and Mixed.
Group Policy
Group Policy is the easiest and most popular way to manage Windows Hello for Business on domain joined
devices. Simply create a Group Policy object with the settings you desire. Link the Group Policy object high in
your Active Directory and use security group filtering to target specific sets of computers or users. Or, link the
GPO directly to the organizational units.
Modern management
Modern management is an emerging device management paradigm that leverages the cloud for managing
domain joined and non-domain joined devices. Organizations can unify their device management into one
platform and apply policy settings using a single platform
Client
Windows Hello for Business is an exclusive Windows 10 feature. As part of the Windows as a Service strategy,
Microsoft has improved the deployment, management, and user experience with each new release of Windows
10 and introduced support for new scenarios.
Most deployment scenarios require a minimum of Windows 10, version 1511, also known as the November
Update. The client requirement may change based on different components in your existing infrastructure, or
other infrastructure choices made later in planning your deployment. Those components and choices may
require a minimum client running Windows 10, version 1703, also known as the Creators Update.
Active Directory
Hybrid and on-premises deployments include Active Directory as part of their infrastructure. Most of the Active
Directory requirements, such as schema, and domain and forest functional levels are predetermined. However,
your trust type choice for authentication determines the version of domain controller needed for the
deployment.
Public Key Infrastructure
The Windows Hello for Business deployment depends on an enterprise public key infrastructure as a trust
anchor for authentication. Domain controllers for hybrid and on-premises deployments need a certificate in
order for Windows 10 devices to trust the domain controller as legitimate. Deployments using the certificate
trust type need an enterprise public key infrastructure and a certificate registration authority to issue
authentication certificates to users. Hybrid deployments may need to issue VPN certificates to users to enable
connectivity on-premises resources.
Cloud
Some deployment combinations require an Azure account, and some require Azure Active Directory for user
identities. These cloud requirements may only need an Azure account while other features need an Azure Active
Directory Premium subscription. The planning process identifies and differentiates the components that are
needed from those that are optional.
Planning a Deployment
Planning your Windows Hello for Business deployment begins with choosing a deployment type. Like all
distributed systems, Windows Hello for Business depends on multiple components within your organization's
infrastructure.
Use the remainder of this guide to help with planning your deployment. As you make decisions, write the results
of those decisions in your planning worksheet. When finished, you'll have all the information needed to
complete the planning process and the appropriate deployment guide that best helps you with your
deployment.
Deployment Model
Choose the deployment model based on the resources your users access. Use the following guidance to make
your decision.
If your organization does not have on-premises resources, write Cloud Only in box 1a on your planning
worksheet.
If your organization is federated with Azure or uses any service, such as AD Connect, Office365 or OneDrive, or
your users access cloud and on-premises resources, write Hybrid in box 1a on your planning worksheet.
If your organization does not have cloud resources, write On-Premises in box 1a on your planning worksheet.
NOTE
Main use case of On-Premises deployment is for "Enhanced Security Administrative Environments" also known as "Red
Forests".
Migration from on-premise to hybrid deployment will require redeployment.
Trust type
Hybrid Azure AD joined devices managed by Group Policy need the Windows Server 2016 AD FS role to issue
certificates. Hybrid Azure AD joined devices and Azure AD joined devices managed by Intune or a compatible
MDM need the Windows Server NDES server role to issue certificates.
Choose a trust type that is best suited for your organizations. Remember, the trust type determines two things.
Whether you issue authentication certificates to your users and if your deployment needs Windows Server
2016 domain controllers.
One trust model is not more secure than the other. The major difference is based on the organization comfort
with deploying Windows Server 2016 domain controllers and not enrolling users with end entity certificates
(key-trust) against using existing domain controllers (Windows Server 2008R2 or later) and needing to enroll
certificates for all their users (certificate trust).
Because the certificate trust types issues certificates, there is more configuration and infrastructure needed to
accommodate user certificate enrollment, which could also be a factor to consider in your decision. Additional
infrastructure needed for certificate-trust deployments includes a certificate registration authority. In a federated
environment, you need to activate the Device Writeback option in Azure AD Connect.
If your organization wants to use the key trust type, write key trust in box 1b on your planning worksheet.
Write Windows Ser ver 2016 in box 4d . Write N/A in box 5b .
If your organization wants to use the certificate trust type, write cer tificate trust in box 1b on your planning
worksheet. Write Windows Ser ver 2008 R2 or later in box 4d . In box 5c , write smar t card logon under
the Template Name column and write users under the Issued To column on your planning worksheet.
Device Registration
A successful Windows Hello for Business requires all devices to register with the identity provider. The identity
provider depends on the deployment model.
If box 1a on your planning worksheet reads cloud only or hybrid , write Azure in box 1c on your planning
worksheet.
If box 1a on your planning worksheet reads on-premises , write AD FS in box 1c on your planning worksheet.
Key Registration
All users provisioning Windows Hello for Business have their public key registered with the identity provider.
The identity provider depends on the deployment model.
If box 1a on your planning worksheet reads cloud only or hybrid , write Azure in box 1d on your planning
worksheet.
If box 1a on your planning worksheet reads on-premises , write AD FS in box 1d on your planning worksheet.
Directory Synchronization
Windows Hello for Business is strong user authentication, which usually means there is an identity (a user or
username) and a credential (typically a key pair). Some operations require writing or reading user data to or
from the directory. For example, reading the user's phone number to perform multi-factor authentication during
provisioning or writing the user's public key.
If box 1a on your planning worksheet reads cloud only , write N/A in box 1e . User information is written
directly to Azure Active Directory and there is not another directory with which the information must be
synchronized.
If box 1a on your planning worksheet reads hybrid , then write Azure AD Connect in box 1e on your planning
worksheet.
If box 1a on your planning worksheet reads on-premises , then write Azure MFA Ser ver . This deployment
exclusively uses Active Directory for user information with the exception of the multi-factor authentication. The
on-premises Azure MFA server synchronizes a subset of the user information, such as phone number, to provide
multi-factor authentication while the user's credentials remain on the on-premises network.
Multifactor Authentication
The goal of Windows Hello for Business is to move user authentication away from passwords to a strong, key-
based user authentication. Passwords are weak credentials and cannot be trusted by themselves as an attacker
with a stolen password could be attempting to enroll in Windows Hello for Business. To keep the transition from
a weak to a strong credential secure, Windows Hello for Business relies on multi-factor authentication during
provisioning to have some assurances that the user identity provisioning a Windows Hello for Business
credential is the proper identity.
If box 1a on your planning worksheet reads cloud only , then your only option is to use the Azure MFA cloud
service. Write Azure MFA in box 1f on your planning worksheet.
If box 1a on your planning worksheet reads hybrid , then you have a few options, some of which depend on
your directory synchronization configuration. The options from which you may choose include:
Directly use Azure MFA cloud service
Use AD FS w/Azure MFA cloud service adapter
Use AD FS w/Azure MFA Server adapter
Use AD FS w/3rd Party MFA Adapter
You can directly use the Azure MFA cloud service for the second factor of authentication. Users contacting the
service must authenticate to Azure prior to using the service.
If your Azure AD Connect is configured to synchronize identities (usernames only), then your users are
redirected to your local on-premises federation server for authentication and then redirected back to the Azure
MFA cloud service. Otherwise, your Azure AD Connect is configured to synchronize credentials (username and
passwords), which enables your users to authenticate to Azure Active Directory and use the Azure MFA cloud
service. If you choose to use the Azure MFA cloud service directly, write Azure MFA in box 1f on your planning
worksheet.
You can configure your on-premises Windows Server 2016 AD FS role to use the Azure MFA service adapter. In
this configuration, users are redirected to the on premises AD FS server (synchronizing identities only). The AD
FS server uses the MFA adapter to communicate to the Azure MFA service to perform the second factor of
authentication. If you choose to use AD FS with the Azure MFA cloud service adapter, write AD FS with Azure
MFA cloud adapter in box 1f on your planning worksheet.
Alternatively, you can use AD FS with an on-premises Azure MFA server adapter. Rather than AD FS
communicating directly with the Azure MFA cloud service, it communicates with an on-premises Azure MFA
server that synchronizes user information with the on-premises Active Directory. The Azure MFA server
communicates with Azure MFA cloud services to perform the second factor of authentication. If you choose to
use AD FS with the Azure MFA server adapter, write AD FS with Azure MFA ser ver adapter in box 1f on
your planning worksheet.
The last option is for you to use AD FS with a third-party adapter as the second factor of authentication. If you
choose to use AD FS with a third-party MFA adapter, write AD FS with third par ty in box 1f on your planning
worksheet.
If box 1a on your planning worksheet reads on-premises , then you have two second factor authentication
options. You must use Windows Server 2016 AD FS with your choice of the on-premises Azure MFA server or
with a third-party MFA adapter.
If you choose to use AD FS with the Azure MFA server adapter, write AD FS with Azure MFA ser ver adapter
in box 1f on your planning worksheet. If you choose to use AD FS with a third-party MFA adapter, write AD FS
with third par ty in box 1f on your planning worksheet.
Management
Windows Hello for Business provides organizations with many policy settings and granular control on how
these settings may be applied to both computers and users. The type of policy management you can use
depends on your selected deployment and trust models.
If box 1a on your planning worksheet reads cloud only , write N/A in box 2a on your planning worksheet. You
have the option to manage non-domain joined devices. If you choose to manage Azure Active Directory joined
devices, write modern management in box 2b on your planning worksheet. Otherwise, write** N/A** in box
2b .
NOTE
Azure Active Directory joined devices without modern management automatically enroll in Windows Hello for Business
using the default policy settings. Use modern management to adjust policy settings to match the business needs of your
organization.
If box 1a on your planning worksheet reads on-prem , write GP in box 2a on your planning worksheet. Write
N/A in box 2b on your worksheet.
Managing hybrid deployments includes two categories of devices to consider for your Windows Hello for
Business deployment—domain joined and non-domain joined. All devices are registered, however, not all
devices are domain joined. You have the option of using Group Policy for domain joined devices and modern
management for non-domain joined devices. Or, you can use modern management for both domain and non-
domain joined devices.
If you use Group Policy to manage your domain joined devices, write GP in box 2a on your planning worksheet.
Write modern management in box 2b if you decide to manage non-domain joined devices; otherwise, write
N/A .
If you use modern management for both domain and non-domain joined devices, write modern management
in box 2a and 2b on your planning worksheet.
Client
Windows Hello for Business is a feature exclusive to Windows 10. Some deployments and features are available
using earlier versions of Windows 10. Others need the latest versions.
If box 1a on your planning worksheet reads cloud only , write N/A in box 3a on your planning worksheet.
Optionally, you may write 1511 or later in box 3b on your planning worksheet if you plan to manage non-
domain joined devices.
NOTE
Azure Active Directory joined devices without modern management automatically enroll in Windows Hello for Business
using the default policy settings. Use modern management to adjust policy settings to match the business needs of your
organization.
Write 1511 or later in box 3a on your planning worksheet if any of the following are true.
Box 2a on your planning worksheet read modern management .
Optionally, you may write 1511 or later in box 3b on your planning worksheet if you plan to
manage non-domain joined devices.
Box 1a on your planning worksheet reads hybrid , box 1b reads key trust , and box 2a reads GP . Optionally,
you may write *1511 or later in box 3b on your planning worksheet if you plan to manage non-domain
joined devices.
Write 1703 or later in box 3a on your planning worksheet if any of the following are true.
Box 1a on your planning worksheet reads on-premises .
Write N/A in box 3b on your planning worksheet.
Box 1a on your planning worksheet reads hybrid , box 1b reads cer tificate trust , and box 2a reads GP .
Optionally, you may write 1511 or later in box 3b on your planning worksheet if you plan to
manage non-domain joined devices.
Active Directory
The Active Directory portion of the planning guide should be complete. Most of the conditions are baseline
prerequisites except for your domain controllers. The domain controllers used in your deployment are decided
by the chosen trust type.
Review the trust type portion of this section if box 4d on your planning worksheet remains empty.
Public Key Infrastructure
Public key infrastructure prerequisites already exist in your planning worksheet. These conditions are the
minimum requirements for any hybrid or on-premises deployment. Additional conditions may be needed based
on your trust type.
If box 1a on your planning worksheet reads cloud only , ignore the public key infrastructure section of your
planning worksheet. Cloud only deployments do not use a public key infrastructure.
If box 1b on your planning worksheet reads key trust , write N/A in box 5b on your planning worksheet. Key
trust doesn't require any change in public key infrastructure, skip this part and go to Cloud section.
The registration authority only relates to certificate trust deployments and the management used for domain
and non-domain joined devices. Hybrid Azure AD joined devices managed by Group Policy need the Windows
Server 2016 AD FS role to issue certificates. Hybrid Azure AD joined devices and Azure AD joined devices
managed by Intune or a compatible MDM need the Windows Server NDES server role to issue certificates.
If box 2a reads GP and box 2b reads modern management , write AD FS RA and NDES in box 5b on your
planning worksheet. In box 5c , write the following certificate templates names and issuances:
C ERT IF IC AT E T EM P L AT E N A M E ISSUED TO
Web Server AD FS RA
If box 2a reads GP and box 2b reads N/A , write AD FS RA in box 5b and write the following certificate
template names and issuances in box 5c on your planning worksheet.
C ERT IF IC AT E T EM P L AT E N A M E ISSUED TO
Web Server AD FS RA
If box 2a or 2b reads modern management, write NDES in box 5b and write the following certificate template
names and issuances in box 5c on your planning worksheet.
C ERT IF IC AT E T EM P L AT E N A M E ISSUED TO
Cloud
Nearly all deployments of Windows Hello for Business require an Azure account.
If box 1a on your planning worksheet reads cloud only or hybrid , write Yes in boxes 6a and 6b on your
planning worksheet.
If box 1a on your planning worksheet reads on-premises , and box 1f reads AD FS with third par ty , write
No in box 6a on your planning worksheet. Otherwise, write Yes in box 6a as you need an Azure account for
per-consumption MFA billing. Write No in box 6b on your planning worksheet—on-premises deployments do
not use the cloud directory.
Windows Hello for Business does not require an Azure AD premium subscription. However, some dependencies,
such as MDM automatic enrollment and Conditional Access do.
If box 1a on your planning worksheet reads on-premises , write No in box 6c on your planning worksheet.
If box 1a on your planning worksheet reads hybrid and box 1b reads key trust , write No in box 6c on your
planning worksheet. You can deploy Windows Hello for Business using the Azure Active Directory free tier. All
Azure Active Directory free accounts can use Azure AD Multi-Factor Authentication through the use of security
defaults. Some Azure AD Multi-Factor Authentication features require a license. For more details, see Features
and licenses for Azure AD Multi-Factor Authentication.
If box 5b on your planning worksheet reads AD FS RA , write Yes in box 6c on your planning worksheet.
Enrolling a certificate using the AD FS registration authority requires devices to authenticate to the AD FS server,
which requires device write-back, an Azure AD Premium feature.
Modern managed devices do not require an Azure AD premium subscription. By forgoing the subscription, your
users must manually enroll devices in the modern management software, such as Intune or a supported third-
party MDM.
If boxes 2a or 2b read modern management and you want devices to automatically enroll in your modern
management software, write Yes in box 6c on your planning worksheet. Otherwise, write No in box 6c .
This article lists the infrastructure requirements for the different deployment models for Windows Hello for
Business.
Hybrid Deployments
The table shows the minimum requirements for each deployment. For key trust in a multi-domain/multi-forest
deployment, the following requirements are applicable for each domain/forest that hosts Windows Hello for
business components or is involved in the Kerberos referral process.
Windows 10, version 1511 Hybrid Azure AD Joined: Windows 10, version 1511 Windows 10, version 1511
or later Minimum: Windows 10, or later or later
version 1703
Best experience: Windows
10, version 1709 or later
(supports synchronous
certificate enrollment).
Azure AD Joined:
Windows 10, version 1511
or later
Windows Server 2016 or Windows Server 2016 or Windows Server 2016 or Windows Server 2016 or
later Schema later Schema later Schema later Schema
Windows Server 2008 R2 Windows Server 2008 R2 Windows Server 2008 R2 Windows Server 2008 R2
Domain/Forest functional Domain/Forest functional Domain/Forest functional Domain/Forest functional
level level level level
Windows Server 2016 or Windows Server 2008 R2 or Windows Server 2016 or Windows Server 2008 R2 or
later Domain Controllers later Domain Controllers later Domain Controllers later Domain Controllers
Windows Server 2012 or Windows Server 2012 or Windows Server 2012 or Windows Server 2012 or
later Certificate Authority later Certificate Authority later Certificate Authority later Certificate Authority
K EY T RUST C ERT IF IC AT E T RUST K EY T RUST C ERT IF IC AT E T RUST
GRO UP P O L IC Y M A N A GED M IXED M A N A GED M O DERN M A N A GED M O DERN M A N A GED
Azure MFA tenant, or Azure MFA tenant, or Azure MFA tenant, or Azure MFA tenant, or
AD FS w/Azure MFA AD FS w/Azure MFA AD FS w/Azure MFA AD FS w/Azure MFA
adapter, or adapter, or adapter, or adapter, or
AD FS w/Azure MFA Server AD FS w/Azure MFA Server AD FS w/Azure MFA Server AD FS w/Azure MFA Server
adapter, or adapter, or adapter, or adapter, or
AD FS w/3rd Party MFA AD FS w/3rd Party MFA AD FS w/3rd Party MFA AD FS w/3rd Party MFA
Adapter Adapter Adapter Adapter
Azure Active Directory Azure Active Directory Azure Active Directory Azure Active Directory
IMPORTANT
1. Hybrid deployments support non-destructive PIN reset that works with both the certificate trust and key trust
models.
Requirements:
Microsoft PIN Reset Service - Windows 10, versions 1709 to 1809, Enterprise Edition. There is no licensing
requirement for this service since version 1903
Reset above lock screen (I forgot my PIN link) - Windows 10, version 1903
2. On-premises deployments support destructive PIN reset that works with both the certificate trust and the key
trust models.
Requirements:
Reset from settings - Windows 10, version 1703, Professional
Reset above lock screen - Windows 10, version 1709, Professional
Reset above lock screen (I forgot my PIN link) - Windows 10, version 1903
On-premises Deployments
The table shows the minimum requirements for each deployment.
Windows 10, version 1703 or later Windows 10, version 1703 or later
K EY T RUST C ERT IF IC AT E T RUST
GRO UP P O L IC Y M A N A GED GRO UP P O L IC Y M A N A GED
Windows Server 2008 R2 Domain/Forest functional level Windows Server 2008 R2 Domain/Forest functional level
Windows Server 2016 or later Domain Controllers Windows Server 2008 R2 or later Domain Controllers
Windows Server 2012 or later Certificate Authority Windows Server 2012 or later Certificate Authority
Windows Server 2016 AD FS with KB4088889 update Windows Server 2016 AD FS with KB4088889 update
AD FS with 3rd Party MFA Adapter AD FS with 3rd Party MFA Adapter
Azure Account, optional for Azure MFA billing Azure Account, optional for Azure MFA billing
IMPORTANT
For Windows Hello for Business key trust deployments, if you have several domains, at least one Windows Server Domain
Controller 2016 or newer is required for each domain. For more information, see the planning guide.
Prepare people to use Windows Hello
7/23/2019 • 2 minutes to read • Edit Online
Applies to
Windows 10
When you set a policy to require Windows Hello for Business in the workplace, you will want to prepare people
in your organization by explaining how to use Hello.
After enrollment in Hello, users should use their gesture (such as a PIN or fingerprint) for access to corporate
resources. Their gesture is only valid on the enrolled device.
Although the organization may require users to change their Active Directory or Azure Active Directory (AD)
account password at regular intervals, changes to their passwords have no effect on Hello.
People who are currently using virtual or physical smart cards for authentication can use their virtual smart card
to verify their identity when they set up Hello.
Next, they select a way to connect. Tell the people in your enterprise which option they should pick here.
They sign in, and are then asked to verify their identity. People have options to choose from a text message,
phone call, or the authentication application. After verification, they create their PIN. The Create a PIN screen
displays any complexity requirements that you have set, such as minimum length.
After Hello is set up, people use their PIN to unlock the device, and that will automatically log them on.
On personal devices
People who want to access work resources on their personal devices can add a work or school account in
Settings > Accounts > Work or school , and then sign in with work credentials. The person selects the
method for receiving the verification code, such as text message or email. The verification code is sent and the
person then enters the verification code. After verification, the person enters and confirms new PIN. The person
can access any token-based resource using this device without being asked for credentials.
People can go to Settings > Accounts > Work or school , select the work account, and then select Unjoin to
remove the account from their device.
Related topics
Windows Hello for Business
How Windows Hello for Business works
Manage Windows Hello for Business in your organization
Why a PIN is better than a password
Windows Hello and password changes
Windows Hello errors during PIN creation
Event ID 300 - Windows Hello successfully created
Windows Hello biometrics in the enterprise
Hybrid Azure AD joined Key Trust Deployment
11/2/2020 • 2 minutes to read • Edit Online
Applies to
Windows 10, version 1703 or later
Hybrid deployment
Key trust
Windows Hello for Business replaces username and password sign-in to Windows with strong user
authentication based on asymmetric key pair. The following deployment guide provides the information needed
to successfully deploy Windows Hello for Business in a hybrid key trust scenario.
It is recommended that you review the Windows Hello for Business planning guide prior to using the
deployment guide. The planning guide helps you make decisions by explaining the available options with each
aspect of the deployment and explains the potential outcomes based on each of these decisions. You can review
the planning guide and download the planning worksheet.
This deployment guide provides guidance for new deployments and customers who are already federated with
Office 365. These two scenarios provide a baseline from which you can begin your deployment.
Follow the Windows Hello for Business hybrid key trust deployment
guide
1. Overview (You are here)
2. Prerequisites
3. New Installation Baseline
4. Configure Directory Synchronization
5. Configure Azure Device Registration
6. Configure Windows Hello for Business settings
7. Sign-in and Provision
Hybrid Key trust Windows Hello for Business
Prerequisites
3/5/2021 • 5 minutes to read • Edit Online
Applies to
Windows 10, version 1703 or later
Hybrid deployment
Key trust
Hybrid environments are distributed systems that enable organizations to use on-premises and Azure-based
identities and resources. Windows Hello for Business uses the existing distributed system as a foundation on
which organizations can provide two-factor authentication that provides a single sign-in like experience to
modern resources.
The distributed systems on which these technologies were built involved several pieces of on-premises and
cloud infrastructure. High-level pieces of the infrastructure include:
Directories
Public Key Infrastructure
Directory Synchronization
Federation
MultiFactor Authentication
Device Registration
Directories
Hybrid Windows Hello for Business needs two directories: on-premises Active Directory and a cloud Azure
Active Directory. The minimum required domain functional and forest functional levels for Windows Hello for
Business deployment is Windows Server 2008 R2.
A hybrid Windows Hello for Business deployment needs an Azure Active Directory subscription. The hybrid key
trust deployment, does not need a premium Azure Active Directory subscription.
You can deploy Windows Hello for Business in any environment with Windows Server 2008 R2 or later domain
controllers.
If using the key trust deployment model, you MUST ensure that you have adequate (1 or more, depending on
your authentication load) Windows Server 2016 or later Domain Controllers in each Active Directory site where
users will be authenticating for Windows Hello for Business.
Read the Planning an adequate number of Windows Server 2016 or later Domain Controllers for Windows
Hello for Business deployments to learn more.
NOTE
There was an issue with key trust authentication on Windows Server 2019. If you are planning to use Windows Server
2019 domain controllers refer to KB4487044 to fix this issue.
