I have not had it fail on reading the certificates AFTER I was fully logged in, but the Azure PTR Token is not present or saved. I also turned off all VBS in the BIOS along with memory intergrity, etc. I forced off all VBS on Windows 11 after the change and still had the issue. Removing all smart card drivers did not yield results either.
About 10 months ago we went through something similar like this. That issue was with the TPM Module dropping (good job Lenovo with a terrible BIOS hence, no more Lenovo!). Once the TPM dropped, Windows would put the certificate / token into a hidden folder on the C drive that only Administrators could access. It was easy to prove by giving a user Admin rights to complete a login, then use their certificate with webpages / MS Apps. Once the TPM was re-established, you had to remove their certificate from the store, drop all saved credentials and folders relating to MS Apps and reboot. I have gone through this process again with no change.
Through extensive testing with an RSA certificate, everything is working perfectly. With ECC, only on-network devices successfully work, but MS Apps will not save credentials. Here are the tests / steps I have tried:
ECC Smartcard fails off-network, on-network login works, MS Apps not saving credentials regardless of login
RSA Smartcard good off/on-network and MS Apps DOES save credentials
Cleared TPM - ECC still broke, RSA good
Dropped / re-added to domain - ECC still broke, RSA good
Reloaded Windows 11 24H2 overtop - ECC still broke, RSA good
Refreshed Windows with local install AND downloaded install - ECC still broke, RSA good
Data wiped drive and re-installed Windows 11 locally - ECC still broke, RSA good
In all instances after the reload:
running: certutil -scinfo with the RSA certificate on login yielded successful chain validation on-network / off-network
running: certutil - scinfo with ECC certificate on login yielded successful chain validation as long as on network. If logged in and network removed, chain validation fails.
Cleared smart card drivers - ECC still broke, RSA good
Cleared all certs / drivers- ECC still broke, RSA good
Turned off VBS after reload - ECC still broke, RSA good
Enabled WHfB - Security key works / ECC still broke, RSA good
I did have ONE test that work with ECC, but it was a complicated one. With VBS fully enabled across the board, I cleared all certs / credentials. Logged in on-network with a password. Enabled WHfB and registered a security key. Logged in successfully with security key using WHfB on-network. Locked computer, logged in with ECC Certificate. Locked computer, logged in with WHfB. Rebooted, logged in with ECC Certificate on-network. ALL future ECC Logins worked on-network/off-network including MS Apps. Once I turned off WHfB, smartcard login with ECC Broke off-network and MS Apps. What is happening here when WHfB is enabled? Is it changing how all logins are cached?
This to me points to what security for certificates with device guard / credentials guard Microsoft took in this update. The process of chain validation is acting like the intermediate / root certificate can not be verified when off network. This should be a local check, but Windows is acting like the intermediate and root are not there and the cached CRL checks are not saved using ECC. Ill re-iterate, 23H2 does not have this issue!!!
Seriously Microsoft, chime in here....