Skip to content

Latest commit

 

History

History
93 lines (63 loc) · 4.69 KB

File metadata and controls

93 lines (63 loc) · 4.69 KB
title description ms.date ms.topic
Windows Hello for Business hybrid key trust deployment guide
Learn how to deploy Windows Hello for Business in a hybrid key trust scenario.
03/12/2024
tutorial

Hybrid key trust deployment guide

[!INCLUDE apply-to-hybrid-key-trust]

Important

Windows Hello for Business cloud Kerberos trust is the recommended deployment model when compared to the key trust model. For more information, see cloud Kerberos trust deployment.

[!INCLUDE requirements]

[!div class="checklist"]

Deployment steps

[!div class="checklist"] Once the prerequisites are met, deploying Windows Hello for Business consists of the following steps:

Configure and validate the Public Key Infrastructure

Windows Hello for Business must have a Public Key Infrastructure (PKI) when using the key trust model. The domain controllers must have a certificate, which serves as a root of trust for clients. The certificate ensures that clients don't communicate with rogue domain controllers.

Key trust deployments don't need client-issued certificates for on-premises authentication. Microsoft Entra Connect Sync configures Active Directory user accounts for public key mapping, by synchronizing the public key of the Windows Hello for Business credential to an attribute on the user's Active Directory object (msDS-KeyCredentialLink attribute).

A Windows Server-based PKI or a non-Microsoft Enterprise certification authority can be used. For more information, see Requirements for domain controller certificates from a non-Microsoft CA.

[!INCLUDE lab-based-pki-deploy]

Configure the enterprise PKI

[!INCLUDE dc-certificate-template]

[!INCLUDE dc-certificate-template-dc-hybrid-notes]

[!INCLUDE dc-certificate-template-supersede]

[!INCLUDE unpublish-superseded-templates]

Publish the certificate template to the CA

A certification authority can only issue certificates for certificate templates that are published to it. If you have more than one CA, and you want more CAs to issue certificates based on the certificate template, then you must publish the certificate template to them.

Sign in to the CA or management workstations with Enterprise Admin equivalent credentials.

  1. Open the Certification Authority management console
  2. Expand the parent node from the navigation pane
  3. Select Certificate Templates in the navigation pane
  4. Right-click the Certificate Templates node. Select New > Certificate Template to issue
  5. In the Enable Certificates Templates window, select the Domain Controller Authentication (Kerberos) template you created in the previous steps > select OK
  6. Close the console

Important

If you plan to deploy Microsoft Entra joined devices, and require single sign-on (SSO) to on-premises resources when signing in with Windows Hello for Business, follow the procedures to update your CA to include an http-based CRL distribution point.

Configure and deploy certificates to domain controllers

[!INCLUDE dc-certificate-deployment]

Validate the configuration

[!INCLUDE dc-certificate-validate]

Section review and next steps

[!div class="checklist"] Before moving to the next section, ensure the following steps are complete:

  • Configure domain controller certificate template
  • Supersede existing domain controller certificates
  • Unpublish superseded certificate templates
  • Publish the certificate template to the CA
  • Deploy certificates to the domain controllers
  • Validate the domain controllers configuration

[!div class="nextstepaction"] Next: configure and enroll in Windows Hello for Business >