Review these requirements and those from the Windows Hello for Business planning guide and worksheet.
Based on your deployment decisions you may need to upgrade your on-premises Active Directory or your
Azure Active Directory subscription to meet your needs.
Section Review
Active Directory Domain Functional Level
Active Directory Forest Functional Level
Domain Controller version
Azure Active Directory subscription
Correct subscription for desired features and outcomes
IMPORTANT
For Azure AD joined device to authenticate to and use on-premises resources, ensure you:
Install the root certificate authority certificate for your organization in the user's trusted root certificate store.
Publish your certificate revocation list to a location that is available to Azure AD joined devices, such as a web-based
url.
Section Review
Windows Server 2012 Issuing Certificate Authority
Directory Synchronization
The two directories used in hybrid deployments must be synchronized. You need Azure Active Directory Connect
to synchronize user accounts in the on-premises Active Directory with Azure Active Directory.
Organizations using older directory synchronization technology, such as DirSync or Azure AD sync need to
upgrade to Azure AD Connect.
Section Review
Azure Active Directory Connect directory synchronization
Upgrade from DirSync
Upgrade from Azure AD Sync
Multifactor Authentication
Windows Hello for Business is a strong, two-factor credential the helps organizations reduce their dependency
on passwords. The provisioning process lets a user enroll in Windows Hello for Business using their user name
and password as one factor, but needs a second factor of authentication.
Hybrid Windows Hello for Business deployments can use Azure's Multifactor Authentication (MFA) service or
they can use multifactor authentication provided by AD FS beginning with Windows Server 2012 R2, which
includes an adapter model that enables third parties to integrate their MFA into AD FS. The MFA enabled by an
Office 365 license is sufficient for Azure AD.
Section Review
Azure MFA Service
Windows Server 2016 AD FS and Azure (optional, if federated)
Windows Server 2016 AD FS and third party MFA Adapter (optional, if federated)
Device Registration
Organizations wanting to deploy hybrid key trust need their domain joined devices to register to Azure Active
Directory. Just as a computer has an identity in Active Directory, that same computer has an identity in the cloud.
This ensures that only approved computers are used with that Azure Active Directory. Each computer registers
its identity in Azure Active Directory.
Provisioning
You need to allow access to the URL account.microsoft.com to initiate Windows Hello for Business provisioning.
This URL launches the subsequent steps in the provisioning process and is required to successfully complete
Windows Hello for Business provisioning. This URL does not require any authentication and as such, does not
collect any user data.
Section Checklist
Device Registration with Azure Device Registration
Next Steps
Follow the Windows Hello for Business hybrid key trust deployment guide. For proof-of-concepts, labs, and new
installations, choose the New Installation Baseline .
For environments transitioning from on-premises to hybrid, start with Configure Azure Director y
Synchronization .
For federated and non-federated environments, start with Configure Windows Hello for Business settings .
Follow the Windows Hello for Business hybrid key trust deployment
guide
1. Overview
2. Prerequisites (You are here)
3. New Installation Baseline
4. Configure Directory Synchronization
5. Configure Azure Device Registration
6. Configure Windows Hello for Business settings
7. Sign-in and Provision
Windows Hello for Business Key Trust New
Installation
3/5/2021 • 5 minutes to read • Edit Online
Applies to
Windows 10, version 1703 or later
Hybrid deployment
Key trust
Windows Hello for Business involves configuring distributed technologies that may or may not exist in your
current infrastructure. Hybrid key trust deployments of Windows Hello for Business rely on these technologies
Active Directory
Public Key Infrastructure
Azure Active Directory
Multifactor Authentication Services
New installations are considerably more involved than existing implementations because you are building the
entire infrastructure. Microsoft recommends you review the new installation baseline to validate your existing
environment has all the needed configurations to support your hybrid certificate trust Windows Hello for
Business deployment. If your environment meets these needs, you can read the Configure Directory
Synchronization section to prepare your Windows Hello for Business deployment by configuring directory
synchronization.
The new installation baseline begins with a basic Active Directory deployment and enterprise PKI.
Active Directory
This document expects you have Active Directory deployed with an adequate number of Windows Server 2016
or later domain controllers for each site. Read the Planning an adequate number of Windows Server 2016
Domain Controllers for Windows Hello for Business deployments to learn more.
NOTE
There was an issue with key trust authentication on Windows Server 2019. If you are planning to use Windows Server
2019 domain controllers refer to KB4487044 to fix this issue.
Lab environments and isolated proof of concepts may want to limit the number of domain controllers. The
purpose of these environments is to experiment and learn. Reducing the number of domain controllers can
prevent troubleshooting issue, such as Active Directory replication, which is unrelated to activity's goal.
Section Review
An adequate number of Windows Server 2016 domain controllers
Minimum Windows Server 2008 R2 domain and forest functional level
Functional networking, name resolution, and Active Directory replication
NOTE
Never install a certificate authority on a domain controller in a production environment.
3. Use the following command to configure the Certificate Authority using a basic certificate authority
configuration.
Install-AdcsCertificationAuthority
IMPORTANT
For Azure AD joined device to authenticate to and use on-premises resources, ensure you:
Install the root certificate authority certificate for your organization in the user's trusted root certificate store.
Publish your certificate revocation list to a location that is available to Azure AD joined devices, such as a web-based
URL.
Section Review
Minimum Windows Server 2012 Certificate Authority.
Enterprise Certificate Authority.
Functioning public key infrastructure.
Root certificate authority certificate (Azure AD Joined devices).
Highly available certificate revocation list (Azure AD Joined devices).
Azure Active Directory
You've prepared your Active Directory. Hybrid Windows Hello for Business deployment needs Azure Active
Directory to host your cloud-based identities.
The next step of the deployment is to follow the Creating an Azure AD tenant process to provision an Azure
tenant for your organization.
Section Review
Review the different ways to establish an Azure Active Directory tenant.
Create an Azure Active Directory Tenant.
Purchase the appropriate Azure Active Directory subscription or licenses, if necessary.
IMPORTANT
As long as your users have licenses that include Azure AD Multi-Factor Authentication, there's nothing that you need to
do to turn on Azure MFA. You can start requiring two-step verification on an individual user basis. The licenses that
enable Azure MFA are:
Azure AD Multi-Factor Authentication
Azure Active Directory Premium
Enterprise Mobility + Security
If you have one of these subscriptions or licenses, skip the Azure MFA Adapter section.
Follow the Windows Hello for Business hybrid key trust deployment
guide
1. Overview
2. Prerequisites
3. New Installation Baseline (You are here)
4. Configure Directory Synchronization
5. Configure Azure Device Registration
6. Configure Windows Hello for Business settings
7. Sign-in and Provision
Configure Directory Synchronization for Hybrid key
trust Windows Hello for Business
11/7/2019 • 2 minutes to read • Edit Online
Applies to
Windows 10, version 1703 or later
Hybrid deployment
Key trust
You are ready to configure directory synchronization for your hybrid environment. Hybrid Windows Hello for
Business deployment needs both a cloud and an on-premises identity to authenticate and access resources in
the cloud or on-premises.
NOTE
If you installed Azure AD Connect prior to upgrading the schema, you will need to re-run the Azure AD Connect
installation and refresh the on-premises AD schema to ensure the synchronization rule for msDS-KeyCredentialLink is
configured.
Follow the Windows Hello for Business hybrid key trust deployment
guide
1. Overview
2. Prerequisites
3. New Installation Baseline
4. Configure Directory Synchronization (You are here)
5. Configure Azure Device Registration
6. Configure Windows Hello for Business settings
7. Sign-in and Provision
Configure Device Registration for Hybrid key trust
Windows Hello for Business
4/6/2020 • 2 minutes to read • Edit Online
Applies to
Windows 10, version 1703 or later
Hybrid deployment
Key trust
You are ready to configure device registration for your hybrid environment. Hybrid Windows Hello for Business
deployment needs device registration to enable proper device authentication.
NOTE
Before proceeding, you should familiarize yourself with device registration concepts such as:
Azure AD registered devices
Azure AD joined devices
Hybrid Azure AD joined devices
You can learn about this and more by reading Introduction to Device Management in Azure Active Directory.
Follow the Windows Hello for Business hybrid key trust deployment
guide
1. Overview
2. Prerequisites
3. New Installation Baseline
4. Configure Directory Synchronization
5. Configure Azure Device Registration (You are here)
6. Configure Windows Hello for Business settings
7. Sign-in and Provision
Configure Hybrid Windows Hello for Business key
trust settings
11/2/2020 • 2 minutes to read • Edit Online
Applies to
Windows 10, version 1703 or later
Hybrid deployment
Key trust
You are ready to configure your hybrid key trust environment for Windows Hello for Business.
IMPORTANT
Ensure your environment meets all the prerequisites before proceeding. Review the New Installation baseline section of
this deployment document to learn how to prepare your environment for your Windows Hello for Business deployment.
The configuration for Windows Hello for Business is grouped in four categories. These categories are:
Active Directory
Azure AD Connect
Public Key Infrastructure
Group Policy
For the most efficient deployment, configure these technologies in order beginning with the Active Directory
configuration
C O N F I G U R E A C T I V E D I R E C TO R Y
>
Follow the Windows Hello for Business hybrid key trust deployment
guide
1. Overview
2. Prerequisites
3. New Installation Baseline
4. Configure Directory Synchronization
5. Configure Azure Device Registration
6. Configure Windows Hello for Business settings (You are here)
7. Sign-in and Provision
Hybrid Windows Hello for Business Provisioning
3/5/2021 • 2 minutes to read • Edit Online
Applies to
Windows 10, version 1703 or later
Hybrid deployment
Key trust
Provisioning
The Windows Hello for Business provisioning begins immediately after the user has signed in, after the user
profile is loaded, but before the user receives their desktop. Windows only launches the provisioning experience
if all the prerequisite checks pass. You can determine the status of the prerequisite checks by viewing the User
Device Registration in the Event Viewer under Applications and Ser vices Logs\Microsoft\Windows .
The first thing to validate is the computer has processed device registration. You can view this from the User
device registration logs where the check Device is AAD joined (AADJ or DJ++): Yes appears. Additionally,
you can validate this using the dsregcmd /status command from a console prompt where the value for
AzureADJoined reads Yes .
Windows Hello for Business provisioning begins with a full screen page with the title Setup a PIN and button
with the same name. The user clicks Setup a PIN .
The provisioning flow proceeds to the Multi-Factor authentication portion of the enrollment. Provisioning
informs the user that it is actively attempting to contact the user through their configured form of MFA. The
provisioning process does not proceed until authentication succeeds, fails or times out. A failed or timeout MFA
results in an error and asks the user to retry.
After a successful MFA, the provisioning flow asks the user to create and validate a PIN. This PIN must observe
any PIN complexity requirements that you deployed to the environment.
The provisioning flow has all the information it needs to complete the Windows Hello for Business enrollment.
A successful single factor authentication (username and password at sign-in)
A device that has successfully completed device registration
A fresh, successful multi-factor authentication
A validated PIN that meets the PIN complexity requirements
The remainder of the provisioning includes Windows Hello for Business requesting an asymmetric key pair for
the user, preferably from the TPM (or required if explicitly set through policy). Once the key pair is acquired,
Windows communicates with Azure Active Directory to register the public key. When key registration completes,
Windows Hello for Business provisioning informs the user they can use their PIN to sign-in. The user may close
the provisioning application and see their desktop. While the user has completed provisioning, Azure AD
Connect synchronizes the user's key to Active Directory.
IMPORTANT
The minimum time needed to synchronize the user's public key from Azure Active Directory to the on-premises Active
Directory is 30 minutes. The Azure AD Connect scheduler controls the synchronization interval. This synchronization
latency delays the user's ability to authenticate and use on-premises resources until the user's public key
has synchronized to Active Director y. Once synchronized, the user can authenticate and use on-premises resources.
Read Azure AD Connect sync: Scheduler to view and adjust the synchronization cycle for your organization.
Follow the Windows Hello for Business hybrid key trust deployment
guide
1. Overview
2. Prerequisites
3. New Installation Baseline
4. Configure Directory Synchronization
5. Configure Azure Device Registration
6. Configure Windows Hello for Business settings
7. Sign-in and Provision(You are here)
Hybrid Azure AD joined Certificate Trust
Deployment
11/2/2020 • 2 minutes to read • Edit Online
Applies to
Windows 10, version 1703 or later
Hybrid deployment
Certificate trust
Windows Hello for Business replaces username and password sign-in to Windows with strong user
authentication based on asymmetric key pair. The following deployment guide provides the information needed
to successfully deploy Windows Hello for Business in a hybrid certificate trust scenario.
It is recommended that you review the Windows Hello for Business planning guide prior to using the
deployment guide. The planning guide helps you make decisions by explaining the available options with each
aspect of the deployment and explains the potential outcomes based on each of these decisions. You can review
the planning guide and download the planning worksheet.
This deployment guide provides guidance for new deployments and customers who are already federated with
Office 365. These two scenarios provide a baseline from which you can begin your deployment.
Federated Baseline
The federated baseline helps organizations that have completed their federation with Azure Active Directory and
Office 365 and enables them to introduce Windows Hello for Business into their hybrid environment. This
baseline exclusively focuses on the procedures needed to add Azure Device Registration and Windows Hello for
Business to an existing hybrid deployment.
Regardless of the baseline you choose, your next step is to familiarize yourself with the prerequisites needed for
the deployment. Many of the prerequisites will be new for organizations and individuals pursuing the new
deployment baseline. Organizations and individuals starting from the federated baseline will likely be familiar
with most of the prerequisites, but should validate they are using the proper versions that include the latest
updates.
Prerequisites
Follow the Windows Hello for Business hybrid certificate trust
deployment guide
1. Overview (You are here)
2. Prerequisites
3. New Installation Baseline
4. Device Registration
5. Configure Windows Hello for Business settings
6. Sign-in and Provision
Hybrid Windows Hello for Business Prerequisites
7/2/2020 • 5 minutes to read • Edit Online
Applies to
Windows 10, version 1703 or later
Hybrid deployment
Certificate trust
Hybrid environments are distributed systems that enable organizations to use on-premises and Azure-based
identities and resources. Windows Hello for Business uses the existing distributed system as a foundation on
which organizations can provide two-factor authentication that provides a single sign-in like experience to
modern resources.
The distributed systems on which these technologies were built involved several pieces of on-premises and
cloud infrastructure. High-level pieces of the infrastructure include:
Directories
Public Key Infrastructure
Directory Synchronization
Federation
Multifactor Authentication
Device Registration
Directories
Hybrid Windows Hello for Business needs two directories: on-premises Active Directory and a cloud Azure
Active Directory. The minimum required domain controller, domain functional level, and forest functional level
for Windows Hello for Business deployment is Windows Server 2008 R2.
A hybrid Windows Hello for Business deployment needs an Azure Active Directory subscription. Different
deployment configurations are supported by different Azure subscriptions. The hybrid-certificate trust
deployment needs an Azure Active Directory premium subscription because it uses the device write-back
synchronization feature. Other deployments, such as the hybrid key-trust deployment, may not require Azure
Active Directory premium subscription.
Windows Hello for Business can be deployed in any environment with Windows Server 2008 R2 or later
domain controllers. Azure device registration and Windows Hello for Business require the Windows Server
2016 Active Directory or later schema.
Review these requirements and those from the Windows Hello for Business planning guide and worksheet.
Based on your deployment decisions you may need to upgrade your on-premises Active Directory or your
Azure Active Directory subscription to meet your needs.
Section Review
Active Directory Domain Functional Level
Active Directory Forest Functional Level
Domain Controller version
Windows Server 2016 or later Schema
Azure Active Directory subscription
Correct subscription for desired features and outcomes
Directory Synchronization
The two directories used in hybrid deployments must be synchronized. You need Azure Active Directory Connect
to synchronize user accounts in the on-premises Active Directory with Azure Active Directory.
Organizations using older directory synchronization technology, such as DirSync or Azure AD sync, need to
upgrade to Azure AD Connect. In case the schema of your local AD DS was changed since the last directory
synchronization, you may need to refresh directory schema.
NOTE
Windows Hello for Business is tied between a user and a device. Both the user and device need to be synchronized
between Azure Active Directory and Active Directory.
Section Review
Azure Active Directory Connect directory synchronization
Upgrade from DirSync
Upgrade from Azure AD Sync
Federation
Windows Hello for Business hybrid certificate trust requires Active Directory being federated with Azure Active
Directory and needs Windows Server 2016 Active Directory Federation Services or newer. Windows Hello for
Business hybrid certificate trust doesn’t support Managed Azure Active Directory using Pass-through
authentication or password hash sync. All nodes in the AD FS farm must run the same version of AD FS.
Additionally, you need to configure your AD FS farm to support Azure registered devices.
The AD FS farm used with Windows Hello for Business must be Windows Server 2016 with minimum update of
KB4088889 (14393.2155). If your AD FS farm is not running the AD FS role with updates from Windows Server
2016, then read Upgrading to AD FS in Windows Server 2016
Section Review
Windows Server 2016 Active Directory Federation Services
Minimum update of KB4088889 (14393.2155)
Multifactor Authentication
Windows Hello for Business is a strong, two-factor credential the helps organizations reduce their dependency
on passwords. The provisioning process lets a user enroll in Windows Hello for Business using their username
and password as one factor. but needs a second factor of authentication.
Hybrid Windows Hello for Business deployments can use Azure’s Multifactor Authentication service, or they can
use multifactor authentication provides by Windows Server 2016 Active Directory Federation Services, which
includes an adapter model that enables third parties to integrate their multifactor authentication into AD FS.
Section Review
Azure MFA Service
Windows Server 2016 AD FS and Azure
Windows Server 2016 AD FS and third party MFA Adapter
Device Registration
Organizations wanting to deploy hybrid certificate trust need their domain joined devices to register to Azure
Active Directory. Just as a computer has an identity in Active Directory, that same computer has an identity in
the cloud. This ensures that only approved computers are used with that Azure Active Directory. Each computer
registers its identity in Azure Active Directory.
Hybrid certificate trust deployments need the device write back feature. Authentication to the Windows Server
2016 Active Directory Federation Services needs both the user and the computer to authenticate. Typically the
users are synchronized, but not devices. This prevents AD FS from authenticating the computer and results in
Windows Hello for Business certificate enrollment failures. For this reason, Windows Hello for Business
deployments need device writeback, which is an Azure Active Directory premium feature.
NOTE
Windows Hello for Business is tied between a user and a device. Both the user and device need to be synchronized
between Azure Active Directory and Active Directory, and therefore the device writeback is used to update the msDS-
KeyCredentialLink on the computer object.
Provisioning
You need to allow access to the URL account.microsoft.com to initiate Windows Hello for Business provisioning.
This URL launches the subsequent steps in the provisioning process and is required to successfully complete
Windows Hello for Business provisioning. This URL does not require any authentication and as such, does not
collect any user data.
Section Checklist
Azure Active Directory Device writeback
Azure Active Directory Premium subscription
Next Steps
Follow the Windows Hello for Business hybrid certificate trust deployment guide. For proof-of-concepts, labs,
and new installations, choose the New Installation Baseline .
If your environment is already federated, but does not include Azure device registration, choose Configure
Azure Device Registration .
If your environment is already federated and supports Azure device registration, choose Configure Windows
Hello for Business settings .
Applies to
Windows 10, version 1703 or later
Hybrid deployment
Certificate trust
Windows Hello for Business involves configuring distributed technologies that may or may not exist in your
current infrastructure. Hybrid certificate trust deployments of Windows Hello for Business rely on these
technologies
Active Directory
Public Key Infrastructure
Azure Active Directory
Multifactor Authentication Services
New installations are considerably more involved than existing implementations because you are building the
entire infrastructure. Microsoft recommends you review the new installation baseline to validate your existing
environment has all the needed configurations to support your hybrid certificate trust Windows Hello for
Business deployment. If your environment meets these needs, you can read the Configure Azure Device
Registration section to prepare your Windows Hello for Business deployment by configuring Azure device
registration.
The new installation baseline begins with a basic Active Directory deployment and enterprise PKI. This document
expects you have Active Directory deployed using Windows Server 2008 R2 or later domain controllers.
Active Directory
Production environments should follow Active Directory best practices regarding the number and placement of
domain controllers to ensure adequate authentication throughout the organization.
Lab environments and isolated proof of concepts may want to limit the number of domain controllers. The
purpose of these environments is to experiment and learn. Reducing the number of domain controllers can
prevent troubleshooting issue, such as Active Directory replication, which is unrelated to activity's goal.
Section Review
Minimum Windows Server 2008 R2 domain controllers
Minimum Windows Server 2008 R2 domain and forest functional level
Functional networking, name resolution, and Active Directory replication
NOTE
Never install a certificate authority on a domain controller in a production environment.
3. Use the following command to configure the Certificate Authority using a basic certificate authority
configuration.
Install-AdcsCertificationAuthority
IMPORTANT
As long as your users have licenses that include Azure AD Multi-Factor Authentication, there's nothing that you need to
do to turn on Azure MFA. You can start requiring two-step verification on an individual user basis. The licenses that
enable Azure MFA are:
Azure AD Multi-Factor Authentication
Azure Active Directory Premium
Enterprise Mobility + Security
If you have one of these subscriptions or licenses, skip the Azure MFA Adapter section.
Applies to
Windows 10, version 1703 or later
Hybrid deployment
Certificate trust
Your environment is federated and you are ready to configure device registration for your hybrid environment.
Hybrid Windows Hello for Business deployment needs device registration and device write-back to enable
proper device authentication.
IMPORTANT
If your environment is not federated, review the New Installation baseline section of this deployment document to learn
how to federate your environment for your Windows Hello for Business deployment.
TIP
Refer to the Tutorial: Configure hybrid Azure Active Directory join for federated domains to learn more about setting up
Azure Active Directory Connect for a simplified join flow for Azure AD device registration.
NOTE
Before proceeding, you should familiarize yourself with device registration concepts such as:
Azure AD registered devices
Azure AD joined devices
Hybrid Azure AD joined devices
You can learn about this and more by reading Introduction to Device Management in Azure Active Directory.
IMPORTANT
To use hybrid identity with Azure Active Directory and device WriteBack features, you must use the built-in GUI with the
latest updates for ADConnect.
IMPORTANT
If you already have a Windows Server 2016 or later domain controller in your forest, you can skip Upgrading Active
Director y to the Windows Ser ver 2016 or later Schema (this section).
The command should return the name of the domain controller where you need to run adprep.exe. Update the
schema locally on the domain controller hosting the Schema master role.
Updating the Schema
Windows Hello for Business uses asymmetric keys as user credentials (rather than passwords). During
enrollment, the public key is registered in an attribute on the user object in Active Directory. The schema update
adds this new attribute to Active Directory.
Manually updating Active Directory uses the command-line utility adprep.exe located at
<drive>:\suppor t\adprep on the Windows Server 2016 or later DVD or ISO. Before running adprep.exe, you
must identify the domain controller hosting the schema master role.
Sign-in to the domain controller hosting the schema master operational role using enterprise administrator
equivalent credentials.
1. Open an elevated command prompt.
2. Type cd /d x:\support\adprep where x is the drive letter of the DVD or mounted ISO.
3. To update the schema, type adprep /forestprep .
4. Read the Adprep Warning. Type the letter C * and press Enter to update the schema.
5. Close the Command Prompt and sign-out.
NOTE
If you installed Azure AD Connect prior to upgrading the schema, you will need to re-run the Azure AD Connect
installation and refresh the on-premises AD schema to ensure the synchronization rule for msDS-KeyCredentialLink is
configured.
