A cloud-based identity and access management service for securing user authentication and resource access
Yes. AADLogin (Microsoft Entra login for Windows / AADLoginForWindows extension) works independently of Windows Hello for Business.
Key points relevant to the scenario:
- Authentication model
- Users can authenticate to Microsoft Entra ID using:
- Cloud authentication (Password Hash Sync or Pass-through Authentication), or
- Federated authentication (AD FS or other federation).
- These methods apply to both cloud-only and hybrid deployments and are not dependent on Windows Hello for Business.
- Windows Hello for Business is an additional, more secure sign-in method (keys, biometrics, PIN), but not a prerequisite for Entra-based sign-in.
- Users can authenticate to Microsoft Entra ID using:
- Device registration and join
- For hybrid or cloud-only deployments, devices register in Microsoft Entra ID.
- AADLogin uses that Entra identity and device registration to allow sign-in to the server.
- This works whether or not Windows Hello for Business is deployed.
- Windows Hello for Business is optional
- Windows Hello for Business provides passwordless or MFA-based sign-in (biometrics/PIN + key/cert-based auth), but it is a security feature layered on top of Entra authentication.
- The deployment options (cloud-only, hybrid, on-premises) describe how Hello for Business integrates with Entra/AD, not a requirement for Entra sign-in itself.
- Therefore, users can continue to sign in with their
******@domain.xxEntra credentials (username + password, plus any configured MFA) to the new RDS server via AADLogin even if Windows Hello for Business is not enabled.
So, AADLogin will work without Windows Hello for Business, provided that:
- The VM is properly registered/connected (Azure Arc + AADLogin extension), and
- Microsoft Entra authentication (cloud or federated) is correctly configured and reachable from the server.
References: