Temporary Access Pass - Hello For Business setup still needs password

GonWild 426 Reputation points
2022-08-09T11:37:37.05+00:00

Hi,
Got TAP setup, and it works on enrolling a windows device(autopilot). But before setting up hello for business, I am presented with the windows login screen asking for the users password (which we are hoping to avoid to go passwordless). I cannot find any way around entering the password, to proceed.

Have checked the obvious stuff... TAP code or policy has multi use, user is in TAP policy...

The doc says WhfB is supposed to work with TAP
https://learn.microsoft.com/en-us/azure/active-directory/authentication/howto-authentication-temporary-access-pass

Any other ideas or how to troubleshoot?

Microsoft Security | Intune | Enrollment
Microsoft Security | Microsoft Entra | Microsoft Entra ID
Windows for business | Windows Client for IT Pros | User experience | Other
0 comments No comments
{count} votes

3 answers

Sort by: Most helpful
  1. GonWild 426 Reputation points
    2022-08-12T13:25:37.697+00:00

    There's no such thing really. Autopilot is more of an umbrella term for a set of functionalities that enables provisioning of a Windows endpoint. As soon as Windows setup completes, MDM policy (from Intune in this case) will begin flowing to the device and begin being applied -- in normal Autopilot scenarios, this is indicated to the end-user by the ESP. This includes policies/profiles and app assignments which are shown and tracked on the ESP page. If any of these initiate a reboot, the user will be prompted for their credentials again because there's no way to securely cache a user's credentials. If you are not watching the process end-to-end, you can review the system's event logs and MDM diagnostic logs to determine if a reboot is happening during ESP due to an MDM/Intune policy or application assignment.

    aha.. from the log; microsoft-windows-devicemanagement-enterprise-diagnostics-provider-admin:

    The following URI has triggered a reboot: (./Device/Vendor/MSFT/Policy/Config/ExploitGuard/ExploitProtectionSettings)

    I see we had some endpoint security policies, so I testet excluding the device from our exploitguard policy settings, wiped the device-->new login with TAP.... voila!
    Enrollment now finishes without the reboot, WhfB setup pops up, all is good! thanks @Jason Sandys for helping to pinpoint this!

    however, does this mean that the TAP/passwordless scenario is incompatible with any settings or policy that causes reboot during enrollment/ESP? (before WhfB setup)

    1 person found this answer helpful.

  2. JimmySalian-2011 42,496 Reputation points
    2022-08-09T12:04:24.94+00:00

    Hi,

    I assuming the users have device registered in Azure AD and followed the registration process for MFA, however there are 2 points to consider as per the article one is for Azure AD joined devices and other is for Hybrid Azure AD.

    Temporary Access Pass usage for setting up Windows Hello for Business varies based on the devices joined state, So what is the state of the device when you try to use for WHFB? If it is one of the above it will prompt for authentication.

    On already Azure AD Joined devices, users must first authenticate with another method such as a password, smartcard or FIDO2 key, before using TAP to set up Windows Hello for Business.

    On Hybrid Azure AD Joined devices, users must first authenticate with another method such as a password, smartcard or FIDO2 key, before using TAP to set up Windows Hello for Business.

    It seems it is part of the design and workflow for WHFB setup.


  3. Mikkel Lund Knudsen 116 Reputation points
    2022-11-14T20:22:17.723+00:00

    Hey @GonWild

    Did you manage to find a solution here?

    Just felt across this article - seems like Peter Klapwijk found a solution where he did use : EnableWebSignin here : https://learn.microsoft.com/en-us/windows/client-management/mdm/policy-csp-authentication#authentication-enablewebsignin

    Looking forward to hear from you :)


Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.