IMPORTANT
During your AD FS deployment, skip the Configure a federation ser ver with Device Registration Ser vice and the
Configure Corporate DNS for the Federation Ser vice and DRS procedures.
The AD FS farm used with Windows Hello for Business must be Windows Server 2016 with minimum update of
KB4088889 (14393.2155). If your AD FS farm is not running the AD FS role with updates from Windows Server
2016, then read Upgrading to AD FS in Windows Server 2016
ADFS Web Proxy
Federation server proxies are computers that run AD FS software that have been configured manually to act in
the proxy role. You can use federation server proxies in your organization to provide intermediary services
between an Internet client and a federation server that is behind a firewall on your corporate network. Use the
Setting of a Federation Proxy checklist to configure AD FS proxy servers in your environment.
Deploy Azure AD Connect
Next, you need to synchronize the on-premises Active Directory with Azure Active Directory. To do this, first
review the Integrating on-prem directories with Azure Active Directory and hardware and prerequisites needed
and then download the software.
When you are ready to install, follow the Configuring federation with AD FS section of Custom installation
of Azure AD Connect. Select the Federation with AD FS option on the User sign-in page. At the AD FS Farm
page, select the use an existing option and click Next .
Create AD objects for AD FS Device Authentication
If your AD FS farm is not already configured for Device Authentication (you can see this in the AD FS
Management console under Service -> Device Registration), use the following steps to create the correct AD DS
objects and configuration.
NOTE
The below commands require Active Directory administration tools, so if your federation server is not also a domain
controller, first install the tools using step 1 below. Otherwise you can skip step 1.
1. Run the Add Roles & Features wizard and select feature Remote Ser ver Administration Tools -> Role
Administration Tools -> AD DS and AD LDS Tools -> Choose both the Active Director y module for
Windows PowerShell and the AD DS Tools .
2. On your AD FS primary server, ensure you are logged in as AD DS user with enterprise administrator
privileges and open an elevated Windows PowerShell prompt. Then, run the following commands:
Import-module activedirectory
PS C:\> Initialize-ADDeviceRegistration -ServiceAccountName "<your service account>"
NOTE
If your AD FS service is configured to use a GMSA account, enter the account name in the format
"domain\accountname$"
Where the [AD connector account name] is the name of the account you configured in Azure AD Connect when
adding your on-premises AD DS directory.
The above commands enable Windows 10 clients to find the correct Azure AD domain to join by creating the
serviceConnectionpoint object in AD DS.
Prepare AD for Device Write Back
To ensure AD DS objects and containers are in the correct state for write back of devices from Azure AD, do the
following.
1. Open Windows PowerShell and execute the following:
PS C:>Initialize-ADSyncDeviceWriteBack -DomainName <AD DS domain name> -AdConnectorAccount [AD
connector account name]
Where the [AD connector account name] is the name of the account you configured in Azure AD Connect when
adding your on-premises AD DS directory in domain\accountname format
The above command creates the following objects for device write back to AD DS, if they do not exist already,
and allows access to the specified AD connector account name
RegisteredDevices container in the AD domain partition
Device Registration Service container and object under Configuration --> Services --> Device Registration
Configuration
Enable Device Write Back in Azure AD Connect
If you have not done so before, enable device write back in Azure AD Connect by running the wizard a second
time and selecting "Customize Synchronization Options" , then checking the box for device write back and
selecting the forest in which you have run the above cmdlets
WARNING
Both adfs/ser vices/trust/2005/windowstranspor t and adfs/ser vices/trust/13/windowstranspor t should be
enabled as intranet facing endpoints only and must NOT be exposed as extranet facing endpoints through the Web
Application Proxy. To learn more on how to disable WS-Trust Windows endpoints, see Disable WS-Trust Windows
endpoints on the proxy. You can see what endpoints are enabled through the AD FS management console under Ser vice
> Endpoints .
NOTE
If you don’t have AD FS as your on-premises federation service, follow the instructions from your vendor to make sure
they support WS-Trust 1.3 or 2005 endpoints and that these are published through the Metadata Exchange file (MEX).
The following claims must exist in the token received by Azure DRS for device registration to complete. Azure
DRS will create a device object in Azure AD with some of this information which is then used by Azure AD
Connect to associate the newly created device object with the computer account on-premises.
http://schemas.microsoft.com/ws/2012/01/accounttype
http://schemas.microsoft.com/identity/claims/onpremobjectguid
http://schemas.microsoft.com/ws/2008/06/identity/claims/primarysid
If you have more than one verified domain name, you need to provide the following claim for computers:
http://schemas.microsoft.com/ws/2008/06/identity/claims/issuerid
If you are already issuing an ImmutableID claim (e.g., alternate login ID) you need to provide one corresponding
claim for computers:
http://schemas.microsoft.com/LiveID/Federation/2008/05/ImmutableID
NOTE
If you don't use AD FS for your on-premises federation server, follow your vendor's instructions to create the appropriate
configuration to issue these claims.
Issue issuerID for computer when multiple verified domain names in Azure AD
http://schemas.microsoft.com/ws/2008/06/identity/claims/issuerid - This claim must contain the Uniform
Resource Identifier (URI) of any of the verified domain names that connect with the on-premises federation
service (AD FS or 3rd party) issuing the token. In AD FS, you can add issuance transform rules that look like the
ones below in that specific order after the ones above. Please note that one rule to explicitly issue the rule for
users is necessary. In the rules below, a first rule identifying user vs. computer authentication is added.
@RuleName = "Issue account type with the value User when it is not a computer"
NOT EXISTS(
[
Type == "http://schemas.microsoft.com/ws/2012/01/accounttype",
Value == "DJ"
]
)
=> add(
Type = "http://schemas.microsoft.com/ws/2012/01/accounttype",
Value = "User"
);
@RuleName = "Capture UPN when AccountType is User and issue the IssuerID"
c1:[
Type == "http://schemas.xmlsoap.org/claims/UPN"
]
&&
c2:[
Type == "http://schemas.microsoft.com/ws/2012/01/accounttype",
Value == "User"
]
=> issue(
Type = "http://schemas.microsoft.com/ws/2008/06/identity/claims/issuerid",
Value = regexreplace(
c1.Value,
".+@(?<domain>.+)",
"http://${domain}/adfs/services/trust/"
)
);
$multipleVerifiedDomainNames = $false
$immutableIDAlreadyIssuedforUsers = $false
$oneOfVerifiedDomainNames = 'example.com' # Replace example.com with one of your verified domains
$rule4 = ''
if ($multipleVerifiedDomainNames -eq $true) {
$rule4 = '@RuleName = "Issue account type with the value User when it is not a computer"
NOT EXISTS(
[
Type == "http://schemas.microsoft.com/ws/2012/01/accounttype",
Value == "DJ"
]
)
=> add(
Type = "http://schemas.microsoft.com/ws/2012/01/accounttype",
Value = "User"
);
@RuleName = "Capture UPN when AccountType is User and issue the IssuerID"
c1:[
Type == "http://schemas.xmlsoap.org/claims/UPN"
]
&&
c2:[
Type == "http://schemas.microsoft.com/ws/2012/01/accounttype",
Value == "User"
]
=> issue(
Type = "http://schemas.microsoft.com/ws/2008/06/identity/claims/issuerid",
Value = regexreplace(
c1.Value,
".+@(?<domain>.+)",
"http://${domain}/adfs/services/trust/"
)
);
$rule5 = ''
if ($immutableIDAlreadyIssuedforUsers -eq $true) {
$rule5 = '@RuleName = "Issue ImmutableID for computers"
c1:[
Type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/groupsid",
Value =~ "-515$",
Issuer =~ "^(AD AUTHORITY|SELF AUTHORITY|LOCAL AUTHORITY)$"
]
&&
c2:[
Type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname",
Issuer =~ "^(AD AUTHORITY|SELF AUTHORITY|LOCAL AUTHORITY)$"
]
=> issue(
store = "Active Directory",
types = ("http://schemas.microsoft.com/LiveID/Federation/2008/05/ImmutableID"),
query = ";objectguid;{0}",
param = c2.Value
);'
}
Remarks
This script appends the rules to the existing rules. Do not run the script twice because the set of rules
would be added twice. Make sure that no corresponding rules exist for these claims (under the
corresponding conditions) before running the script again.
If you have multiple verified domain names (as shown in the Azure AD portal or via the Get-
MsolDomains cmdlet), set the value of $multipleVerifiedDomainNames in the script to $true . Also
make sure that you remove any existing issuerid claim that might have been created by Azure AD
Connect or via other means. Here is an example for this rule:
c:[Type == "http://schemas.xmlsoap.org/claims/UPN"]
=> issue(Type = "http://schemas.microsoft.com/ws/2008/06/identity/claims/issuerid", Value =
regexreplace(c.Value, ".+@(?<domain>.+)", "http://${domain}/adfs/services/trust/"));
If you have already issued an ImmutableID claim for user accounts, set the value of
$immutableIDAlreadyIssuedforUsers in the script to $true .
Configure Device Authentication in AD FS
Using an elevated PowerShell command window, configure AD FS policy by executing the following command
PS C:>Set-AdfsGlobalAuthenticationPolicy -DeviceAuthenticationEnabled $true -DeviceAuthenticationMethod
SignedToken
Applies to
Windows 10, version 1703 or later
Hybrid deployment
Certificate trust
Your environment is federated and you are ready to configure your hybrid environment for Windows Hello for
business using the certificate trust model.
IMPORTANT
If your environment is not federated, review the New Installation baseline section of this deployment document to learn
how to federate your environment for your Windows Hello for Business deployment.
The configuration for Windows Hello for Business is grouped in four categories. These categories are:
Active Directory
Public Key Infrastructure
Active Directory Federation Services
Group Policy
For the most efficient deployment, configure these technologies in order beginning with the Active Directory
configuration
C O N F I G U R E A C T I V E D I R E C TO R Y
>
Applies to
Windows 10, version 1703 or later
Hybrid deployment
Certificate trust
Provisioning
The Windows Hello for Business provisioning begins immediately after the user has signed in, after the user
profile is loaded, but before the user receives their desktop. Windows only launches the provisioning experience
if all the prerequisite checks pass. You can determine the status of the prerequisite checks by viewing the User
Device Registration in the Event Viewer under Applications and Ser vices Logs\Microsoft\Windows .
The first thing to validate is the computer has processed device registration. You can view this from the User
device registration logs where the check Device is AAD joined (AADJ or DJ++): Yes appears. Additionally,
you can validate this using the dsregcmd /status command from a console prompt where the value for
AzureADJoined reads Yes .
Windows Hello for Business provisioning begins with a full screen page with the title Setup a PIN and button
with the same name. The user clicks Setup a PIN .
The provisioning flow proceeds to the Multi-Factor authentication portion of the enrollment. Provisioning
informs the user that it is actively attempting to contact the user through their configured form of MFA. The
provisioning process does not proceed until authentication succeeds, fails or times out. A failed or timeout MFA
results in an error and asks the user to retry.
After a successful MFA, the provisioning flow asks the user to create and validate a PIN. This PIN must observe
any PIN complexity requirements that you deployed to the environment.
The provisioning flow has all the information it needs to complete the Windows Hello for Business enrollment.
A successful single factor authentication (username and password at sign-in)
A device that has successfully completed device registration
A fresh, successful multi-factor authentication
A validated PIN that meets the PIN complexity requirements
The remainder of the provisioning includes Windows Hello for Business requesting an asymmetric key pair for
the user, preferably from the TPM (or required if explicitly set through policy). Once the key pair is acquired,
Windows communicates with Azure Active Directory to register the public key. AAD Connect synchronizes the
user's key to the on-premises Active Directory.
IMPORTANT
The following is the enrollment behavior prior to Windows Server 2016 update KB4088889 (14393.2155).
The minimum time needed to synchronize the user's public key from Azure Active Directory to the on-premises Active
Directory is 30 minutes. The Azure AD Connect scheduler controls the synchronization interval. This synchronization
latency delays the user's ability to authenticate and use on-premises resources until the user's public key
has synchronized to Active Director y. Once synchronized, the user can authenticate and use on-premises resources.
Read Azure AD Connect sync: Scheduler to view and adjust the synchronization cycle for your organization.
NOTE
Windows Server 2016 update KB4088889 (14393.2155) provides synchronous certificate enrollment during hybrid
certificate trust provisioning. With this update, users no longer need to wait for Azure AD Connect to sync their public key
on-premises. Users enroll their certificate during provisioning and can use the certificate for sign-in immediately after
completing the provisioning. The update needs to be installed on the federation servers.
After a successful key registration, Windows creates a certificate request using the same key pair to request a
certificate. Windows send the certificate request to the AD FS server for certificate enrollment.
The AD FS registration authority verifies the key used in the certificate request matches the key that was
previously registered. On a successful match, the AD FS registration authority signs the certificate request using
its enrollment agent certificate and sends it to the certificate authority.
NOTE
In order for AD FS to verify the key used in the certificate request, it needs to be able to access the
https://enterpriseregistration.windows.net endpoint.
The certificate authority validates the certificate was signed by the registration authority. On successful
validation of the signature, it issues a certificate based on the request and returns the certificate to the AD FS
registration authority. The registration authority returns the certificate to Windows where it then installs the
certificate in the current user’s certificate store. Once this process completes, the Windows Hello for Business
provisioning workflow informs the user that they can use their PIN to sign-in through the Windows Action
Center.
Applies to
Windows 10
Azure Active Directory joined
Hybrid deployment
Windows Hello for Business combined with Azure Active Directory joined devices makes it easy for users to
securely access cloud-based resources using a strong, two-factor credential. Some resources may remain on-
premises as enterprises transition resources to the cloud and Azure AD joined devices may need to access these
resources. With additional configurations to your current hybrid deployment, you can provide single sign-on to
your on-premises resources for Azure Active Directory joined devices using Windows Hello for Business, using a
key or a certificate.
Related topics
Windows Hello for Business
How Windows Hello for Business works
Manage Windows Hello for Business in your organization
Why a PIN is better than a password
Prepare people to use Windows Hello
Windows Hello errors during PIN creation
Event ID 300 - Windows Hello successfully created
Windows Hello biometrics in the enterprise
Configure Azure AD joined devices for On-premises
Single-Sign On using Windows Hello for Business
3/5/2021 • 18 minutes to read • Edit Online
Applies to
Windows 10
Azure Active Directory joined
Hybrid Deployment
Key trust model
Prerequisites
Before adding Azure Active Directory (Azure AD) joined devices to your existing hybrid deployment, you need to
verify the existing deployment can support Azure AD joined devices. Unlike hybrid Azure AD joined devices,
Azure AD joined devices do not have a relationship with your Active Directory domain. This factor changes the
way in which users authenticate to Active Directory. Validate the following configurations to ensure they support
Azure AD joined devices.
Azure Active Directory Connect synchronization
Device Registration
Certificate Revocation List (CRL) Distribution Point (CDP)
2016 Domain Controllers
Domain Controller certificate
Network infrastructure in place to reach your on-premises domain controller. If the machines are external,
this can be achieved using any VPN solution.
Azure Active Directory Connect synchronization
Azure AD join, as well as hybrid Azure AD join devices register the user's Windows Hello for Business credential
with Azure. To enable on-premises authentication, the credential must be synchronized to the on-premises
Active Directory, regardless whether you are using a key or a certificate. Ensure you have Azure AD Connect
installed and functioning properly. To learn more about Azure AD Connect, read Integrate your on-premises
directories with Azure Active Directory.
If you upgraded your Active Directory schema to the Windows Server 2016 schema after installing Azure AD
Connect, run Azure AD Connect and run Refresh director y schema from the list of tasks.
Azure Active Directory Device Registration
A fundamental prerequisite of all cloud and hybrid Windows Hello for Business deployments is device
registration. A user cannot provision Windows Hello for Business unless the device from which they are trying
to provision has registered with Azure Active Directory. For more information about device registration, read
Introduction to device management in Azure Active Directory.
You can use the dsregcmd.exe command to determine if your device is registered to Azure Active Directory.
The preceding domain controller certificate shows a CRL distribution path (CDP) using Active Directory. You can
determine this because the value in the URL begins with ldap . Using Active Directory for domain joined devices
provides a highly available CRL distribution point. However, Azure Active Directory joined devices and users on
Azure Active Directory joined devices cannot read data from Active Directory, and certificate validation does not
provide an opportunity to authenticate prior to reading the certificate revocation list. This becomes a circular
problem as the user is attempting to authenticate, but must read Active Directory to complete the
authentication, but the user cannot read Active Directory because they have not authenticated.
To resolve this issue, the CRL distribution point must be a location that is accessible by Azure Active Directory
joined devices that does not require authentication. The easiest solution is to publish the CRL distribution point
on a web server that uses HTTP (not HTTPS).
If your CRL distribution point does not list an HTTP distribution point, then you need to reconfigure the issuing
certificate authority to include an HTTP CRL distribution point, preferably first in the list of distribution points.
NOTE
If your CA has published both the Base and the Delta CRL, please make sure you have included publishing the Delta CRL
in the HTTP path. Include web server to fetch the Delta CRL by allowing double escaping in the (IIS) web server.
TIP
If you are using Windows Server 2008, Kerberos Authentication is not the default template, so make sure to use the
correct template when issuing or re-issuing the certificate.
IMPORTANT
Do not configure the IIS server hosting your CRL distribution point to use https or a server authentication certificate.
Clients should access the distribution point using http.
4. Select CDP under Default Web Site in the navigation pane. Double-click Director y Browsing in the
content pane. Click Enable in the details pane.
5. Select CDP under Default Web Site in the navigation pane. Double-click Configuration Editor .
6. In the Section list, navigate to system.webSer ver/security/requestFiltering .
In the list of named value-pairs in the content pane, configure allowDoubleEscaping to True . Click
Apply in the actions pane.
7. Close Internet Information Ser vices (IIS) Manager .
Create a DNS resource record for the CRL distribution point URL
1. On your DNS server or from an administrative workstation, open DNS Manager from Administrative
Tools .
2. Expand For ward Lookup Zones to show the DNS zone for your domain. Right-click your domain name in
the navigation pane and click New Host (A or AAAA)....
3. In the New Host dialog box, type crl in Name . Type the IP address of the web server you configured in IP
Address . Click Add Host . Click OK to close the DNS dialog box. Click Done .
TIP
Make sure that users can access \\Ser ver FQDN\sharename .
Disable Caching
1. On the web server, open Windows Explorer and navigate to the cdp folder you created in step 3 of
Configure the Web Server.
2. Right-click the cdp folder and click Proper ties . Click the Sharing tab. Click Advanced Sharing .
3. Click Caching . Select No files or programs from the shared folder are available offline .
4. Click OK .
Configure NTFS permission for the CDP folder
1. On the web server, open Windows Explorer and navigate to the cdp folder you created in step 3 of
Configure the Web Server.
2. Right-click the cdp folder and click Proper ties . Click the Security tab.
3. On the Security tab, click Edit.
4. In the Permissions for cdp dialog box, click Add .
5. In the Select Users, Computers, Ser vice Accounts, or Groups dialog box, click Object Types . In the
Object Types dialog box, select Computers . Click OK .
6. In the Select Users, Computers, Ser vice Accounts, or Groups dialog box, in Enter the object names
to select , type the name of the certificate authority, and then click Check Names . Click OK .
7. In the Permissions for cdp dialog box, select the name of the certificate authority from the Group or user
names list. In the Permissions for section, select Allow for Full control . Click OK .
8. Click Close in the cdp Proper ties dialog box.
Configure the new CRL distribution point and Publishing location in the issuing certificate authority
The web server is ready to host the CRL distribution point. Now, configure the issuing certificate authority to
publish the CRL at the new location and to include the new CRL distribution point
Configure the CRL distribution Point
1. On the issuing certificate authority, sign-in as a local administrator. Start the Cer tificate Authority console
from Administrative Tools .
2. In the navigation pane, right-click the name of the certificate authority and click Proper ties
3. Click Extensions . On the Extensions tab, select CRL Distribution Point (CDP) from the Select
extension list.
4. On the Extensions tab, click Add . Type http://crl.[domainname]/cdp/ in location . For example,
http://crl.corp.contoso.com/cdp/ or http://crl.contoso.com/cdp/ (do not forget the trailing forward slash).
5. Select <CaName> from the Variable list and click Inser t . Select <CRLNameSuffix> from the Variable
list and click Inser t . Select <DeltaCRL Allowed> from the Variable list and click Inser t .
6. Type .crl at the end of the text in Location . Click OK .
4. Right-click the selected certificate. Hover over All Tasks and then select Renew Cer tificate with New
Key.... In the Cer tificate Enrollment wizard, click Next .
5. In the Request Cer tificates page of the wizard, verify the selected certificate has the correct certificate
template and ensure the status is available. Click Enroll .
6. After the enrollment completes, click Finish to close the wizard.
7. Repeat this procedure on all your domain controllers.
NOTE
You can configure domain controllers to automatically enroll and renew their certificates. Automatic certificate enrollment
helps prevent authentication outages due to expired certificates. Refer to the Windows Hello Deployment Guides to learn
how to deploy automatic certificate enrollment for domain controllers.
IMPORTANT
If you are not using automatic certificate enrollment, create a calendar reminder to alert you two months before the
certificate expiration date. Send the reminder to multiple people in the organization to ensure more than one or two
people know when these certificates expire.
5. In the Enterprise Root Cer tificate blade, click Assignments . In the Include tab, select All Devices from
the Assign to list. Click Save .
6. Select Enabled from the Configure Windows Hello for Business list.
7. Select Required next to Use a Trusted Platform Module (TPM) . By default, Windows Hello for
Business prefers TPM 2.0 or falls backs to software. Choosing Required forces Windows Hello for
Business to only use TPM 2.0 or TPM 1.2 and does not allow fall back to software-based keys.
8. Enter the desired Minimum PIN length and Maximum PIN length .
IMPORTANT
The default minimum PIN length for Windows Hello for Business on Windows 10 is six. Microsoft Intune defaults
the minimum PIN length to four, which reduces the security of the user's PIN. If you do not have a desired PIN
length, set the minimum PIN length to six.
NOTE
The Windows Hello for Business PIN is not a symmetric key (a password). A copy of the current PIN is not stored
locally or on a server like in the case of passwords. Making the PIN as complex and changed frequently as a
password increases the likelihood of forgotten PINs. Additionally, enabling PIN history is the only scenario that
requires Windows 10 to store older PIN combinations (protected to the current PIN). Windows Hello for Business
combined with a TPM provides anti-hammering functionality that prevents brute force attacks of the user's PIN. If
you are concerned with user-to-user shoulder surfacing, rather that forcing complex PIN that change frequently,
consider using the Multifactor Unlock feature.
10. Select Yes next to Allow biometric authentication if you want to allow users to use biometrics
(fingerprint and/or facial recognition) to unlock the device. To further secure the use of biometrics, select
Yes to Use enhanced anti-spoofing, when available .
11. Select No to Allow phone sign-in . This feature has been deprecated.
12. Choose Save .
13. Sign out of the Microsoft Endpoint Manager admin center.
IMPORTANT
For more details about the actual experience after everything has been configured, please see Windows Hello for Business
and Authentication.
Section Review
Configure Internet Information Services to host CRL distribution point
Prepare a file share to host the certificate revocation list
Configure the new CRL distribution point in the issuing certificate authority
Publish CRL
Reissue domain controller certificates
Export Enterprise Root certificate
Create and Assign a Trust Certificate Device Configuration Profile
Configure Windows Hello for Business Device Enrollment
If you plan on using certificates for on-premises single-sign on, perform the additional steps in Using
Certificates for On-premises Single-sign On.
