On Prem Fileshare Access With Azure Joined Device, Windows Hello For Business and Cloud Trust

Philipp Naether 5 Reputation points
2024-06-03T13:20:01.43+00:00

Hello,

I have a Azure AD joined device with cloud trust and therefor Windows Hello for Business enabled.
I am trying to access a on prem fileshare. When logged in via PIN, authentication does not work - I get prompt to enter the PIN all the time. If I log into the machine with password, authentication to the on prem resources work.

Looking into the KRB5 traffic with wireshark, I get a KRB error "kdc_err_client_name_mismatch" back from the DC when using PIN. Unfortunately, I don't really know what to do with this error.

Community Center Not monitored
{count} votes

2 answers

Sort by: Most helpful
  1. William Nieto 545 Reputation points
    2024-06-04T13:55:25.7466667+00:00

    It seems you’re encountering an issue with Windows Hello for Business on your Azure AD-joined device. Let’s troubleshoot this step by step:

    Windows Hello for Business known deployment issues

    1. Check Domain Trust Relationship: Ensure that there is a proper trust relationship established between the on-premises Active Directory (AD) and Azure AD.

    Verify Hybrid AD Join Settings: Confirm that your device is correctly configured for hybrid AD join. This involves connecting to both on-premises AD and Azure AD.

    Update Azure AD Connect: Make sure you’re running the latest version of Azure AD Connect. Keeping it up to date can resolve compatibility issues.

    Check Certificate Configuration: Verify that the certificates used for Windows Hello for Business are correctly configured. Ensure that the device has the necessary certificates.

    Review Windows Hello for Business Policy: Check the Windows Hello for Business policy settings to ensure they align with your requirements.

    Check Event Viewer Logs: Examine the Event Viewer logs for any relevant errors or warnings related to Windows Hello for Business.

    Restart Devices and Services: Sometimes a simple restart can resolve issues. Restart your device and relevant services (such as Azure AD Connect).

    Regarding the KRB error “kdc_err_client_name_mismatch”:

    Check DNS Configuration: Ensure that your device’s DNS configuration is correct. It should be able to resolve both the on-premises domain and Azure AD domain names.

    Verify SPN (Service Principal Name) Configuration: Confirm that the SPNs associated with your device are correctly set up. SPNs are used for Kerberos authentication.

    By following these steps, you should be able to identify and resolve the issue with accessing on-premises file shares using Windows Hello for Business.

    If this answer solves your issue, please vote for it so other community members know that this is a quality answer.


  2. Philipp Naether 5 Reputation points
    2024-09-26T17:56:11.1966667+00:00

    @COUMET Charles
    I found what the issue was. The user object I was testing with was member of Builtin/Administrators and Users/Domain-Administrators. Stupid mistake by me...
    I removed the user from the groups and reset its attribute "adminCount" to not-set, did a full sync with ADConnect and voila, on-prem SSO with PIN login now works. Admin accounts are prevented from changes from the cloud, but the Cloud needs to write back the KeyCredentialLink attribute. I assume this mismatch caused the "kdc_err_client_name_mismatch" in the network trace.


Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.