Using Certificates for AADJ On-premises Single-
sign On
3/5/2021 • 36 minutes to read • Edit Online
Applies to:
Windows 10
Azure Active Directory joined
Hybrid Deployment
Certificate trust
If you plan to use certificates for on-premises single-sign on, then follow these additional steps to configure
the environment to enroll Windows Hello for Business certificates for Azure AD joined devices.
IMPORTANT
Ensure you have performed the configurations in Azure AD joined devices for On-premises Single-Sign On before you
continue.
Requirements
You need to install and configure additional infrastructure to provide Azure AD joined devices with on-premises
single-sign on.
An existing Windows Server 2012 R2 or later Enterprise Certificate Authority
A Windows Server 2012 R2 domain joined server that hosts the Network Device Enrollment Services role
High Availaibilty
The Network Device Enrollment Services (NDES) server role acts as a certificate registration authority.
Certificate registration servers enroll certificates on behalf of the user. Users request certificates from the NDES
service rather than directly from the issuing certificate authority.
The architecture of the NDES server prevents it from being clustered or load balanced for high availability. To
provide high availability, you need to install more than one identically configured NDES servers and use
Microsoft Intune to load balance then (in round-robin fashion).
The Network Device Enrollment Service (NDES) server role can issue up to three unique certificate templates.
The server role accomplishes this by mapping the purpose of the certificate request to a configured certificate
template. The certificate request purpose has three options:
Signature
Encryption
Signature and Encryption
If you need to deploy more than three types of certificates to the Azure AD joined device, you need additional
NDES servers. Alternatively, consider consolidating certificate templates to reduce the number of certificate
templates.
Network Requirements
All communication occurs securely over port 443.
NOTE
For high-availability, you should have more than one NDES server to service Windows Hello for Business certificate
requests. You should add additional Windows Hello for Business NDES servers to this group to ensure they receive the
proper configuration.
IMPORTANT
Configuring the service's account password to Password never expires may be more convenient, but it presents a
security risk. Normal service account passwords should expire in accordance with the organizations user password
expiration policy. Create a reminder to change the service account's password two weeks before it will expire. Share the
reminder with others that are allowed to change the password to ensure the password is changed before it expires.
IMPORTANT
Linking the NDES Ser vice User Rights Group Policy object to the domain ensures the Group Policy object is in scope
for all computers. However, not all computers will have the policy settings applied to them. Only computers that are
members of the NDES Ser vers global security group receive the policy settings. All others computers ignore the Group
Policy object.
Sign-in to the issuing certificate authority with access equivalent to local administrator.
1. Open an elevated command prompt and type the following command:
NOTE
If you use different template names, you'll need to remember and substitute these names in different portions of
the lab.
NOTE
If you use different template names, you'll need to remember and substitute these names in different portions of
the deployment.
6. On the Cr yptography tab, select Key Storage Provider from the Provider Categor y list. Select RSA
from the Algorithm name list. Type 2048 in the Minimum key size text box. Select SHA256 from the
Request hash list.
7. On the Extensions tab, verify the Application Policies extension includes Smar t Card Logon .
8. On the Subject tab, select Supply in the request .
9. On the Request Handling tab, select Signature and encr yption from the Purpose list. Select the
Renew with same key check box. Select Enroll subject without requiring any user input .
10. On the Security tab, click Add . Type NDESSvc in the Enter the object names to select text box and
click OK .
11. Select NDESSvc from the Group or users names list. In the Permissions for NDES Ser vers section,
select the Allow check box for Read and Enroll . Clear the Allow check box for the Enroll and
Autoenroll permissions for all other entries in the Group or users names section if the check boxes
are not already cleared. Click OK .
12. Close the console.
Publish certificate templates
The certificate authority may only issue certificates for certificate templates that are published to that certificate
authority. If you have more than one certificate authority and you want that certificate authority to issue
certificates based on a specific certificate template, then you must publish the certificate template to all
certificate authorities that are expected to issue the certificate.
IMPORTANT
Ensure you publish the AADJ WHFB Authentication certificate templates to the certificate authority that Microsoft
Intune uses by way of the NDES servers. The NDES configuration asks you to choose a certificate authority from which it
requests certificates. You need to publish that certificate templates to that issuing certificate authority. The NDES-Intune
Authentication certificate is directly enrolled and can be published to any certificate authority.
Sign-in to the certificate authority or management workstations with an Enterprise Admin equivalent
credentials.
1. Open the Cer tificate Authority management console.
2. Expand the parent node from the navigation pane.
3. Click Cer tificate Templates in the navigation pane.
4. Right-click the Cer tificate Templates node. Click New , and click Cer tificate Template to issue.
5. In the Enable Cer tificates Templates window, select the NDES-Intune Authentication and AADJ
WHFB Authentication templates you created in the previous steps. Click OK to publish the selected
certificate templates to the certificate authority.
6. Close the console.
Click Add Features on the Add Roles and Feature Wizard dialog box. Click Next .
5. On the Features page, expand .NET Framework 3.5 Features . Select HTTP Activation . Click Add
Features on the Add Roles and Feature Wizard dialog box. Expand .NET Framework 4.5 Features .
Expand WCF Ser vices . Select HTTP Activation . Click Add Features on the Add Roles and Feature
Wizard dialog box. Click Next .
6. On the Select role ser vices page, clear the Cer tificate Authority check box. Select the Network Device
Enrollment Ser vice . Click Add Features on the Add Roles and Features Wizard dialog box. Click Next .
9. Click Install . When the installation completes, continue with the next procedure. Do not click Close .
IMPORTANT
.NET Framework 3.5 is not included in the typical installation. If the server is connected to the Internet, the
installation attempts to get the files using Windows Update. If the server is not connected to the Internet, you
need to Specify an alternate source path such as <driveLetter>:\Sources\SxS
Configure the NDES service account
This task adds the NDES service account to the local IIS_USRS group. The task also configures the NDES service
account for Kerberos authentication and delegation
Add the NDES service account to the IIS_USRS group
Sign-in the NDES server with access equivalent to local administrator.
1. Start the Local Users and Groups management console ( lusrmgr.msc ).
2. Select Groups from the navigation pane. Double-click the IIS_IUSRS group.
3. In the IIS_IUSRS Proper ties dialog box, click Add . Type NDESSvc or the name of your NDES service
account. Click Check Names to verify the name and then click OK . Click OK to close the properties dialog
box.
4. Close the management console.
Register a Service Principal Name on the NDES Service account
Sign-in the NDES server with access equivalent to Domain Admins.
1. Open an elevated command prompt.
2. Type the following command to register the service principal name
where [FqdnOfNdesSer ver] is the fully qualified domain name of the NDES server and
[DomainName\NdesSer viceAccount] is the domain name and NDES service account name separated by
a backslash (\). An example of the command looks like the following:
NOTE
If you use the same service account for multiple NDES Servers, repeat the following task for each NDES server under
which the NDES service runs.
1. Click the Configure Active Director y Cer tificate Ser vices on the destination ser ver link.
2. On the Credentials page, click Next .
3. On the Role Ser vices page, select Network Device Enrollment Ser vice and then click Next
4. On the Ser vice Account for NDES page, select Specify ser vice account (recommended) . Click
Select.... Type the user name and password for the NDES service account in the Windows Security dialog
box. Click Next .
5. On the CA for NDES page, select CA name . Click Select.... Select the issuing certificate authority from
which the NDES server requests certificates. Click Next .
Ideally, you should match the certificate request with the registry value name to keep the configuration intuitive
(encryption certificates use the encryption template, signature certificates use the signature template, etc.). A
result of this intuitive design is the potential exponential growth in the NDES server. Imagine an organization
that needs to issue nine unique signature certificates across their enterprise.
If the need arises, you can configure a signature certificate in the encryption registry value name or an
encryption certificate in the signature registry value to maximize the use of your NDES infrastructure. This
unintuitive design requires current and accurate documentation of the configuration to ensure the SCEP
certificate profile is configured to enroll the correct certificate, regardless of the actual purpose. Each
organization needs to balance ease of configuration and administration with additional NDES infrastructure and
the management overhead that comes with it.
Sign-in to the NDES Server with local administrator equivalent credentials.
1. Open an elevated command prompt.
2. Using the table above, decide which registry value name you will use to request Windows Hello for Business
authentication certificates for Azure AD joined devices.
3. Type the following command:
where registr yValueName is one of the three value names from the above table and where
cer tificateTemplateName is the name of the certificate template you created for Windows Hello for
Business Azure AD joined devices. Example:
4. Type Y when the command asks for permission to overwrite the existing value.
5. Close the command prompt.
IMPORTANT
Use the name of the certificate template; not the display name . The certificate template name does not include spaces.
You can view the certificate names by looking at the General tab of the certificate template's properties in the
Cer tificates Templates management console ( certtmpl.msc ).
5. Sign-in the computer that will run the connector with access equivalent to a domain user.
IMPORTANT
Install a minimum of two Azure Active Directory Proxy connectors for each NDES Application Proxy. Strategically
locate Azure AD application proxy connectors throughout your organization to ensure maximum availability.
Remember, devices running the connector must be able to communicate with Azure and the on-premises NDES
servers.
6. Start AADApplicationProxyConnectorInstaller.exe .
7. Read the license terms and then select I agree to the license terms and conditions . Click Install .
8. Sign-in to Microsoft Azure with access equivalent to Global Administrator .
9. When the installation completes. Read the information regarding outbound proxy servers. Click Close .
10. Repeat steps 5 - 10 for each device that will run the Azure AD Application Proxy connector for Windows
Hello for Business certificate deployments.
Create a Connector Group
Sign-in a workstation with access equivalent to a domain user.
1. Sign-in to the Azure Portal with access equivalent to Global Administrator .
2. Select All Ser vices . Type Azure Active Director y to filter the list of services. Under SERVICES , Click
Azure Active Director y .
3. Under MANAGE , click Application proxy .
4. Click New Connector Group . Under Name , type NDES WHFB Connectors .
5. Select each connector agent in the Connectors list that will service Windows Hello for Business certificate
enrollment requests.
6. Click Save .
Create the Azure Application Proxy
Sign-in a workstation with access equivalent to a domain user.
1. Sign-in to the Azure Portal with access equivalent to Global Administrator .
2. Select All Ser vices . Type Azure Active Director y to filter the list of services. Under SERVICES , Click
Azure Active Director y .
3. Under MANAGE , click Application proxy .
4. Click Configure an app .
5. Under Basic Settings next to Name , type WHFB NDES 01 . Choose a name that correlates this Azure
AD Application Proxy setting with the on-premises NDES server. Each NDES server must have its own
Azure AD Application Proxy as two NDES servers cannot share the same internal URL.
6. Next to Internal URL , type the internal, fully qualified DNS name of the NDES server associated with this
Azure AD Application Proxy. For example, https://ndes.corp.mstepdemo.net). You need to match the
primary host name (AD Computer Account name) of the NDES server, and prefix the URL with https .
7. Under Internal URL , select https:// from the first list. In the text box next to https:// , type the hostname
you want to use as your external hostname for the Azure AD Application Proxy. In the list next to the
hostname you typed, select a DNS suffix you want to use externally for the Azure AD Application Proxy. It
is recommended to use the default, -[tenantName].msapproxy.net where [tenantName] is your current
Azure Active Directory tenant name (-mstephendemo.msappproxy.net).
8. Select Passthrough from the Pre Authentication list.
9. Select NDES WHFB Connectors from the Connector Group list.
10. Under Additional Settings , select Default from Backend Application Timeout . Under the Translate
URLs In section, select Yes next to Headers and select No next to Application Body .
11. Click Add .
12. Sign-out of the Azure Portal.
IMPORTANT
Write down the internal and external URLs. You will need this information when you enroll the NDES-Intune
Authentication certificate.
4. Select https from Type . Confirm the value for Por t is 443 .
5. Select the certificate you previously enrolled from the SSL cer tificate list. Select OK .
6. Select http from the Site Bindings list. Click Remove .
7. Click Close on the Site Bindings dialog box.
8. Close Internet Information Ser vices (IIS) Manager .
Verify the configuration
This task confirms the TLS configuration for the NDES server.
Sign-in the NDES server with access equivalent to local administrator.
Disable Internet Explorer Enhanced Security Configuration
1. Open Ser ver Manager . Click Local Ser ver from the navigation pane.
2. Click On next to IE Enhanced Security Configuration in the Proper ties section.
3. In the Internet Explorer Enhanced Security Configuration dialog, under Administrators , select Off .
Click OK .
4. Close Ser ver Manager .
Test the NDES web server
1. Open Internet Explorer .
2. In the navigation bar, type
https://[fqdnHostName]/certsrv/mscep/mscep.dll
where [fqdnHostName] is the fully qualified internal DNS host name of the NDES server.
A web page similar to the following should appear in your web browser. If you do not see a similar page, or you
get a 503 Ser vice unavailable message, ensure the NDES Service account has the proper user rights. You can
also review the application event log for events with the NetworkDeviceEnrollmentSerice source.
Confirm the web site uses the server authentication certificate.
NOTE
The Client cer tificate for Microsoft Intune page does not update after selecting the client authentication
certificate. However, the application rembers the selection and shows it in the next page.
8. On the Client cer tificate for the NDES Policy Module page, verify the certificate information and
then click Next .
9. ON the Ready to install Microsoft Intune Connector page. Click Install .
NOTE
You can review the results of the install using the SetupMsi.log file located in the
C:\NDESConnectorSetupMsi folder.
10. When the installation completes, select Launch Intune Connector and click Finish. Proceed to the
Configure the Intune Certificate Connector task.
Configure the Intune Certificate Connector
Sign-in the NDES server with access equivalent to domain administrator.
1. The NDES Connector user interface should be open from the last task.
NOTE
If the NDES Connector user interface is not open, you can start it from
<install_Path>\NDESConnectorUI\NDESConnectorUI.exe .
2. If your organization uses a proxy server and the proxy is needed for the NDES server to access the
Internet, select Use proxy ser ver , and then enter the proxy server name, port, and credentials to
connect. Click Apply
3. Click Sign-in . Type credentials for your Intune administrator, or tenant administrator that has the Global
Administrator directory role.
IMPORTANT
The user account must have a valid Intune license assigned. If the user account does not have a valid Intune
license, the sign-in fails.
4. Optionally, you can configure the NDES Connector for certificate revocation. If you want to do this,
continue to the next task. Otherwise, Click Close , restart the Intune Connector Ser vice and the World
Wide Web Publishing Ser vice , and skip the next task.
Configure the NDES Connector for certificate revocation (Optional)
Optionally (not required), you can configure the Intune connector for certificate revocation when a device is
wiped, unenrolled, or when the certificate profile falls out of scope for the targeted user (users is removed,
deleted, or the profile is deleted).
Enabling the NDES Service account for revocation
Sign-in the certificate authority used by the NDES Connector with access equivalent to domain administrator.
1. Start the Cer tification Authority management console.
2. In the navigation pane, right-click the name of the certificate authority and select Proper ties .
3. Click the Security tab. Click Add . In Enter the object names to select box, type NDESSvc (or the name
you gave the NDES Service account). Click Check Names. Click OK . Select the NDES Service account from the
Group or user names list. Select Allow for the Issue and Manage Cer tificates permission. Click OK .
https://[fqdnHostName]/certsrv/mscep/mscep.dll
where [fqdnHostName] is the fully qualified internal DNS host name of the NDES server. A web page
showing a 403 error (similar to the following) should appear in your web browser. If you do not see a similar
page, or you get a 503 Ser vice unavailable message, ensure the NDES Service account has the proper
user rights. You can also review the application event log for events with the
NetworkDeviceEnrollmentSerice source.
6. Using Ser ver Manager , enable Internet Explorer Enhanced Security Configuration .
IMPORTANT
Remember that you need to configure your certificate authority to allow Microsoft Intune to configure certificate
validity.
10. Select Enroll to Windows Hello for Business, other wise fail (Windows 10 and later) from the
Key storage provider (KSP) list.
11. Next to Subject name format , type CN={{OnPrem_Distinguished_Name}} to make the on-
premises distinguished name the subject of the issued certificate.
12. Specify User Principal Name (UPN) as a Subject Alternative Name parameter. Set its value as
{{UserPrincipalName}}.
13. Refer to the "Configure Certificate Templates on NDES" task for how you configured the AADJ WHFB
Authentication certificate template in the registry. Select the appropriate combination of key usages
from the Key Usages list that map to the configured NDES template in the registry. In this example, the
AADJ WHFB Authentication certificate template was added to the SignatureTemplate registry value
name. The Key usage that maps to that registry value name is Digital Signature .
14. Select a previously configured Trusted cer tificate profile that matches the root certificate of the issuing
certificate authority as a root certificate for the profile.
15. Under Extended key usage , type Smar t Card Logon under Name . Type 1.3.6.1.4.1.311.20.2.2
under Object identifier . Click Add .
16. Type a percentage (without the percent sign) next to Renewal Threshold to determine when the
certificate should attempt to renew. The recommended value is 20 .
17. Under SCEP Ser ver URLs , type the fully qualified external name of the Azure AD Application proxy you
configured. Append to the name /cer tsr v/mscep/mscep.dll . For example, https://ndes-
mtephendemo.msappproxy.net/certsrv/mscep/mscep.dll. Click Add . Repeat this step for each additional
NDES Azure AD Application Proxy you configured to issue Windows Hello for Business certificates.
Microsoft Intune round-robin load balances requests among the URLs listed in the SCEP certificate
profile.
18. Click Next .
19. Click Next several times to skip the Scope tags , Assignments , and Applicability Rules steps of the
wizard and click Create .
Assign Group to the WHFB Certificate Enrollment Certificate Profile
Sign-in a workstation with access equivalent to a domain user.
1. Sign-in to the Microsoft Endpoint Manager admin center.
2. Select Devices , and then click Configuration Profiles .
3. Click WHFB Cer tificate Enrollment .
4. Select Proper ties , and then click Edit next to the Assignments section.
5. In the Assignments pane, select Selected Groups from the Assign to list. Click Select groups to
include .
6. Select the AADJ WHFB Cer tificate Users group. Click Select .
7. Click Review + Save , and then Save .
You have successfully completed the configuration. Add users that need to enroll a Windows Hello for Business
authentication certificate to the AADJ WHFB Cer tificate Users group. This group, combined with the device
enrollment Windows Hello for Business configuration prompts the user to enroll for Windows Hello for
Business and enroll a certificate that can be used to authentication to on-premises resources.
Section Review
Requirements
Prepare Azure AD Connect
Prepare the Network Device Enrollment Services (NDES) Service Account
Prepare Active Directory Certificate Authority
Install and Configure the NDES Role
Configure Network Device Enrollment Services to work with Microsoft Intune
Download, Install, and Configure the Intune Certificate Connector
Create and Assign a Simple Certificate Enrollment Protocol (SCEP Certificate Profile)
On Premises Key Trust Deployment
12/26/2019 • 2 minutes to read • Edit Online
Applies to
Windows 10, version 1703 or later
On-premises deployment
Key trust
Windows Hello for Business replaces username and password sign-in to Windows with strong user
authentication based on asymmetric key pair. The following deployment guide provides the information needed
to successfully deploy Windows Hello for Business in an existing environment.
Below, you can find all the information you need to deploy Windows Hello for Business in a key trust model in
your on-premises environment:
1. Validate Active Directory prerequisites
2. Validate and Configure Public Key Infrastructure
3. Prepare and Deploy Windows Server 2016 Active Directory Federation Services
4. Validate and Deploy Multifactor Authentication Services (MFA)
5. Configure Windows Hello for Business Policy settings
Validate Active Directory prerequisites
3/5/2021 • 2 minutes to read • Edit Online
Applies to
Windows 10, version 1703 or later
On-premises deployment
Key trust
Key trust deployments need an adequate number of 2016 or later domain controllers to ensure successful user
authentication with Windows Hello for Business. To learn more about domain controller planning for key trust
deployments, read the Windows Hello for Business planning guide, the Planning an adequate number of
Windows Server 2016 or later Domain Controllers for Windows Hello for Business deployments section.
NOTE
There was an issue with key trust authentication on Windows Server 2019. If you are planning to use Windows Server
2019 domain controllers refer to KB4487044 to fix this issue.
The key registration process for the On-premises deployment of Windows Hello for Business needs the
Windows Server 2016 Active Directory or later schema. The key-trust model receives the schema extension
when the first Windows Server 2016 domain controller is added to the forest. The minimum required domain
functional and forest functional levels for Windows Hello for Business deployment is Windows Server 2008 R2.
Create the Windows Hello for Business Users Security Global Group
The Windows Hello for Business Users group is used to make it easy to deploy Windows Hello for Business in
phases. You assign Group Policy permissions to this group to simplify the deployment by simply adding the
users to the group. This provides users with the proper permissions to provision Windows Hello for Business.
Sign-in a domain controller or management workstation with Domain Admin equivalent credentials.
1. Open Active Director y Users and Computers .
2. Click View and click Advanced Features .
3. Expand the domain node from the navigation pane.
4. Right-click the Users container. Click New . Click Group .
5. Type Windows Hello for Business Users in the Group Name text box.
6. Click OK .
Applies to
Windows 10, version 1703 or later
On-premises deployment
Key trust
Windows Hello for Business must have a public key infrastructure regardless of the deployment or trust model.
All trust models depend on the domain controllers having a certificate. The certificate serves as a root of trust
for clients to ensure they are not communicating with a rogue domain controller.
NOTE
Never install a certificate authority on a domain controller in a production environment.
3. Use the following command to configure the Certificate Authority using a basic certificate authority
configuration.
Install-AdcsCertificationAuthority
NOTE
If you use different template names, you’ll need to remember and substitute these names in different portions of
the lab.
6. On the Subject Name tab, select the Build from this Active Director y information button if it is not
already selected. Select None from the Subject name format list. Select DNS name from the Include
this information in alternate subject list. Clear all other items.
7. On the Cr yptography tab, select Key Storage Provider from the Provider Categor y list. Select RSA
from the Algorithm name list. Type 2048 in the Minimum key size text box. Select SHA256 from the
Request hash list. Click OK .
8. Close the console.
Superseding the existing Domain Controller certificate
Many domain controllers may have an existing domain controller certificate. The Active Directory Certificate
Services provides a default certificate template from domain controllers—the domain controller certificate
template. Later releases provided a new certificate template—the domain controller authentication certificate
template. These certificate templates were provided prior to update of the Kerberos specification that stated Key
Distribution Centers (KDCs) performing certificate authentication needed to include the KDC Authentication
extension.
The Kerberos Authentication certificate template is the most current certificate template designated for domain
controllers and should be the one you deploy to all your domain controllers (2008 or later). The autoenrollment
feature in Windows enables you to effortlessly replace these domain controller certificates. You can use the
following configuration to replace older domain controller certificates with a new certificate using the Kerberos
Authentication certificate template.
Sign-in to a certificate authority or management workstations with Enterprise Admin equivalent credentials.
1. Open the Cer tificate Authority management console.
2. Right-click Cer tificate Templates and click Manage .
3. In the Cer tificate Template Console , right-click the Domain Controller Authentication (Kerberos)
(or the name of the certificate template you created in the previous section) template in the details pane
and click Proper ties .
4. Click the Superseded Templates tab. Click Add .
5. From the Add Superseded Template dialog, select the Domain Controller certificate template and
click OK . Click Add .
6. From the Add Superseded Template dialog, select the Domain Controller Authentication
certificate template and click OK .
7. From the Add Superseded Template dialog , select the Kerberos Authentication certificate template
and click OK .
8. Add any other enterprise certificate templates that were previously configured for domain controllers to
the Superseded Templates tab.
9. Click OK and close the Cer tificate Templates console.
The certificate template is configured to supersede all the certificate templates provided in the certificate
templates superseded templates list. However, the certificate template and the superseding of certificate
templates is not active until you publish the certificate template to one or more certificate authorities.
Configure an Internal Web Server Certificate template
Windows 10 clients use the https protocol when communicating with Active Directory Federation Services. To
meet this need, you must issue a server authentication certificate to all the nodes in the Active Directory
Federation Services farm. On-premises deployments can use a server authentication certificate issued by their
enterprise PKI. You must configure a server authentication certificate template so the host running the Active
Directory Federation Service can request the certificate.
Sign-in to a certificate authority or management workstations with Domain Admin equivalent credentials.
1. Open the Cer tificate Authority management console.
2. Right-click Cer tificate Templates and click Manage .
3. In the Cer tificate Template Console , right-click the Web Ser ver template in the details pane and click
Duplicate Template .
4. On the Compatibility tab, clear the Show resulting changes check box. Select Windows Ser ver
2012 or Windows Ser ver 2012 R2 from the Cer tification Authority list. Select Windows Ser ver
2012 or Windows Ser ver 2012 R2 from the Cer tification Recipient list.
5. On the General tab, type Internal Web Ser ver in Template display name . Adjust the validity and
renewal period to meet your enterprise’s needs.
NOTE
If you use different template names, you’ll need to remember and substitute these names in different portions of
the lab.
6. On the Request Handling tab, select Allow private key to be expor ted .
7. On the Subject tab, select the Supply in the request button if it is not already selected.
8. On the Security tab, Click Add . Type Domain Computers in the Enter the object names to select
box. Click OK . Select the Allow check box next to the Enroll permission.
9. On the Cr yptography tab, select Key Storage Provider from the Provider Categor y list. Select RSA
from the Algorithm name list. Type 2048 in the Minimum key size text box. Select SHA256 from the
Request hash list. Click OK .
10. Close the console.
Unpublish Superseded Certificate Templates
The certificate authority only issues certificates based on published certificate templates. For defense in depth
security, it is a good practice to unpublish certificate templates that the certificate authority is not configured to
issue. This includes the pre-published certificate template from the role installation and any superseded
certificate templates.
The newly created domain controller authentication certificate template supersedes previous domain controller
certificate templates. Therefore, you need to unpublish these certificate templates from all issuing certificate
authorities.
Sign-in to the certificate authority or management workstation with Enterprise Admin equivalent credentials.
1. Open the Cer tificate Authority management console.
2. Expand the parent node from the navigation pane.
3. Click Cer tificate Templates in the navigation pane.
4. Right-click the Domain Controller certificate template in the content pane and select Delete . Click Yes
on the Disable cer tificate templates window.
5. Repeat step 4 for the Domain Controller Authentication and Kerberos Authentication certificate
templates.
Publish Certificate Templates to the Certificate Authority
The certificate authority may only issue certificates for certificate templates that are published to that certificate
authority. If you have more than one certificate authority and you want that certificate authority to issue
certificates based on a specific certificate template, then you must publish the certificate template to all
certificate authorities that are expected to issue the certificate.
Sign-in to the certificate authority or management workstations with an Enterprise Admin equivalent
credentials.
1. Open the Cer tificate Authority management console.
2. Expand the parent node from the navigation pane.
3. Click Cer tificate Templates in the navigation pane.
4. Right-click the Cer tificate Templates node. Click New , and click Cer tificate Template to issue.
5. In the Enable Cer tificates Templates window, select the Domain Controller Authentication
(Kerberos) , and Internal Web Ser ver templates you created in the previous steps. Click OK to publish
the selected certificate templates to the certificate authority.
6. If you published the Domain Controller Authentication (Kerberos) certificate template, then you should
unpublish the certificate templates you included in the superseded templates list.
* To unpublish a certificate template, right-click the certificate template you want to unpublish in the
details pane of the Certificate Authority console and select Delete . Click Yes to confirm the operation.
7. Close the console.
Configure Domain Controllers for Automatic Certificate Enrollment
Domain controllers automatically request a certificate from the domain controller certificate template. However,
the domain controller is unaware of newer certificate templates or superseded configurations on certificate
templates. To continue automatic enrollment and renewal of domain controller certificates that understand
newer certificate template and superseded certificate template configurations, create and configure a Group
Policy object for automatic certificate enrollment and link the Group Policy object to the Domain Controllers OU.
1. Start the Group Policy Management Console (gpmc.msc)
2. Expand the domain and select the Group Policy Object node in the navigation pane.
3. Right-click Group Policy object and select New
4. Type Domain Controller Auto Certificate Enrollment in the name box and click OK .
5. Right-click the Domain Controller Auto Cer tificate Enrollment Group Policy object and click Edit .
6. In the navigation pane, expand Policies under Computer Configuration .
7. Expand Windows Settings , Security Settings , and click Public Key Policies .
8. In the details pane, right-click Cer tificate Ser vices Client – Auto-Enrollment and select Proper ties .
9. Select Enabled from the Configuration Model list.
10. Select the Renew expired cer tificates, update pending cer tificates, and remove revoked
cer tificates check box.
11. Select the Update cer tificates that use cer tificate templates check box.
12. Click OK . Close the Group Policy Management Editor .
Deploy the Domain Controller Auto Certificate Enrollment Group Policy Object
Sign-in to a domain controller or management workstations with Domain Admin equivalent credentials.
1. Start the Group Policy Management Console (gpmc.msc).
2. In the navigation pane, expand the domain and expand the node that has your Active Directory domain
name. Right-click the Domain Controllers organizational unit and click Link an existing GPO… .
3. In the Select GPO dialog box, select Domain Controller Auto Cer tificate Enrollment or the name of
the domain controller certificate enrollment Group Policy object you previously created and click OK .
Validating your work
Windows Hello for Business is a distributed system, which on the surface appears complex and difficult. The key
to a successful Windows Hello for Business deployment is to validate phases of work prior to moving to the next
phase.
You want to confirm your domain controllers enroll the correct certificates and not any unnecessary
(superseded) certificate templates. You need to check each domain controller that autoenrollment for the
computer occurred.
Use the Event Logs
Windows Server 2012 and later include Certificate Lifecycle events to determine the lifecycles of certificates for
both users and computers. Using the Event Viewer, navigate to the CertificateServices-Lifecycles-System event
log under Application and Services/Microsoft/Windows.
Look for an event indicating a new certificate enrollment (autoenrollment). The details of the event include the
certificate template on which the certificate was issued. The name of the certificate template used to issue the
certificate should match the certificate template name included in the event. The certificate thumbprint and
EKUs for the certificate are also included in the event. The EKU needed for proper Windows Hello for Business
authentication is Kerberos Authentication, in addition to other EKUs provide by the certificate template.
Certificates superseded by your new domain controller certificate generate an archive event in the
CertificateServices-Lifecycles-System event. The archive event contains the certificate template name and
thumbprint of the certificate that was superseded by the new certificate.
Certificate Manager
You can use the Certificate Manager console to validate the domain controller has the properly enrolled
certificate based on the correct certificate template with the proper EKUs. Use cer tlm.msc to view certificate in
the local computers certificate stores. Expand the Personal store and view the certificates enrolled for the
computer. Archived certificates do not appear in Certificate Manager.
Certutil.exe
You can use cer tutil.exe to view enrolled certificates in the local computer. Certutil shows enrolled and archived
certificates for the local computer. From an elevated command prompt, run certutil -q -store my to view
locally enrolled certificates.
To view detailed information about each certificate in the store, use certutil -q -v -store my to validate
automatic certificate enrollment enrolled the proper certificates.
Troubleshooting
Windows triggers automatic certificate enrollment for the computer during boot, and when Group Policy
updates. You can refresh Group Policy from an elevated command prompt using gpupdate /force .
Alternatively, you can forcefully trigger automatic certificate enrollment using certreq -autoenroll -q from an
elevated command prompt.
Use the event logs to monitor certificate enrollment and archive. Review the configuration, such as publishing
certificate templates to issuing certificate authority and the allow auto enrollment permissions.
Applies to
Windows 10, version 1703 or later
On-premises deployment
Key trust
Windows Hello for Business works exclusively with the Active Directory Federation Service role included with
Windows Server 2016 and requires an additional server update. The on-premises key trust deployment uses
Active Directory Federation Services roles for key registration and device registration.
The following guidance describes deploying a new instance of Active Directory Federation Services 2016 using
the Windows Information Database as the configuration database, which is ideal for environments with no more
than 30 federation servers and no more than 100 relying party trusts.
If your environment exceeds either of these factors or needs to provide SAML artifact resolution, token replay
detection, or needs Active Directory Federation Services to operate in a federated provider role, then your
deployment needs to use a SQL for your configuration database. To deploy the Active Directory Federation
Services using SQL as its configuration database, please review the Deploying a Federation Server Farm
checklist.
If your environment has an existing instance of Active Directory Federation Services, then you’ll need to
upgrade all nodes in the farm to Windows Server 2016 along with the Windows Server 2016 update. If your
environment uses Windows Internal Database (WID) for the configuration database, please read Upgrading to
AD FS in Windows Server 2016 using a WID database to upgrade your environment. If your environment uses
SQL for the configuration database, please read Upgrading to AD FS in Windows Server 2016 with SQL Server
to upgrade your environment.
Ensure you apply the Windows Server 2016 Update to all nodes in the farm after you have successfully
completed the upgrade.
A new Active Directory Federation Services farm should have a minimum of two federation servers for proper
load balancing, which can be accomplished with an external networking peripherals, or with using the Network
Load Balancing Role included in Windows Server.
Prepare the Active Directory Federation Services deployment by installing and updating two Windows Server
2016 Servers. Ensure the update listed below is applied to each server before continuing.
IMPORTANT
Finish the entire AD FS configuration on the first server in the farm before adding the second server to the AD FS farm.
Once complete, the second server receives the configuration through the shared configuration database when it is added
the AD FS farm.
Windows Hello for Business depends on proper device registration. For on-premises key trust deployments,
Windows Server 2016 AD FS handles device and key registration.
Sign-in the federation server with Enterprise Admin equivalent credentials.
1. Start Ser ver Manager . Click Local Ser ver in the navigation pane.
2. Click Manage and then click Add Roles and Features .
3. Click Next on the Before you begin page.
4. On the Select installation type page, select Role-based or feature-based installation and click Next .
5. On the Select destination ser ver page, choose Select a ser ver from the ser ver pool . Select the
federation server from the Ser ver Pool list. Click Next .
6. On the Select ser ver roles page, select Active Director y Federation Ser vices . Click Next .
7. Click Next on the Select features page.
8. Click Next on the Active Director y Federation Ser vice page.
9. Click Install to start the role installation.
Review
Before you continue with the deployment, validate your deployment progress by reviewing the following items:
Confirm the AD FS farm uses the correct database configuration.
Confirm the AD FS farm has an adequate number of nodes and is properly load balanced for the anticipated
load.
Confirm all AD FS servers in the farm have the latest updates.
Confirm all AD FS servers have a valid server authentication certificate
The subject of the certificate is the common name (FQDN) of the host or a wildcard name.
The alternate name of the certificate contains a wildcard or the FQDN of the federation service
NOTE
Follow the procedures below based on the domain controllers deployed in your environment. If the domain controller is
not listed below, then it is not supported for Windows Hello for Business.
3. On the Welcome page, click Create the first federation ser ver farm and click Next .
4. Click Next on the Connect to Active Director y Domain Ser vices page.
5. On the Specify Ser vice Proper ties page, select the recently enrolled or imported certificate from the
SSL Cer tificate list. The certificate is likely named after your federation service, such as
fs.corp.mstepdemo.net or fs.mstepdemo.net.
6. Select the federation service name from the Federation Ser vice Name list.
7. Type the Federation Service Display Name in the text box. This is the name users see when signing in.
Click Next .
8. On the Specify Ser vice Account page, Select Use an existing domain user account or group
Managed Ser vice Account and click Select .
In the Select User or Ser vice Account dialog box, type the name of the previously created AD FS
service account (example adfssvc) and click OK . Type the password for the AD FS service account and
click Next .
9. On the Specify Configuration Database page, select Create a database on this ser ver using
Windows Internal Database and click Next .
10. On the Review Options page, click Next .
11. On the Pre-requisite Checks page, click Configure .
12. When the process completes, click Close .
13. Do not restart the AD FS server. You will do this later.
Add the AD FS Service account to the KeyAdmins group
The KeyAdmins global group provides the AD FS service with the permissions needed to perform key
registration.
Sign-in a domain controller or management workstation with Domain Admin equivalent credentials.
1. Open Active Director y Users and Computers .
2. Click the Users container in the navigation pane.
3. Right-click KeyAdmins in the details pane and click Proper ties .
4. Click the Members tab and click Add…
5. In the Enter the object names to select text box, type adfssvc . Click OK .
6. Click OK to return to Active Director y Users and Computers .
7. Change to server hosting the AD FS role and restart it.
Review
Before you continue with the deployment, validate your deployment progress by reviewing the following items:
Confirm you followed the correct procedures based on the domain controllers used in your deployment
Windows Server 2016, 2012 R2 or Windows Server 2012 R2
Windows Server 2008 or Windows Server 2008 R2
Confirm you have the correct service account based on your domain controller version.
Confirm you properly installed the AD FS role on your Windows Server 2016 based on the proper sizing of
your federation, the number of relying parties, and database needs.
Confirm you used a certificate with the correct names as the server authentication certificate
Record the expiration date of the certificate and set a renewal reminder at least six weeks before it
expires that includes the:
Certificate serial number
Certificate thumbprint
Common name of the certificate
Subject alternate name of the certificate
Name of the physical host server
The issued date
The expiration date
Issuing CA Vendor (if a third-party certificate)
Confirm you added the AD FS service account to the KeyAdmins group.
Confirm you enabled the Device Registration service.
4. Select the interface that you want to use with the cluster, and then click Next . (The interface hosts the virtual
IP address and receives the client traffic to load balance.)
5. In Host Parameters , select a value in Priority (Unique host identifier) . This parameter specifies a unique
ID for each host. The host with the lowest numerical priority among the current members of the cluster
handles all of the cluster's network traffic that is not covered by a port rule. Click Next .
6. In Cluster IP Addresses , click Add and type the cluster IP address that is shared by every host in the
cluster. NLB adds this IP address to the TCP/IP stack on the selected interface of all hosts that are chosen to be
part of the cluster. Click Next .
7. In Cluster Parameters , select values in IP Address and Subnet mask (for IPv6 addresses, a subnet mask
value is not needed). Type the full Internet name that users will use to access this NLB cluster.
8. In Cluster operation mode , click Unicast to specify that a unicast media access control (MAC) address
should be used for cluster operations. In unicast mode, the MAC address of the cluster is assigned to the
network adapter of the computer, and the built-in MAC address of the network adapter is not used. We
recommend that you accept the unicast default settings. Click Next .
9. In Port Rules, click Edit to modify the default port rules to use port 443.
Additional AD FS Servers
1. To add more hosts to the cluster, right-click the new cluster, and then click Add Host to Cluster .
2. Configure the host parameters (including host priority, dedicated IP addresses, and load weight) for the
additional hosts by following the same instructions that you used to configure the initial host. Because you
are adding hosts to an already configured cluster, all the cluster-wide parameters remain the same.
NOTE
If your forest has multiple UPN suffixes, please make sure that enterpriseregistration.upnsuffix.com is present for
each suffix.
Configure the Intranet Zone to include the federation service
The Windows Hello provisioning presents web pages from the federation service. Configuring the intranet zone
to include the federation service enables the user to authenticate to the federation service using integrated
authentication. Without this setting, the connection to the federation service during Windows Hello provisioning
prompts the user for authentication.
Create an Intranet Zone Group Policy
Sign-in the domain controller or administrative workstation with Domain Admin equivalent credentials
1. Start the Group Policy Management Console (gpmc.msc)
2. Expand the domain and select the Group Policy Object node in the navigation pane.
3. Right-click Group Policy object and select New
4. Type Intranet Zone Settings in the name box and click OK .
5. In the content pane, right-click the Intranet Zone Settings Group Policy object and click Edit .
6. In the navigation pane, expand Policies under Computer Configuration .
7. Expand Administrative Templates > Windows Component > Internet Explorer > Internet Control
Panel , and select Security Page .
8. In the content pane, double-click Site to Zone Assignment List . Click Enable .
9. Click Show . In the Value Name column, type the url of the federation service beginning with https. In the
Value column, type the number 1 . Click OK twice, then close the Group Policy Management Editor.
Deploy the Intranet Zone Group Policy object
1. Start the Group Policy Management Console (gpmc.msc)
2. In the navigation pane, expand the domain and right-click the node that has your Active Directory domain
name and click Link an existing GPO…
3. In the Select GPO dialog box, select Intranet Zone Settings or the name of the Windows Hello for
Business Group Policy object you previously created and click OK .
Review
Before you continue with the deployment, validate your deployment progress by reviewing the following items:
Confirm all AD FS servers have a valid server authentication certificate
The subject of the certificate is the common name (FQDN) of the host or a wildcard name.
The alternate name of the certificate contains a wildcard or the FQDN of the federation service
Confirm the AD FS farm has an adequate number of nodes and is properly load balanced for the anticipated
load.
Confirm all AD FS servers in the farm have the latest updates.
Confirm you restarted the AD FS service.
Confirm you created a DNS A Record for the federation service and the IP address used is the load-balanced
IP address
Confirm you created and deployed the Intranet Zone settings to prevent double authentication to the
federation server.
IMPORTANT
As of July 1, 2019, Microsoft will no longer offer MFA Server for new deployments. New customers who would like to
require multi-factor authentication from their users should use cloud-based Azure AD Multi-Factor Authentication.
Existing customers who have activated MFA Server prior to July 1 will be able to download the latest version, future
updates and generate activation credentials as usual.
Applies to
Windows 10, version 1703 or later
On-premises deployment
Key trust
Windows Hello for Business requires all users perform multi-factor authentication prior to creating and
registering a Windows Hello for Business credential. On-premises deployments can use certificates, third-party
authentication providers for AD FS, or a custom authentication provider for AD FS as an on-premises MFA
option.
For information on available third-party authentication methods see Configure Additional Authentication
Methods for AD FS. For creating a custom authentication method see Build a Custom Authentication Method for
AD FS in Windows Server
Follow the integration and deployment guide for the authentication provider you select to integrate and deploy
it to AD FS. Make sure that the authentication provider is selected as a multi-factor authentication option in the
AD FS authentication policy. For information on configuring AD FS authentication policies see Configure
Authentication Policies.
Applies to
Windows 10, version 1703 or later
On-premises deployment
Key trust
You need a Windows 10, version 1703 workstation to run the Group Policy Management Console, which
provides the latest Windows Hello for Business and PIN Complexity Group Policy settings. To run the Group
Policy Management Console, you need to install the Remote Server Administration Tools for Windows 10. You
can download these tools from Microsoft Download Center. Install the Remote Server Administration Tools for
Windows 10 on a computer running Windows 10, version 1703.
Alternatively, you can create a copy of the .ADMX and .ADML files from a Windows 10, version 1703 installation
setup template folder to their respective language folder on a Windows Server, or you can create a Group Policy
Central Store and copy them their respective language folder. See How to create and manage the Central Store
for Group Policy Administrative Templates in Windows for more information.
On-premises certificate-based deployments of Windows Hello for Business needs one Group Policy setting:
Enable Windows Hello for Business
Review
Before you continue with the deployment, validate your deployment progress by reviewing the following items:
Confirm you authored Group Policy settings using the latest ADMX/ADML files (from the Windows 10
Creators Editions)
Confirm you configured the Enable Windows Hello for Business to the scope that matches your
deployment (Computer vs. User)
Confirm you configure the Use Certificate enrollment for on-premises authentication policy setting.
Confirm you configure automatic certificate enrollment to the scope that matches your deployment
(Computer vs. User)
Confirm you configured the proper security settings for the Group Policy object
Removed the allow permission for Apply Group Policy for Domain Users (Domain Users must always
have the read permissions)
Add the Windows Hello for Business Users group to the Group Policy object and gave the group the
allow permission for Apply Group Policy
Linked the Group Policy object to the correct locations within Active Directory
Deploy any additional Windows Hello for Business Group Policy setting is a policy separate from the one
that enables it for users
Applies to
Windows 10, version 1703 or later
On-premises deployment
Certificate trust
Windows Hello for Business replaces username and password sign-in to Windows with strong user
authentication based on asymmetric key pair. The following deployment guide provides the information needed
to successfully deploy Windows Hello for Business in an existing environment.
Below, you can find all the information you will need to deploy Windows Hello for Business in a Certificate Trust
Model in your on-premises environment:
1. Validate Active Directory prerequisites
2. Validate and Configure Public Key Infrastructure
3. Prepare and Deploy Windows Server 2016 Active Directory Federation Services
4. Validate and Deploy Multifactor Authentication Services (MFA)
5. Configure Windows Hello for Business Policy settings
Validate Active Directory prerequisites
11/2/2020 • 3 minutes to read • Edit Online
Applies to
Windows 10, version 1703 or later
On-premises deployment
Certificate trust
The key registration process for the On-premises deployment of Windows Hello for Business needs the
Windows Server 2016 Active Directory or later schema. The key-trust model receives the schema extension
when the first Windows Server 2016 or later domain controller is added to the forest. The certificate trust model
requires manually updating the current schema to the Windows Server 2016 or later schema. If you already
have a Windows Server 2016 or later domain controller in your forest, you can skip the Updating the Schema
and Create the KeyCredential Admins Security Global Group steps.
Manually updating Active Directory uses the command-line utility adprep.exe located at
<drive>:\suppor t\adprep on the Windows Server 2016 or later DVD or ISO. Before running adprep.exe, you
must identify the domain controller hosting the schema master role.
The command should return the name of the domain controller where you need to adprep.exe. Update the
schema locally on the domain controller hosting the Schema master role.
Create the Windows Hello for Business Users Security Global Group
The Windows Hello for Business Users group is used to make it easy to deploy Windows Hello for Business in
phases. You assign Group Policy and Certificate template permissions to this group to simplify the deployment
by simply adding the users to the group. This provides them the proper permissions to provision Windows
Hello for Business and to enroll in the Windows Hello for Business authentication certificate.
Sign into a domain controller or management workstation with domain administrator equivalent credentials.
1. Open Active Director y Users and Computers .
2. Click View and click Advanced Features .
3. Expand the domain node from the navigation pane.
4. Right-click the Users container. Click New . Click Group .
5. Type Windows Hello for Business Users in the Group Name text box.
6. Click OK .
Applies to
Windows 10, version 1703 or later
On-premises deployment
Certificate trust
Windows Hello for Business must have a public key infrastructure regardless of the deployment or trust model.
All trust models depend on the domain controllers having a certificate. The certificate serves as a root of trust
for clients to ensure they are not communicating with a rogue domain controller. The certificate trust model
extends certificate issuance to client computers. During Windows Hello for Business provisioning, the user
receives a sign-in certificate.
NOTE
Never install a certificate authority on a domain controller in a production environment.
3. Use the following command to configure the Certificate Authority using a basic certificate authority
configuration.
Install-AdcsCertificationAuthority
Applies to
Windows 10, version 1703 or later
On-premises deployment
Certificate trust
Windows Hello for Business works exclusively with the Active Directory Federation Service role included with
Windows Server 2016 and requires an additional server update. The on-premises certificate trust deployment
uses Active Directory Federation Services roles for key registration, device registration, and as a certificate
registration authority.
The following guidance describes deploying a new instance of Active Directory Federation Services 2016 using
the Windows Information Database as the configuration database, which is ideal for environments with no more
than 30 federation servers and no more than 100 relying party trusts.
If your environment exceeds either of these factors or needs to provide SAML artifact resolution, token replay
detection, or needs Active Directory Federation Services to operate in a federated provider role, then your
deployment needs to use a SQL for your configuration database. To deploy the Active Directory Federation
Services using SQL as its configuration database, please review the Deploying a Federation Server Farm
checklist.
If your environment has an existing instance of Active Directory Federation Services, then you’ll need to
upgrade all nodes in the farm to Windows Server 2016 along with the Windows Server 2016 update. If your
environment uses Windows Internal Database (WID) for the configuration database, please read Upgrading to
AD FS in Windows Server 2016 using a WID database to upgrade your environment. If your environment uses
SQL for the configuration database, please read Upgrading to AD FS in Windows Server 2016 with SQL Server
to upgrade your environment.
Ensure you apply the Windows Server 2016 Update to all nodes in the farm after you have successfully
completed the upgrade.
A new Active Directory Federation Services farm should have a minimum of two federation servers for proper
load balancing, which can be accomplished with an external networking peripherals, or with using the Network
Load Balancing Role included in Windows Server.
Prepare the Active Directory Federation Services deployment by installing and updating two Windows Server
2016 Servers. Ensure the update listed below is applied to each server before continuing.
NOTE
For AD FS 2019, if Windows Hello for Business with a Hybrid Certificate trust is performed, a known PRT issue exists. You
may encounter this error in ADFS Admin event logs: Received invalid Oauth request. The client 'NAME' is forbidden to
access the resource with scope 'ugs'. To remediate this error:
1. Launch AD FS management console. Browse to "Services > Scope Descriptions".
2. Right click "Scope Descriptions" and select "Add Scope Description".
3. Under name type "ugs" and Click Apply > OK.
4. Launch PowerShell as an administrator.
5. Get the ObjectIdentifier of the application permission with the ClientRoleIdentifier parameter equal to "38aa3b87-
a06d-4817-b275-7a316988d93b":
(Get-AdfsApplicationPermission -ServerRoleIdentifiers
'http://schemas.microsoft.com/ws/2009/12/identityserver/selfscope' | ?{ $_.ClientRoleIdentifier -eq
'38aa3b87-a06d-4817-b275-7a316988d93b' }).ObjectIdentifier
IMPORTANT
The above referenced updates are mandatory for Windows Hello for Business all on-premises deployment and hybrid
certificate trust deployments for domain joined computers.
8. Under Subject name , select Common Name from the Type list. Type the FQDN of the computer hosting
the Active Directory Federation Services role and then click Add .
9. Under Alternative name , select DNS from the Type list. Type the FQDN of the name you will use for your
federation services (fs.corp.contoso.com). The name you use here MUST match the name you use when
configuring the Active Directory Federation Services server role. Click Add . Repeat the same to add device
registration service name (enterpriseregistration.contoso.com) as another alternative name. Click OK when
finished.
10. Click Enroll .
A server authentication certificate should appear in the computer’s Personal certificate store.
IMPORTANT
Finish the entire AD FS configuration on the first server in the farm before adding the second server to the AD FS farm.
Once complete, the second server receives the configuration through the shared configuration database when it is added
the AD FS farm.
Windows Hello for Business depends on proper device registration. For on-premises deployments, Windows
Server 2016 AD FS handles device registration.
Sign-in the federation server with Enterprise Admin equivalent credentials.
1. Start Ser ver Manager . Click Local Ser ver in the navigation pane.
2. Click Manage and then click Add Roles and Features .
3. Click Next on the Before you begin page.
4. On the Select installation type page, select Role-based or feature-based installation and click Next .
5. On the Select destination ser ver page, choose Select a ser ver from the ser ver pool . Select the
federation server from the Ser ver Pool list. Click Next .
6. On the Select ser ver roles page, select Active Director y Federation Ser vices . Click Next .
7. Click Next on the Select features page.
8. Click Next on the Active Director y Federation Ser vice page.
9. Click Install to start the role installation.
Review
Before you continue with the deployment, validate your deployment progress by reviewing the following items:
Confirm the AD FS farm uses the correct database configuration.
Confirm the AD FS farm has an adequate number of nodes and is properly load balanced for the anticipated
load.
Confirm all AD FS servers in the farm have the latest updates.
Confirm all AD FS servers have a valid server authentication certificate.
The subject of the certificate is the common name (FQDN) of the host or a wildcard name.
The alternate name of the certificate contains a wildcard or the FQDN of the federation service.
Device Registration Service Account Prerequisite
The service account used for the device registration server depends on the domain controllers in the
environment.
NOTE
Follow the procedures below based on the domain controllers deployed in your environment. If the domain controller is
not listed below, then it is not supported for Windows Hello for Business.
NOTE
If the default object creation quota for security principles is set, you will need to change it for the Group Managed Service
Account in order to be able to register new devices.
3. On the Welcome page, click Create the first federation ser ver farm and click Next .
4. Click Next on the Connect to Active Director y Domain Ser vices page.
5. On the Specify Ser vice Proper ties page, select the recently enrolled or imported certificate from the SSL
Cer tificate list. The certificate is likely named after your federation service, such as fs.corp.contoso.com or
fs.contoso.com.
6. Select the federation service name from the Federation Ser vice Name list.
7. Type the Federation Service Display Name in the text box. This is the name users see when signing in. Click
Next .
8. On the Specify Ser vice Account page, select Create a Group Managed Ser vice Account . In the
Account Name box, type adfssvc .
9. On the Specify Configuration Database page, select Create a database on this ser ver using
Windows Internal Database and click Next .
10. On the Review Options page, click Next .
11. On the Pre-requisite Checks page, click Configure .
12. When the process completes, click Close .
Windows Server 2008 or 2008 R2 Domain Controllers
Use the following procedures to configure AD FS when your environment uses Windows Ser ver 2008 or
2008 R2 Domain Controllers . If you are not using Windows Server 2008 or 2008 R2 Domain Controllers,
follow the procedures under the Configure the Active Directory Federation Service Role (Windows Server 2012
or later Domain Controllers) section.
Sign-in the federation server with domain administrator equivalent credentials. These instructions assume you
are configuring the first federation server in a federation server farm.
1. Start Ser ver Manager .
2. Click the notification flag in the upper right corner. Click Configure federation ser vices on this ser ver .
3. On the Welcome page, click Create the first federation ser ver farm and click Next .
4. Click Next on the Connect to Active Director y Domain Ser vices page.
5. On the Specify Ser vice Proper ties page, select the recently enrolled or imported certificate from the SSL
Cer tificate list. The certificate is likely named after your federation service, such as fs.corp.mstepdemo.net
or fs.mstepdemo.net.
6. Select the federation service name from the Federation Ser vice Name list.
7. Type the Federation Service Display Name in the text box. This is the name users see when signing in. Click
Next .
8. On the Specify Ser vice Account page, Select Use an existing domain user account or group
Managed Ser vice Account and click Select . In the Select User or Ser vice Account dialog box, type the
name of the previously created AD FS service account (example adfssvc) and click OK . Type the password for
the AD FS service account and click Next .
9. On the Specify Configuration Database page, select Create a database on this ser ver using
Windows Internal Database and click Next .
10. On the Review Options page, click Next .
11. On the Pre-requisite Checks page, click Configure .
12. When the process completes, click Close .
13. Do not restart the AD FS server. You will do this later.
Add the AD FS Service account to the KeyCredential Admin group and the Windows Hello for Business
Users group
NOTE
If you have a Windows Server 2016 domain controller in your domain, you can use the Key Admins group instead of
KeyCredential Administrators and skip the Configure Permissions for Key Registration step.
The KeyCredential Administrators global group provides the AD FS service with the permissions needed to
perform key registration. The Windows Hello for Business group provides the AD FS service with the
permissions needed to enroll a Windows Hello for Business authentication certificate on behalf of the
provisioning user.
Sign-in a domain controller or management workstation with Domain Admin equivalent credentials.
1. Open Active Director y Users and Computers .
2. Click the Users container in the navigation pane.
3. Right-click KeyCredential Admins in the details pane and click Proper ties .
4. Click the Members tab and click Add…
5. In the Enter the object names to select text box, type adfssvc . Click OK .
6. Click OK to return to Active Director y Users and Computers .
7. Right-click Windows Hello for Business Users group
8. Click the Members tab and click Add…
9. In the Enter the object names to select text box, type adfssvc . Click OK .
10. Click OK to return to Active Director y Users and Computers .
11. Change to server hosting the AD FS role and restart it.
Configure Permissions for Key Registration
Key Registration stores the Windows Hello for Business public key in Active Directory. With on-premises
deployments, the Windows Server 2016 AD FS server registers the public key with the on-premises Active
Directory.
The key-trust model needs Windows Server 2016 domain controllers, which configures the key registration
permissions automatically; however, the certificate-trust model does not and requires you to add the
permissions manually.
Sign-in a domain controller or management workstations with Domain Admin equivalent credentials.
1. Open Active Director y Users and Computers .
2. Right-click your domain name from the navigation pane and click Proper ties .
3. Click Security (if the Security tab is missing, turn on Advanced Features from the View menu).
4. Click Advanced . Click Add . Click Select a principal .
5. The Select User, Computer, Ser vice Account, or Group dialog box appears. In the Enter the object
name to select text box, type KeyCredential Admins . Click OK .
6. In the Applies to list box, select Descendant User objects .
7. Using the scroll bar, scroll to the bottom of the page and click Clear all .
8. In the Proper ties section, select Read msDS-KeyCredentialLink and Write msDS-
KeyCrendentialLink .
9. Click OK three times to complete the task.
Review
Before you continue with the deployment, validate your deployment progress by reviewing the following items:
Confirm you followed the correct procedures based on the domain controllers used in your deployment.
Windows Server 2012 or Windows Server 2012 R2
Windows Server 2008 or Windows Server 2008 R2
Confirm you have the correct service account based on your domain controller version.
Confirm you properly installed the AD FS role on your Windows Server 2016 based on the proper sizing of
your federation, the number of relying parties, and database needs.
Confirm you used a certificate with the correct names as the server authentication certificate.
Record the expiration date of the certificate and set a renewal reminder at least six weeks before it
expires that includes the:
Certificate serial number
Certificate thumbprint
Common name of the certificate
Subject alternate name of the certificate
Name of the physical host server
The issued date
The expiration date
Issuing CA Vendor (if a third-party certificate)
Confirm you granted the AD FS service allow read and write permissions to the ms-DSKeyCredentialLink
Active Directory attribute.
Confirm you enabled the Device Registration service.
IMPORTANT
Follow the procedures below based on the domain controllers deployed in your environment. If the domain controller is
not listed below, then it is not supported for Windows Hello for Business.
NOTE
The preceding step is very important. Group Managed Service Accounts (GMSA) do not support the Build from
this Active Directory information option and will result in the AD FS server failing to enroll the enrollment agent
certificate. You must configure the certificate template with Supply in the request to ensure that AD FS servers can
perform the automatic enrollment and renewal of the enrollment agent certificate.
7. On the Cr yptography tab, select Key Storage Provider from the Provider Categor y list. Select RSA
from the Algorithm name list. Type 2048 in the Minimum key size text box. Select SHA256 from the
Request hash list.
8. On the Security tab, click Add .
9. Click Object Types . Select the Ser vice Accounts check box and click OK .
10. Type adfssvc in the Enter the object names to select text box and click OK .
11. Click the adfssvc from the Group or users names list. In the Permissions for adfssvc section, In the
Permissions for adfssvc section, select the Allow check box for the Enroll permission. Excluding the
adfssvc user, clear the Allow check box for the Enroll and Autoenroll permissions for all other items in
the Group or users names list if the check boxes are not already cleared. Click OK .
12. Close the console.
Windows 2008 or 2008R2 domain controllers
Sign-in a certificate authority or management workstations with Domain Admin equivalent credentials.
1. Open the Cer tificate Authority management console.
2. Right-click Cer tificate Templates and click Manage .
3. In the Cer tificate Template console, right-click the Exchange Enrollment Agent template in the details
pane and click Duplicate Template .
4. On the Compatibility tab, clear the Show resulting changes check box. Select Windows Ser ver 2012
or Windows Ser ver 2012 R2 from the Cer tification Authority list. Select Windows Ser ver 2012 or
Windows Ser ver 2012 R2 from the Cer tification Recipient list.
5. On the General tab, type WHFB Enrollment Agent in Template display name . Adjust the validity and
renewal period to meet your enterprise’s needs.
6. On the Subject tab, select the Build from this Active Director y information button if it is not already
selected. Select Fully distinguished name from the Subject name format list if Fully distinguished
name is not already selected. Select the User Principal Name (UPN) check box under Include this
information in alternative subject name .
7. On the Cr yptography tab, select Key Storage Provider from the Provider Categor y list. Select RSA
from the Algorithm name list. Type 2048 in the Minimum key size text box. Select SHA256 from the
Request hash list.
8. On the Security tab, click Add . Type adfssvc in the Enter the object names to select text box and click
OK .
9. Click the adfssvc from the Group or users names list. In the Permissions for adfssvc section, select the
Allow check box for the Enroll permission. Excluding the adfssvc user, clear the Allow check boxes for the
Enroll and Autoenroll permissions for all other items in the Group or users names list if the check boxes
are not already cleared. Click OK .
10. Close the console.
Configure the Windows Hello for Business Authentication Certificate template
During Windows Hello for Business provisioning, the Windows 10, version 1703 client requests an
authentication certificate from the Active Directory Federation Service, which requests the authentication
certificate on behalf of the user. This task configures the Windows Hello for Business authentication certificate
template. You use the name of the certificate template when configuring.
Sign-in a certificate authority or management workstations with domain administrator equivalent credentials.
1. Open the Cer tificate Authority management console.
2. Right-click Cer tificate Templates and click Manage .
3. Right-click the Smar tcard Logon template and choose Duplicate Template .
4. On the Compatibility tab, clear the Show resulting changes check box. Select Windows Ser ver 2012
or Windows Ser ver 2012 R2 from the Cer tification Authority list. Select Windows Ser ver 2012 or
Windows Ser ver 2012 R2 from the Cer tification Recipient list.
5. On the General tab, type WHFB Authentication in Template display name . Adjust the validity and
renewal period to meet your enterprise’s needs.
NOTE
If you use different template names, you’ll need to remember and substitute these names in different portions of
the deployment.
6. On the Cr yptography tab, select Key Storage Provider from the Provider Categor y list. Select RSA
from the Algorithm name list. Type 2048 in the Minimum key size text box. Select SHA256 from the
Request hash list.
7. On the Extensions tab, verify the Application Policies extension includes Smar t Card Logon .
8. On the Issuance Requirements tab, select the This number of authorized signatures check box. Type 1
in the text box. Select Application policy from the Policy type required in signature . Select Cer tificate
Request Agent from in the Application policy list. Select the Valid existing cer tificate option.
9. On the Subject tab, select the Build from this Active Director y information button if it is not already
selected. Select Fully distinguished name from the Subject name format list if Fully distinguished
name is not already selected. Select the User Principal Name (UPN) check box under Include this
information in alternative subject name .
10. On the Request Handling tab, select the Renew with same key check box.
11. On the Security tab, click Add . Type Window Hello for Business Users in the Enter the object names
to select text box and click OK .
12. Click the Windows Hello for Business Users from the Group or users names list. In the Permissions
for Windows Hello for Business Users section, select the Allow check box for the Enroll permission.
Excluding the Windows Hello for Business Users group, clear the Allow check box for the Enroll and
Autoenroll permissions for all other entries in the Group or users names section if the check boxes are
not already cleared. Click OK .
13. If you previously issued Windows Hello for Business sign-in certificates using Configuration Manger and are
switching to an AD FS registration authority, then on the Superseded Templates tab, add the previously
used Windows Hello for Business Authentication template(s), so they will be superseded by this
template for the users that have Enroll permission for this template.
14. Click on the Apply to save changes and close the console.
Mark the template as the Windows Hello Sign-in template
Sign-in to an AD FS Windows Ser ver 2016 computer with enterprise administrator equivalent credentials.
1. Open an elevated command prompt.
2. Run certutil –dsTemplate WHFBAuthentication msPKI-Private-Key-Flag +CTPRIVATEKEY_FLAG_HELLO_LOGON_KEY .
NOTE
If you gave your Windows Hello for Business Authentication certificate template a different name, then replace
WHFBAuthentication in the above command with the name of your certificate template. It’s important that you use
the template name rather than the template display name. You can view the template name on the General tab of the
certificate template using the Certificate Template management console (certtmpl.msc). Or, you can view the template
name using the Get-CATemplate ADCS Administration Windows PowerShell cmdlet on our Windows Server 2012 or
later certificate authority.
Publish Enrollment Agent and Windows Hello For Business Authentication templates to the Certificate
Authority
Sign-in a certificate authority or management workstations with Enterprise Admin equivalent credentials.
1. Open the Cer tificate Authority management console.
2. Expand the parent node from the navigation pane.
3. Click Cer tificate Templates in the navigation pane.
4. Right-click the Cer tificate Templates node. Click New , and click Cer tificate Template to issue .
5. In the Enable Cer tificates Templates window, select the WHFB Enrollment Agent template you created
in the previous steps. Click OK to publish the selected certificate templates to the certificate authority.
6. Publish the WHFB Authentication certificate template using step 5.
7. Close the console.
Configure the Registration Authority
Sign-in the AD FS server with domain administrator equivalent credentials.
1. Open a Windows PowerShell prompt.
2. Type the following command
Set-AdfsCertificateAuthority -EnrollmentAgent -EnrollmentAgentCertificateTemplate WHFBEnrollmentAgent
-WindowsHelloCertificateTemplate WHFBAuthentication
NOTE
If you gave your Windows Hello for Business Enrollment Agent and Windows Hello for Business Authentication
certificate templates different names, then replace WHFBEnrollmentAgent and WHFBAuthentication in the
above command with the name of your certificate templates. It’s important that you use the template name
rather than the template display name. You can view the template name on the General tab of the certificate
template using the Cer tificate Template management console (certtmpl.msc). Or, you can view the template
name using the Get-CATemplate ADCS Administration Windows PowerShell cmdlet on a Windows Server 2012
or later certificate authority.
NOTE
Normally this script is not needed, as enabling Device Registration via the ADFS Management console already creates the
objects. You can validate the SCP using the script below. For detailed information about the Device Registration Service,
see Configuring Device Registration.
Now you will add the Service connection Point to ADFS device registration Service for your Active directory by
running the following script:
TIP
Make sure to change the $enrollmentService and $configNC variables before running the script.
4. Select the interface that you want to use with the cluster, and then click Next . (The interface hosts the virtual
IP address and receives the client traffic to load balance.)
5. In Host Parameters , select a value in Priority (Unique host identifier) . This parameter specifies a unique
ID for each host. The host with the lowest numerical priority among the current members of the cluster
handles all of the cluster's network traffic that is not covered by a port rule. Click Next .
6. In Cluster IP Addresses , click Add and type the cluster IP address that is shared by every host in the
cluster. NLB adds this IP address to the TCP/IP stack on the selected interface of all hosts that are chosen to be
part of the cluster. Click Next .
7. In Cluster Parameters , select values in IP Address and Subnet mask (for IPv6 addresses, a subnet mask
value is not needed). Type the full Internet name that users will use to access this NLB cluster.
8. In Cluster operation mode , click Unicast to specify that a unicast media access control (MAC) address
should be used for cluster operations. In unicast mode, the MAC address of the cluster is assigned to the
network adapter of the computer, and the built-in MAC address of the network adapter is not used. We
recommend that you accept the unicast default settings. Click Next .
9. In Port Rules, click Edit to modify the default port rules to use port 443.
Additional AD FS Servers
1. To add more hosts to the cluster, right-click the new cluster, and then click Add Host to Cluster .
2. Configure the host parameters (including host priority, dedicated IP addresses, and load weight) for the
additional hosts by following the same instructions that you used to configure the initial host. Because you
are adding hosts to an already configured cluster, all the cluster-wide parameters remain the same.
Review
Before you continue with the deployment, validate your deployment progress by reviewing the following items:
Confirm you configured the correct enrollment agent certificate template based on the type of AD FS service
account.
Confirm only the AD FS service account has the allow enroll permission for the enrollment agent certificate
template.
Consider using an HSM to protect the enrollment agent certificate; however, understand the frequency and
quantity of signature operations the enrollment agent server makes and understand the impact it has on
overall performance.
Confirm you properly configured the Windows Hello for Business authentication certificate template—to
include:
Issuance requirements of an authorized signature from a certificate request agent.
The certificate template was properly marked as a Windows Hello for Business certificate template
using certutil.exe.
The Windows Hello for Business Users group, or equivalent has the allow enroll permissions.
Confirm all certificate templates were properly published to the appropriate issuing certificate authorities.
Confirm the AD FS service account has the allow enroll permission for the Windows Hello Business
authentication certificate template.
Confirm the AD FS certificate registration authority is properly configured using the
Get-AdfsCertificateAuthority Windows PowerShell cmdlet.
Confirm you restarted the AD FS service.
Confirm you properly configured load-balancing (hardware or software).
Confirm you created a DNS A Record for the federation service and the IP address used is the load-balanced
IP address
Confirm you created and deployed the Intranet Zone settings to prevent double authentication to the
federation server.
IMPORTANT
After following the previous steps, if you are unable to validate that the devices are, in fact, being registered automatically,
there is a Group Policy at: Computer Configuration > Policies > Administrative Templates > Windows
Components > Device Registration > "Register Domain Joined Computers As Devices". Set the policy to Enabled
and the registration will happen automatically.
Event Logs
Use the event logs on the AD FS service to confirm the service account enrolled for an enrollment agent
certificate. First, look for the AD FS event ID 443 that confirms certificate enrollment cycle has finished. Once
confirmed the AD FS certificate enrollment cycle completed review the CertificateLifecycle-User event log. In this
event log, look for event ID 1006, which indicates a new certificate was installed. Details of the event log should
show:
The account name under which the certificate was enrolled.
The action, which should read enroll.
The thumbprint of the certificate
The certificate template used to issue the certificate.
Normal Service Account
When using a normal service account, use the Microsoft Management Console (mmc.exe) and load the
Certificate Manager snap-in for the service account and verify.
Group Managed Service Account
You cannot use the Certificate Manager to view enrolled certificates for group managed service accounts. Use
the event log information to confirm the AD FS service account enrolled a certificate. Use certutil.exe to view the
details of the certificate now shown in the event log.
Group managed service accounts use user profiles to store user information, which included enrolled
certificates. On the AD FS server, use a command prompt and navigate to
%systemdrive%\users\<adfsGMSA_name>\appdata\roaming\Microsoft\systemcertificates\my\certificates .
Each file in this folder represents a certificate in the service account’s Personal store (You may need to use DIR
/A to view the files in the folder). Match the thumbprint of the certificate from the event log to one of the files in
this folder. That file is the certificate. Use the Certutil -q <certificateThumbprintFileName> to view the basic
information about the certificate.
For detailed information about the certificate, use Certutil -q -v <certificateThumbprintFileName> .
Applies to
Windows 10, version 1703 or later
On-premises deployment
Certificate trust
Windows Hello for Business requires all users perform multi-factor authentication prior to creating and
registering a Windows Hello for Business credential. On-premises deployments can use certificates, third-party
authentication providers for AD FS, or a custom authentication provider for AD FS as an on-premises MFA
option.
For information on available third-party authentication methods see Configure Additional Authentication
Methods for AD FS. For creating a custom authentication method see Build a Custom Authentication Method for
AD FS in Windows Server
Follow the integration and deployment guide for the authentication provider you select to integrate and deploy
it to AD FS. Make sure that the authentication provider is selected as a multi-factor authentication option in the
AD FS authentication policy. For information on configuring AD FS authentication policies see Configure
Authentication Policies.
Applies to
Windows 10, version 1703 or later
On-premises deployment
Certificate trust
You need a Windows 10, version 1703 workstation to run the Group Policy Management Console, which
provides the latest Windows Hello for Business and PIN Complexity Group Policy settings. To run the Group
Policy Management Console, you need to install the Remote Server Administration Tools for Windows 10. You
can download these tools from the Microsoft Download Center. Install the Remote Server Administration Tools
for Windows 10 on a computer running Windows 10, version 1703.
On-premises certificate-based deployments of Windows Hello for Business needs three Group Policy settings:
Enable Windows Hello for Business
Use certificate for on-premises authentication
Enable automatic enrollment of certificates
Review
Before you continue with the deployment, validate your deployment progress by reviewing the following items:
Confirm you authored Group Policy settings using the latest ADMX/ADML files (from the Windows 10
Creators Editions)
Confirm you configured the Enable Windows Hello for Business to the scope that matches your
deployment (Computer vs. User)
Confirm you configure the Use Certificate enrollment for on-premises authentication policy setting.
Confirm you configure automatic certificate enrollment to the scope that matches your deployment
(Computer vs. User)
Confirm you configured the proper security settings for the Group Policy object
Removed the allow permission for Apply Group Policy for Domain Users (Domain Users must always
have the read permissions)
Add the Windows Hello for Business Users group to the Group Policy object and gave the group the
allow permission for Apply Group Policy
Linked the Group Policy object to the correct locations within Active Directory
Deploy any additional Windows Hello for Business Group Policy setting is a policy separate from the one
that enables it for users
Applies to
Windows 10
You can create a Group Policy or mobile device management (MDM) policy that will implement Windows Hello
on devices running Windows 10.
IMPORTANT
The Group Policy setting Turn on PIN sign-in does not apply to Windows Hello for Business. It still prevents or enables
the creation of a convenience PIN for Windows 10, version 1507 and 1511.
Beginning in version 1607, Windows Hello as a convenience PIN is disabled by default on all domain-joined computers. To
enable a convenience PIN for Windows 10, version 1607, enable the Group Policy setting Turn on convenience PIN
sign-in .
Use PIN Complexity policy settings to manage PINs for Windows Hello for Business.
NOTE
Starting with Windows 10, version 1709, the location of the PIN complexity section of the Group Policy is: Computer
Configuration > Administrative Templates > System > PIN Complexity .
P O L IC Y SC O P E O P T IO N S
P O L IC Y SC O P E DEFA ULT O P T IO N S
Note If Windows
Hello for Business
is enabled, and
then the policy is
changed to False,
users who
previously set up
Windows Hello
for Business can
continue to use it,
but will not be
able to set up
Windows Hello
for Business on
other devices.
NOTE
In Windows 10, version 1709 and later, if policy is not configured to explicitly require letters or special characters, users
can optionally set an alphanumeric PIN. Prior to version 1709 the user is required to set a numeric PIN.
NOTE
Windows Hello for Business policy conflict resolution logic does not respect the ControlPolicyConflict/MDMWinsOverGP
policy in the Policy CSP.
Examples
The following are configured using computer Group Policy:
Use Windows Hello for Business - Enabled
User certificate for on-premises authentication - Enabled
The following are configured using device MDM Policy:
UsePassportForWork - Disabled
UseCertificateForOnPremAuth - Disabled
MinimumPINLength - 8
Digits - 1
LowercaseLetters - 1
SpecialCharacters - 1
Enforced policy set:
Use Windows Hello for Business - Enabled
Use certificate for on-premises authentication - Enabled
MinimumPINLength - 8
Digits - 1
LowercaseLetters - 1
SpecialCharacters - 1
How to use Windows Hello for Business with Azure Active Directory
There are three scenarios for using Windows Hello for Business in Azure AD–only organizations:
Organizations that use the version of Azure AD included with Office 365 . For these organizations,
no additional work is necessary. When Windows 10 was released to general availability, Microsoft changed
the behavior of the Office 365 Azure AD stack. When a user selects the option to join a work or school
network, the device is automatically joined to the Office 365 tenant's directory partition, a certificate is issued
for the device, and it becomes eligible for Office 365 MDM if the tenant has subscribed to that feature. In
addition, the user will be prompted to log on and, if MFA is enabled, to enter an MFA proof that Azure AD
sends to his or her phone.
Organizations that use the free tier of Azure AD . For these organizations, Microsoft has not enabled
automatic domain join to Azure AD. Organizations that have signed up for the free tier have the option to
enable or disable this feature, so automatic domain join won't be enabled unless and until the organization's
administrators decide to enable it. When that feature is enabled, devices that join the Azure AD domain by
using the Connect to work or school dialog box will be automatically registered with Windows Hello for
Business support, but previously joined devices will not be registered.
Organizations that have subscribed to Azure AD Premium have access to the full set of Azure AD
MDM features. These features include controls to manage Windows Hello for Business. You can set policies to
disable or force the use of Windows Hello for Business, require the use of a TPM, and control the length and
strength of PINs set on the device.
If you want to use Windows Hello for Business with certificates, you'll need a device registration system. That
means that you set up Configuration Manager, Microsoft Intune, or a compatible non-Microsoft MDM system
and enable it to enroll devices. This is a prerequisite step to use Windows Hello for Business with certificates, no
matter the IDP, because the enrollment system is responsible for provisioning the devices with the necessary
certificates.
Related topics
Windows Hello for Business
How Windows Hello for Business works
Why a PIN is better than a password
Prepare people to use Windows Hello
Windows Hello and password changes
Windows Hello errors during PIN creation
Event ID 300 - Windows Hello successfully created
Windows Hello biometrics in the enterprise
Deploying Certificates to Key Trust Users to Enable
RDP
3/9/2021 • 7 minutes to read • Edit Online
Applies To
Windows 10, version 1703 or later
Hybrid deployment
Key trust
Windows Hello for Business supports using a certificate as the supplied credential when establishing a remote
desktop connection to a server or other device. For certificate trust deployments, creation of this certificate
occurs at container creation time.
This document discusses an approach for key trust deployments where authentication certificates can be
deployed to an existing key trust user.
Three approaches are documented here:
1. Deploying a certificate to hybrid joined devices using an on-premises Active Directory certificate
enrollment policy.
2. Deploying a certificate to hybrid or Azure AD joined devices using Simple Certificate Enrollment Protocol
(SCEP) and Intune.
3. Working with non-Microsoft enterprise certificate authorities.
21. From the list of templates, select the template you previously created (WHFB Cer tificate
Authentication ) and click OK . It can take some time for the template to replicate to all servers and
become available in this list.
22. After the template replicates, in the MMC, right-click in the Certification Authority list, click All Tasks and
then click Stop Ser vice . Right-click the name of the CA again, click All Tasks , and then click Star t
Ser vice .
Requesting a Certificate
1. Ensure the hybrid Azure AD joined device has network line of sight to Active Directory domain controllers
and the issuing certificate authority.
2. Start the Cer tificates – Current User console (%windir%\system32\certmgr.msc).
3. In the left pane of the MMC, right-click Personal , click All Tasks , and then click Request New
Cer tificate…
NOTE
This infrastructure may also deploy the same certificates to co-managed or modern-managed Hybrid AAD-Joined devices
using Intune Policies.
Requirements:
Azure Active Directory
Hybrid Windows Hello for Business deployment
In a mobile-first, cloud-first world, Azure Active Directory enables single sign-on to devices, applications, and
services from anywhere. With the proliferation of devices (including BYOD), work off corporate networks, and
3rd party SaaS applications, IT professionals are faced with two opposing goals:
Empower the end users to be productive wherever and whenever
Protect the corporate assets at any time
To improve productivity, Azure Active Directory provides your users with a broad range of options to access
your corporate assets. With application access management, Azure Active Directory enables you to ensure that
only the right people can access your applications. What if you want to have more control over how the right
people are accessing your resources under certain conditions? What if you even have conditions under which
you want to block access to certain applications even for the right people? For example, it might be OK for you if
the right people are accessing certain applications from a trusted network; however, you might not want them
to access these applications from a network you don't trust. You can address these questions using conditional
access.
NOTE
For more details about the way Windows Hello for Business interacts with Azure AD Multi-Factor Authentication and
Conditional Access, see this article.
Read Conditional access in Azure Active Directory to learn more about Conditional Access. Afterwards, read
Getting started with conditional access in Azure Active Directory to start deploying Conditional access.
Related topics
Windows Hello for Business
Manage Windows Hello for Business in your organization
Why a PIN is better than a password
Prepare people to use Windows Hello
Windows Hello and password changes
Windows Hello errors during PIN creation
Event ID 300 - Windows Hello successfully created
Windows Hello biometrics in the enterprise
PIN reset
3/6/2021 • 4 minutes to read • Edit Online
Applies to:
Windows 10, version 1709 or later
Hybrid Deployments
Requirements:
Azure Active Directory
Hybrid Windows Hello for Business deployment
Azure AD registered, Azure AD joined, and Hybrid Azure AD joined
Windows 10, version 1709 to 1809, Enterprise Edition . There is no licensing requirement for this feature
since version 1903.
The Microsoft PIN reset services enables you to help users recover who have forgotten their PIN. Using Group
Policy, Microsoft Intune or a compatible MDM, you can configure Windows 10 devices to securely use the
Microsoft PIN reset service that enables users to reset their forgotten PIN through settings or above the lock
screen without requiring re-enrollment.
IMPORTANT
The Microsoft PIN Reset service only works with Enterprise Edition for Windows 10, version 1709 to 1809. The feature
works with Enterprise Edition and Pro edition with Windows 10, version 1903 and newer.
NOTE
You can also setup PIN recovery using configuration profiles.
1. Sign in to Endpoint Manager.
2. Click Devices > Configuration Profiles > Create a new profile or edit an existing profile using the Identity
Protection profile type.
3. Set Enable PIN recover y to Yes .
Assign the PIN Reset Device configuration profile using Microsoft Intune
1. Sign in to the Azure portal using a Global administrator account.
2. Navigate to the Microsoft Intune blade. Choose Device configuration > Profiles . From the list of
device configuration profiles, choose the profile that contains the PIN reset configuration.
3. In the device configuration profile, select Assignments .
4. Use the Include and/or Exclude tabs to target the device configuration profile to select groups.
On-premises Deployments
Requirements
Active Directory
On-premises Windows Hello for Business deployment
Reset from settings - Windows 10, version 1703, Professional
Reset above Lock - Windows 10, version 1709, Professional
On-premises deployments provide users with the ability to reset forgotten PINs either through the settings page
or from above the user's lock screen. Users must know or be provided their password for authentication, must
perform a second factor of authentication, and then re-provision Windows Hello for Business.
IMPORTANT
Users must have corporate network connectivity to domain controllers and the federation service to reset their PINs.
NOTE
Visit the Windows Hello for Business Videos page and watch Windows Hello for Business forgotten PIN user experience.
Related topics
Windows Hello for Business
Manage Windows Hello for Business in your organization
Why a PIN is better than a password
Prepare people to use Windows Hello
Windows Hello and password changes
Windows Hello errors during PIN creation
Event ID 300 - Windows Hello successfully created
Windows Hello biometrics in the enterprise
Dual Enrollment
11/2/2020 • 4 minutes to read • Edit Online
Requirements
Hybrid and On-premises Windows Hello for Business deployments
Enterprise Joined or Hybrid Azure joined devices
Windows 10, version 1709
NOTE
This feature was previously known as Privileged Credential but was renamed to Dual Enrollment to prevent any
confusion with the Privileged Access Workstation feature.
IMPORTANT
Dual enrollment does not replace or provide the same security as Privileged Access Workstations feature. Microsoft
encourages enterprises to use the Privileged Access Workstations for their privileged credential users. Enterprises can
consider Windows Hello for Business dual enrollment in situations where the Privileged Access feature cannot be used.
Read Privileged Access Workstations for more information.
Dual enrollment enables administrators to perform elevated, administrative functions by enrolling both their
non-privileged and privileged credentials on their device.
By design, Windows 10 does not enumerate all Windows Hello for Business users from within a user's session.
Using the computer Group Policy setting, Allow enumeration of emulated smar t card for all users , you
can configure a device to enumerate all enrolled Windows Hello for Business credentials on selected devices.
With this setting, administrative users can sign-in to Windows 10, version 1709 using their non-privileged
Windows Hello for Business credentials for normal work flow such as email, but can launch Microsoft
Management Consoles (MMCs), Remote Desktop Services clients, and other applications by selecting Run as
different user or Run as administrator , selecting the privileged user account, and providing their PIN.
Administrators can also take advantage of this feature with command line applications by using runas.exe
combined with the /smar tcard argument. This enables administrators to perform their day-to-day operations
without needing to sign-in and out, or use fast user switching when alternating between privileged and non-
privileged workloads.
IMPORTANT
You must configure a Windows 10 computer for Windows Hello for Business dual enrollment before either user (privileged
or non-privileged) provisions Windows Hello for Business. Dual enrollment is a special setting that is configured on the
Windows Hello container during creation.
Related topics
Windows Hello for Business
Manage Windows Hello for Business in your organization
Why a PIN is better than a password
Prepare people to use Windows Hello
Windows Hello and password changes
Windows Hello errors during PIN creation
Event ID 300 - Windows Hello successfully created
Windows Hello biometrics in the enterprise
Dynamic lock
12/26/2019 • 2 minutes to read • Edit Online
Requirements:
Windows 10, version 1703
Dynamic lock enables you to configure Windows 10 devices to automatically lock when Bluetooth paired device
signal falls below the maximum Received Signal Strength Indicator (RSSI) value. This makes it more difficult for
someone to gain access to your device if you step away from your PC and forget to lock it.
You configure the dynamic lock policy using Group Policy. You can locate the policy setting at Computer
Configuration\Administrative Templates\Windows Components\Windows Hello for Business . The
name of the policy is Configure dynamic lock factors .
The Group Policy Editor, when the policy is enabled, creates a default signal rule policy with the following value:
<rule schemaVersion="1.0">
<signal type="bluetooth" scenario="Dynamic Lock" classOfDevice="512" rssiMin="-10" rssiMaxDelta="-10"/>
</rule>
IMPORTANT
Microsoft recommends using the default values for this policy settings. Measurements are relative based on the varying
conditions of each environment. Therefore, the same values may produce different results. Test policy settings in each
environment prior to broadly deploying the setting.
For this policy setting, the type and scenario attribute values are static and cannot change. The classofDevice
is configurable but Phone is the only currently supported configuration. The attribute defaults to Phones sand
uses the values from the following table:
DESC RIP T IO N VA L UE
Miscellaneous 0
Computer 256
Phone 512
Audio/Video 1024
Peripheral 1280
Imaging 1536
Wearable 1792
Toy 2048
DESC RIP T IO N VA L UE
Health 2304
Uncategorized 7936
The rssiMin attribute value signal indicates the strength needed for the device to be considered "in-range". The
default value of -10 enables a user to move about an average size office or cubicle without triggering Windows
to lock the device. The rssiMaxDelta has a default value of -10 , which instruct Windows 10 to lock the device
once the signal strength weakens by more than measurement of 10.
RSSI measurements are relative and lower as the bluetooth signals between the two paired devices reduces.
Therefore a measurement of 0 is stronger than -10, which is stronger than -60, which is an indicator the devices
are moving further apart from each other.
Related topics
Windows Hello for Business
Manage Windows Hello for Business in your organization
Why a PIN is better than a password
Prepare people to use Windows Hello
Windows Hello and password changes
Windows Hello errors during PIN creation
Event ID 300 - Windows Hello successfully created
Windows Hello biometrics in the enterprise
Multi-factor Unlock
3/5/2021 • 11 minutes to read • Edit Online
Applies to:
Windows 10
Requirements:
Windows Hello for Business deployment (Hybrid or On-premises)
Azure AD, Hybrid Azure AD, or Domain Joined (Cloud, Hybrid, or On-Premises deployments)
Windows 10, version 1709 or newer
Bluetooth, Bluetooth capable phone - optional
Windows, today, natively only supports the use of a single credential (password, PIN, fingerprint, face, etc.) for
unlocking a device. Therefore, if any of those credentials are compromised (shoulder surfed), an attacker could
gain access to the system.
Windows 10 offers Multi-factor device unlock by extending Windows Hello with trusted signals. Administrators
can configure Windows 10 to request a combination of factors and trusted signals to unlock their devices.
Which organizations can take advantage of Multi-factor unlock? Those who:
Have expressed that PINs alone do not meet their security needs.
Want to prevent Information Workers from sharing credentials.
Want their organizations to comply with regulatory two-factor authentication policy.
Want to retain the familiar Windows sign-in user experience and not settle for a custom solution.
You enable multi-factor unlock using Group Policy. The Configure device unlock factors policy setting is
located under Computer Configuration\Administrative Templates\Windows Components\Windows
Hello for Business .
PIN {D6886603-9D2F-4EB2-B667-1971041FA96B}
Fingerprint {BEC09223-B018-416D-A0AC-523971B639F5}
NOTE
Multifactor unlock does not support third-party credential providers or credential providers not listed in the above table.
The default credential providers for the First unlock factor credential provider include:
PIN
Fingerprint
Facial Recognition
The default credential providers for the Second unlock factor credential provider include:
Trusted Signal
PIN
Configure a comma separated list of credential provider GUIDs you want to use as first and second unlock
factors. While a credential provider can appear in both lists, remember that a credential supported by that
provider can only satisfy one of the unlock factors. Listed credential providers do not need to be in any specific
order.
For example, if you include the PIN and fingerprint credential providers in both first and second factor lists, a
user can use their fingerprint or PIN as the first unlock factor. However, whichever factor they used to satisfy the
first unlock factor cannot be used to satisfy the second unlock factor. Each factor can therefore be used exactly
once. The Trusted Signal provider can only be specified as part of the Second unlock factor credential provider
list.
<rule schemaVersion="1.0">
</rule>
Signal element
Each rule element has a signal element. All signal elements have a type element and value. Windows 10,
version 1709 supports the ipConfig and bluetooth type values.
AT T RIB UT E VA L UE
Bluetooth
You define the bluetooth signal with additional attributes in the signal element. The bluetooth configuration
does not use any other elements. You can end the signal element with short ending tag "/>".
classOfDevice "number" no
rssiMin "number" no
rssiMaxDelta "number" no
Example
<rule schemaVersion="1.0">
<signal type="bluetooth" scenario="Authentication" classOfDevice="512" rssiMin="-10" rssiMaxDelta="-
10"/>
</rule>
The classofDevice attribute defaults to Phone and uses the values from the following table:
DESC RIP T IO N VA L UE
Miscellaneous 0
Computer 256
Phone 512
Audio/Video 1024
Peripheral 1280
Imaging 1536
Wearable 1792
Toy 2048
Health 2304
DESC RIP T IO N VA L UE
Uncategorized 7936
The rssiMin attribute value signal indicates the strength needed for the device to be considered "in-range". The
default value of -10 enables a user to move about an average size office or cubicle without triggering Windows
to lock the device. The rssiMaxDelta has a default value of -10 , which instruct Windows 10 to lock the device
once the signal strength weakens by more than measurement of 10.
RSSI measurements are relative and lower as the bluetooth signals between the two paired devices reduces.
Therefore a measurement of 0 is stronger than -10, which is stronger than -60, which is an indicator the devices
are moving further apart from each other.
IMPORTANT
Microsoft recommends using the default values for this policy setting. Measurements are relative, based on the varying
conditions of each environment. Therefore, the same values may produce different results. Test policy settings in each
environment prior to broadly deploying the setting. Use the rssiMIN and rssiMaxDelta values from the XML file created
by the Group Policy Management Editor or remove both attributes to use the default values.
IP Configuration
You define IP configuration signals using one or more ipConfiguration elements. Each element has a string
value. IpConfiguration elements do not have attributes or nested elements.
I P v 4 P r e fi x
The IPv4 network prefix represented in Internet standard dotted-decimal notation. A network prefix that uses the
Classless Inter-Domain Routing (CIDR) notation is required as part of the network string. A network port must
not be present in the network string. A signal element may only contain one ipv4Prefix element.
Example
<ipv4Prefix>192.168.100.0/24</ipv4Prefix>
The assigned IPv4 addresses in the range of 192.168.100.1 to 192.168.100.254 match this signal configuration.
IPv4 Gat ew ay
The IPv4 network gateway represented in Internet standard dotted-decimal notation. A network port or prefix
must not be present in the network string. A signal element may only contain one ipv4Gateway element.
Example
<ipv4Gateway>192.168.100.10</ipv4Gateway>
I P v 4 D h c p Se r v e r
The IPv4 DHCP server represented in Internet standard dotted-decimal notation. A network port or prefix must
not be present in the network string. A signal element may only contain one ipv4DhcpSer ver element.
Example
<ipv4DhcpServer>192.168.100.10</ipv4DhcpServer>
I P v 4 D n s Se r v e r
The IPv4 DNS server represented in Internet standard dotted-decimal notation. A network port or prefix must
not be present in the network string.The signal element may contain one or more ipv4DnsSer ver elements.
Example:
<ipv4DnsServer>192.168.100.10</ipv4DnsServer>
I P v 6 P r e fi x
The IPv6 network prefix represented in IPv6 network using Internet standard hexadecimal encoding. A network
prefix in CIDR notation is required as part of the network string. A network port or scope ID must not be present
in the network string. A signal element may only contain one ipv6Prefix element.
Example
<ipv6Prefix>21DA:D3::/48</ipv6Prefix>
IPv6 Gat ew ay
The IPv6 network gateway represented in Internet standard hexadecimal encoding. An IPv6 scope ID may be
present in the network string. A network port or prefix must not be present in the network string. A signal
element may only contain one ipv6Gateway element.
Example
<ipv6Gateway>21DA:00D3:0000:2F3B:02AA:00FF:FE28:9C5A%2</ipv6Gateway>
I P v 6 D h c p Se r v e r
The IPv6 DNS server represented in Internet standard hexadecimal encoding. An IPv6 scope ID may be present
in the network string. A network port or prefix must not be present in the network string. A signal element may
only contain one ipv6DhcpSer ver element.
Example
<ipv6DhcpServer>21DA:00D3:0000:2F3B:02AA:00FF:FE28:9C5A%2</ipv6DhcpServer
I P v 6 D n s Se r v e r
The IPv6 DNS server represented in Internet standard hexadecimal encoding. An IPv6 scope ID may be present
in the network string. A network port or prefix must not be present in the network string. The signal element
may contain one or more ipv6DnsSer ver elements.
Example
<ipv6DnsServer>21DA:00D3:0000:2F3B:02AA:00FF:FE28:9C5A%2</ipv6DnsServer>
d n s Su ffi x
The fully qualified domain name of your organization's internal DNS suffix where any part of the fully qualified
domain name in this setting exists in the computer's primary DNS suffix. The signal element may contain one
or more dnsSuffix elements.
Example
<dnsSuffix>corp.contoso.com</dnsSuffix>
Wi-Fi
Applies to:
Windows 10, version 1803
You define Wi-Fi signals using one or more wifi elements. Each element has a string value. Wifi elements do not
have attributes or nested elements.
SSID
Contains the service set identifier (SSID) of a wireless network. The SSID is the name of the wireless network.
The SSID element is required.
<ssid>corpnetwifi</ssid>
BSSID
Contains the basic service set identifier (BSSID) of a wireless access point. the BSSID is the mac address of the
wireless access point. The BSSID element is optional.
Example
<bssid>12-ab-34-ff-e5-46</bssid>
Security
Contains the type of security the client uses when connecting to the wireless network. The security element is
required and must contain one of the following values:
VA L UE DESC RIP T IO N
Example
<security>WPA2-Enterprise</security>
TrustedRootCA
Contains the thumbprint of the trusted root certificate of the wireless network. This may be any valid trusted
root certificate. The value is represented as hexadecimal string where each byte in the string is separated by a
single space. This element is optional.
Example
<trustedRootCA>a2 91 34 aa 22 3a a2 3a 4a 78 a2 aa 75 a2 34 2a 3a 11 4a aa</trustedRootCA>
Sig_quality
Contains numeric value ranging from 0 to 100 to represent the wireless network's signal strength needed to be
considered a trusted signal.
Example
<sig_quality>80</sig_quality>
<rule schemaVersion="1.0">
<signal type="ipConfig">
<ipv4Prefix>10.10.10.0/24</ipv4Prefix>
<ipv4DnsServer>10.10.0.1</ipv4DnsServer>
<ipv4DnsServer>10.10.0.2</ipv4DnsServer>
<dnsSuffix>corp.contoso.com</dnsSuffix>
</signal>
</rule>
Example 2
This example configures an IpConfig signal type using a dnsSuffix element and a bluetooth signal for phones.
This configuration is wrapped for reading. Once properly formatted, the entire XML contents must be a single
line. This example implies that either the ipconfig or the Bluetooth rule must evaluate to true, for the resulting
signal evaluation to be true.
NOTE
Separate each rule element using a comma.
<rule schemaVersion="1.0">
<signal type="ipConfig">
<dnsSuffix>corp.contoso.com</dnsSuffix>
</signal>
</rule>,
<rule schemaVersion="1.0">
<signal type="bluetooth" scenario="Authentication" classOfDevice="512" rssiMin="-10" rssiMaxDelta="-10"/>
</rule>
Example 3
This example configures the same as example 2 using compounding And elements. This example implies that
the ipconfig and the Bluetooth rule must evaluate to true, for the resulting signal evaluation to be true.
<rule schemaVersion="1.0">
<and>
<signal type="ipConfig">
<dnsSuffix>corp.microsoft.com</dnsSuffix>
</signal>
<signal type="bluetooth" scenario="Authentication" classOfDevice="512" rssiMin="-10" rssiMaxDelta="-10"/>
</and>
</rule>
Example 4
This example configures Wi-Fi as a trusted signal (Windows 10, version 1803)
<rule schemaVersion="1.0">
<signal type="wifi">
<ssid>contoso</ssid>
<bssid>12-ab-34-ff-e5-46</bssid>
<security>WPA2-Enterprise</security>
<trustedRootCA>a2 91 34 aa 22 3a a2 3a 4a 78 a2 aa 75 a2 34 2a 3a 11 4a aa</trustedRootCA>
<sig_quality>80</sig_quality>
</signal>
</rule>
IMPORTANT
PIN must be in at least one of the groups
Trusted signals must be combined with another credential provider
You cannot use the same unlock factor to satisfy both categories. Therefore, if you include any credential provider in
both categories, it means it can satisfy either category, but not both.
The multifactor unlock feature is also supported via the Passport for Work CSP. See Passport For Work CSP for more
information.
8. In the content pane, double-click Configure device unlock factors . Click Enable . The Options section
populates the policy setting with default values.
9. Configure first and second unlock factors using the information in Configure Unlock Factors.
10. If using trusted signals, configure the trusted signals used by the unlock factor using the information in
Configure Signal Rules for the Trusted Signal Credential Provider.
11. Click OK to close the Group Policy Management Editor . Use the Group Policy Management
Console to deploy the newly created Group Policy object to your organization's computers.
Troubleshooting
Multi-factor unlock writes events to event log under Application and Ser vices
Logs\Microsoft\Windows\HelloForBusiness with the category name Device Unlock .
Events
EVEN T ID DETA IL S
Requirements
Windows 10
Cloud only, Hybrid, and On-premises only Windows Hello for Business deployments
Azure AD joined, Hybrid Azure AD joined, and Enterprise joined devices
Windows Hello for Business supports using a certificate deployed to a Windows Hello for Business container as
a supplied credential to establish a remote desktop connection to a server or another device. This functionality is
not supported for key trust deployments. This feature takes advantage of the redirected smart card capabilities
of the remote desktop protocol. Windows Hello for Business key trust can be used with Windows Defender
Remote Credential Guard.
Microsoft continues to investigate supporting using keys trust for supplied credentials in a future release.
IMPORTANT
The remote desktop with biometric feature does not work with Dual Enrollment feature or scenarios where the user
provides alternative credentials. Microsoft continues to investigate supporting the feature.
Related topics
Windows Hello for Business
Manage Windows Hello for Business in your organization
Why a PIN is better than a password
Prepare people to use Windows Hello
Windows Hello and password changes
Windows Hello errors during PIN creation
Event ID 300 - Windows Hello successfully created
Windows Hello biometrics in the enterprise
Windows Hello for Business Known Deployment
Issues
3/5/2021 • 7 minutes to read • Edit Online
The content of this article is to help troubleshoot and workaround known deployment issues for Windows Hello
for Business. Each issue below will describe the applicable deployment type Windows versions.
Hybrid Key Trust Logon Broken Due to User Public Key Deletion
Applies to:
Hybrid key trust deployments
Windows Server 2016, builds 14393.3930 to 14393.4048
Windows Server 2019, builds 17763.1457 to 17763.1613
In Hybrid key trust deployments with domain controllers running certain builds of Windows Server 2016 and
Windows Server 2019, the user's Windows Hello for Business key is deleted after they sign-in. Subsequent sign-
ins will fail until the user's key is synced during the next Azure AD Connect delta sync cycle.
Identifying User Public Key Deletion Issue
After the user provisions a Windows Hello for Business credential in a hybrid key trust environment, the key
must sync from Azure AD to AD during an Azure AD Connect sync cycle. The user's public key will be written to
the msDS-KeyCredentialLink attribute of the user object.
Before the user's Windows Hello for Business key is synced, sign-in's with Windows Hello for Business will fail
with the error message, "That option is temporarily unavailable. For now, please use a different method to sign
in." After the sync is successful, the user should be able to login and unlock with their PIN or enrolled biometrics.
In environments impacted with this issue, after the first sign-in with Windows Hello for Business after
provisioning is completed, the next sign-in attempt will fail. In environments where domain controllers are
running a mix of builds, only some may be impacted by this issue and subsequent logon attempts may be sent
different domain controllers. This may result in the sign-in failures appearing to be intermittent.
After the initial logon attempt, the user's Windows Hello for Business public key is being deleted from the
msDS-KeyCredentialLink attribute. This can be verified by querying a user's msDS-KeyCredentialLink attribute
before and after sign-in. The msDS-KeyCredentialLink can be queried in AD using Get-ADUser and specifying
msds-keycredentiallink for the -Properties parameter.
Resolving User Public Key Deletion Issue
To resolve this behavior, upgrade Windows Server 2016 and 2019 domain controllers to with the latest patches.
For Windows Server 2016, this behavior is fixed in build 14393.4104 (KB4593226) and later. For Windows
Server 2019, this behavior is fixed in build 17763.1637 (KB4592440).
The Kerberos client received a KDC certificate that does not have a matched domain name.
If a device has recently been joined to a domain, then there may be a delay before the device authentication
occurs. If the failing state of this prerequisite check persists, then it can indicate an issue with the AD FS
configuration.
If this AD FS scope issue is present, event logs on the AD FS server will indicate an authentication failure from
the client. This error will be logged in event logs under AD FS/Admin as event ID 1021 and the event will specify
that the client is forbidden access to resource
'http://schemas.microsoft.com/ws/2009/12/identityserver/selfscope' with scope 'ugs':
(Get-AdfsApplicationPermission -ServerRoleIdentifiers
'http://schemas.microsoft.com/ws/2009/12/identityserver/selfscope' | ?{ $_.ClientRoleIdentifier -eq
'38aa3b87-a06d-4817-b275-7a316988d93b' }).ObjectIdentifier
Applies to
Windows 10
When you set up Windows Hello in Windows 10, you may get an error during the Create a PIN step. This topic
lists some of the error codes with recommendations for mitigating the problem. If you get an error code that is
not listed here, contact Microsoft Support.
Error mitigations
When a user encounters an error when creating the work PIN, advise the user to try the following steps. Many
errors can be mitigated by one of these steps.
1. Try to create the PIN again. Some errors are transient and resolve themselves.
2. Sign out, sign in, and try to create the PIN again.
3. Reboot the device and then try to create the PIN again.
4. Unjoin the device from Azure Active Directory (Azure AD), rejoin, and then try to create the PIN again. To
unjoin a desktop PC, go to Settings > System > About and select Disconnect from organization . To
unjoin a device running Windows 10 Mobile, you must reset the device.
5. On mobile devices, if you are unable to setup a PIN after multiple attempts, reset your device and start over.
For help on how to reset your phone go to Reset my phone. If the error occurs again, check the error code
against the following table to see if there is another mitigation for that error. When no mitigation is listed in
the table, contact Microsoft Support for assistance.
H EX C A USE M IT IGAT IO N
0x8009000F The container or key already exists. Unjoin the device from Azure AD and
rejoin.
0x80090011 The container or key was not found. Unjoin the device from Azure AD and
rejoin.
0x80090035 Policy requires TPM and the device Change the Windows Hello for
does not have TPM. Business policy to not require a TPM.
0x80090036 User canceled an interactive dialog. User will be asked to try again.
0x801C0003 User is not authorized to enroll. Check if the user has permission to
perform the operation.
0x801C0010 The AIK certificate is not valid or Sign out and then sign in again.
trusted.
0x801C0011 The attestation statement of the Sign out and then sign in again.
transport key is invalid.
0x801C0012 Discovery request is not in a valid Sign out and then sign in again.
format.
0x801C0015 The device is required to be joined to Join the device to an Active Directory
an Active Directory domain. domain.
0x801C03E9 Server response message is invalid Sign out and then sign in again.
0x801C03EA Server failed to authorize user or Check if the token is valid and user has
device. permission to register Windows Hello
for Business keys.
0x801C03EB Server response http status is not valid Sign out and then sign in again.
0x801C03EC Unhandled exception from server. sign out and then sign in again.
0x801C03ED Multi-factor authentication is required Sign out and then sign in again. If that
for a 'ProvisionKey' operation, but was doesn't resolve the issue, unjoin the
not performed. device from Azure AD and rejoin.
Allow user(s) to join to Azure AD under
-or- Azure AD Device settings.
-or-
-or-
-or-
0x801C03EF The AIK certificate is no longer valid. Sign out and then sign in again.
H EX C A USE M IT IGAT IO N
0x801C044D Authorization token does not contain Unjoin the device from Azure AD and
device ID. rejoin.
Unable to obtain user token. Sign out and then sign in again. Check
network and credentials.
0x801C044E Failed to receive user credentials input. Sign out and then sign in again.
H EX C A USE
0X80072F0C Unknown
0x80090020 NTE_FAIL
0x8009002D NTE_INTERNAL_ERROR
Related topics
Windows Hello for Business
How Windows Hello for Business works
Manage Windows Hello for Business in your organization
Why a PIN is better than a password
Prepare people to use Windows Hello
Windows Hello and password changes
Event ID 300 - Windows Hello successfully created
Windows Hello biometrics in the enterprise
Event ID 300 - Windows Hello successfully created
7/23/2019 • 2 minutes to read • Edit Online
Applies to
Windows 10
This event is created when Windows Hello for Business is successfully created and registered with Azure Active
Directory (Azure AD). Applications or services can trigger actions on this event. For example, a certificate
provisioning service can listen to this event and trigger a certificate request.
Event details
P RO DUC T : W IN DO W S 10 O P ERAT IN G SY ST EM
ID: 300
Version: 10
Resolve
This is a normal condition. No further action is required.
Related topics
Windows Hello for Business
How Windows Hello for Business works
Manage Windows Hello for Business in your organization
Why a PIN is better than a password
Prepare people to use Windows Hello
Windows Hello and password changes
Windows Hello errors during PIN creation
Windows Hello biometrics in the enterprise
Windows Hello and password changes
7/23/2019 • 2 minutes to read • Edit Online
Applies to
Windows 10
When you set up Windows Hello, the PIN or biometric gesture that you use is specific to that device. You can set
up Hello for the same account on multiple devices. If the PIN or biometric is configured as part of Windows
Hello for Business, changing the account password will not impact sign-in or unlock with these gestures since it
uses a key or certificate. However, if Windows Hello for Business is not deployed and the password for that
account changes, you must provide the new password on each device to continue to use Hello.
Example
Let's suppose that you have set up a PIN for your Microsoft account on Device A . You use your PIN to sign in on
Device A and then change the password for your Microsoft account. Because you were using Device A when
you changed your password, the PIN on Device A will continue to work with no other action on your part.
Suppose instead that you sign in on Device B and change your password for your Microsoft account. The next
time that you try to sign in on Device A using your PIN, sign-in will fail because the account credentials that
Hello on Device A knows will be outdated.
NOTE
This example also applies to an Active Directory account when Windows Hello for Business is not implemented.
Related topics
Windows Hello for Business
How Windows Hello for Business works
Manage Windows Hello for Business in your organization
Why a PIN is better than a password
Prepare people to use Windows Hello
Windows Hello errors during PIN creation
Event ID 300 - Windows Hello successfully created
Windows Hello biometrics in the enterprise
Technology and Terms
3/5/2021 • 15 minutes to read • Edit Online
Applies to:
Windows 10
Attestation Identity Keys
Azure AD Joined
Azure AD Registered
Certificate Trust
Cloud Deployment
Cloud Experience Host
Deployment Type
Endorsement Key
Federated Environment
Hybrid Azure AD Joined
Hybrid Deployment
Join Type
Key Trust
Managed Environment
On-premises Deployment
Pass-through Authentication
Password Hash Synchronization
Primary Refresh Token
Storage Root Key
Trust Type
Trusted Platform Module
Windows 10 creates AIKs protected by the TPM, if available, that are 2048-bit RSA signing keys. Microsoft hosts
a cloud service called Microsoft Cloud CA to establish cryptographically that it is communicating with a real
TPM and that the TPM possesses the presented AIK. After the Microsoft Cloud CA service has established these
facts, it will issue an AIK certificate to the Windows 10 device.
Many existing devices that will upgrade to Windows 10 will not have a TPM, or the TPM will not contain an
endorsement certificate. To accommodate those devices, Windows 10 allows the issuance of AIK
cer tificates without the presence of an endorsement cer tificate. Such AIK certificates are not issued by
Microsoft Cloud CA. Note that this is not as trustworthy as an endorsement certificate that is burned into the
device during manufacturing, but it will provide compatibility for advanced scenarios like Windows Hello for
Business without TPM.
In the issued AIK certificate, a special OID is added to attest that endorsement certificate was used during the
attestation process. This information can be leveraged by a relying party to decide whether to reject devices that
are attested using AIK certificates without an endorsement certificate or accept them. Another scenario can be to
not allow access to high-value assets from devices that are attested by an AIK certificate that is not backed by an
endorsement certificate.
Related topics
Endorsement Key, Storage Root Key, Trusted Platform Module
More information
Windows Client Certificate Enrollment Protocol: Glossary
TPM Library Specification
Return to Top
Azure AD Joined
Azure AD Join is intended for organizations that desire to be cloud-first or cloud-only. There is no restriction on
the size or type of organizations that can deploy Azure AD Join. Azure AD Join works well even in an hybrid
environment and can enable access to on-premise applications and resources.
Related topics
Join Type, Hybrid Azure AD Joined
More information
Introduction to device management in Azure Active Directory.
Return to Top
Azure AD Registered
The goal of Azure AD registered devices is to provide you with support for the Bring Your Own Device (BYOD)
scenario. In this scenario, a user can access your organization's Azure Active Directory controlled resources
using a personal device.
Related topics
Azure AD Joined, Hybrid Azure AD Joined, Join Type
More information
Introduction to device management in Azure Active Directory
Return to Top
Certificate Trust
The certificate trust model uses a securely issued certificate based on the user's Windows Hello for Business
identity to authenticate to on-premises Active Directory. The certificate trust model is supported in hybrid and
on-premises deployments and is compatible with Windows Server 2008 R2 and later domain controllers.
Related topics
Deployment Type, Hybrid Azure AD Joined, Hybrid Deployment, Key Trust, On-premises Deployment, Trust Type
More information
Windows Hello for Business Planning Guide
Return to Top
Cloud Deployment
The Windows Hello for Business Cloud deployment is exclusively for organizations using cloud-based identities
and resources. Device management is accomplished using Intune or a modern management alternative. Cloud
deployments use Azure AD joined or Azure AD registered device join types.
Related topics
Azure AD Joined, Azure AD Registered, Deployment Type, Join Type
Return to Top
Deployment Type
Windows Hello for Business has three deployment models to accommodate the needs of different
organizations. The three deployment models include:
Cloud
Hybrid
On-Premises
Related topics
Cloud Deployment, Hybrid Deployment, On-premises Deployment
More information
Windows Hello for Business Planning Guide
Return to Top
Endorsement Key
The TPM has an embedded unique cryptographic key called the endorsement key. The TPM endorsement key is
a pair of asymmetric keys (RSA size 2048 bits).
The endorsement key public key is generally used for sending securely sensitive parameters, such as when
taking possession of the TPM that contains the defining hash of the owner password. The EK private key is used
when creating secondary keys like AIKs.
The endorsement key acts as an identity card for the TPM.
The endorsement key is often accompanied by one or two digital certificates:
One certificate is produced by the TPM manufacturer and is called the endorsement cer tificate . The
endorsement certificate is used to prove the authenticity of the TPM (for example, that it's a real TPM
manufactured by a specific chip maker) to local processes, applications, or cloud services. The endorsement
certificate is created during manufacturing or the first time the TPM is initialized by communicating with an
online service.
The other certificate is produced by the platform builder and is called the platform cer tificate to indicate
that a specific TPM is integrated with a certain device.
For certain devices that use firmware-based TPM produced by Intel or Qualcomm, the endorsement certificate is
created when the TPM is initialized during the OOBE of Windows 10.
Related topics
Attestation Identity Keys, Storage Root Key, Trusted Platform Module
More information
Understand the TPM endorsement key.
TPM Library Specification
Return to Top
Federated Environment
Primarily for large enterprise organizations with more complex authentication requirements, on-premises
directory objects are synchronized with Azure Active Directory and users accounts are managed on-premises.
With AD FS, users have the same password on-premises and in the cloud and they do not have to sign in again
to use Office 365 or other Azure-based applications. This federated authentication model can provide additional
authentication requirements, such as smart card-based authentication or a third-party multi-factor
authentication and is typically required when organizations have an authentication requirement not natively
supported by Azure AD.
Related topics
Hybrid Deployment, Managed Environment, Pass-through authentication, Password Hash Sync
More information
Choosing the right authentication method for your Azure Active Directory hybrid identity solution
Return to Top
Hybrid Deployment
The Windows Hello for Business hybrid deployment is for organizations that have both on-premises and cloud
resources that are accessed using a managed or federated identity that is synchronized with Azure Active
Directory. Hybrid deployments support devices that are Azure AD registered, Azure AD joined, and hybrid Azure
AD joined. The Hybrid deployment model supports two trust types for on-premises authentication, key trust and
certificate trust.
Related topics
Azure AD Joined, Azure AD Registered, Hybrid Azure AD Joined,
More information
Windows Hello for Business Planning Guide
Return to Top
Join type
Join type is how devices are associated with Azure Active Directory. For a device to authenticate to Azure Active
Directory it must be registered or joined.
Registering a device to Azure AD enables you to manage a device's identity. When a device is registered, Azure
AD device registration provides the device with an identity that is used to authenticate the device when a user
signs-in to Azure AD. You can use the identity to enable or disable a device.
When combined with a mobile device management(MDM) solution such as Microsoft Intune, the device
attributes in Azure AD are updated with additional information about the device. This allows you to create
conditional access rules that enforce access from devices to meet your standards for security and compliance.
For more information on enrolling devices in Microsoft Intune, see Enroll devices for management in Intune .
Joining a device is an extension to registering a device. This means, it provides you with all the benefits of
registering a device and in addition to this, it also changes the local state of a device. Changing the local state
enables your users to sign-in to a device using an organizational work or school account instead of a personal
account.
Related topics
Azure AD Joined, Azure AD Registered, Hybrid Azure AD Joined
More information
Introduction to device management in Azure Active Directory
Return to Top
Key Trust
The key trust model uses the user's Windows Hello for Business identity to authenticate to on-premises Active
Directory. The key trust model is supported in hybrid and on-premises deployments and requires Windows
Server 2016 domain controllers.
Related topics
Certificate Trust, Deployment Type, Hybrid Azure AD Joined, Hybrid Deployment, On-premises Deployment,
Trust Type
More information
Windows Hello for Business Planning Guide
Return to Top
Managed Environment
Managed environments are for non-federated environments where Azure Active Directory manages the
authentication using technologies such as Password Hash Synchronization and Pass-through Authentication
rather than a federation service such as Active Directory Federation Services.
Related topics
Federated Environment, Pass-through authentication, Password Hash Synchronization
Return to Top
On-premises Deployment
The Windows Hello for Business on-premises deployment is for organizations that exclusively have on-premises
resources that are accessed using Active Directory identities. On-premises deployments support domain joined
devices. The on-premises deployment model supports two authentication trust types, key trust and certificate
trust.
Related topics
Cloud Deployment, Deployment Type, Hybrid Deployment
More information
Windows Hello for Business Planning Guide
Return to Top
Pass-through authentication
Provides a simple password validation for Azure AD authentication services using a software agent running on
one or more on-premises servers to validate the users directly with your on-premises Active Directory. With
pass-through authentication (PTA), you synchronize on-premises Active Directory user account objects with
Office 365 and manage your users on-premises. Allows your users to sign in to both on-premises and Office
365 resources and applications using their on-premises account and password. This configuration validates
users' passwords directly against your on-premises Active Directory without sending password hashes to Office
365. Companies with a security requirement to immediately enforce on-premises user account states, password
policies, and logon hours would use this authentication method. With seamless single sign-on, users are
automatically signed in to Azure AD when they are on their corporate devices and connected to your corporate
network.
Related topics
Federated Environment, Managed Environment, Password Hash Synchronization
More information
Choosing the right authentication method for your Azure Active Directory hybrid identity solution
Return to Top
Trust type
The trust type determines how a user authenticates to the Active Directory to access on-premises resources.
There are two trust types, key trust and certificate trust. The hybrid and on-premises deployment models
support both trust types. The trust type does not affect authentication to Azure Active Directory. Windows Hello
for Business authentication to Azure Active Directory always uses the key, not a certificate (excluding smart card
authentication in a federated environment).
Related topics
Certificate Trust, Hybrid Deployment, Key Trust, On-premises Deployment
More information
Windows Hello for Business Planning Guide
Return to Top
Applies to
Windows 10