Hybrid Azure AD joined Windows Hello for Business Certificate Trust New Installation

This document describes Windows Hello for Business functionalities or scenarios that apply to:
Deployment type: hybrid
Trust type: certificate trust
Device registration type: Azure AD join, Hybrid Azure AD join



Windows Hello for Business involves configuring distributed technologies that may or may not exist in your current infrastructure. Hybrid certificate trust deployments of Windows Hello for Business rely on these technologies

New installations are considerably more involved than existing implementations because you are building the entire infrastructure. Microsoft recommends you review the new installation baseline to validate your existing environment has all the needed configurations to support your hybrid certificate trust Windows Hello for Business deployment. If your environment meets these needs, you can read the Configure Azure Device Registration section to prepare your Windows Hello for Business deployment by configuring Azure device registration.

The new installation baseline begins with a basic Active Directory deployment and enterprise PKI. This document expects you have Active Directory deployed using Windows Server 2008 R2 or later domain controllers.

Active Directory

Production environments should follow Active Directory best practices regarding the number and placement of domain controllers to ensure adequate authentication throughout the organization.

Lab environments and isolated proof of concepts may want to limit the number of domain controllers. The purpose of these environments is to experiment and learn. Reducing the number of domain controllers can prevent troubleshooting issue, such as Active Directory replication, which is unrelated to activity's goal.

Section Review

  • Minimum Windows Server 2008 R2 domain controllers
  • Minimum Windows Server 2008 R2 domain and forest functional level
  • Functional networking, name resolution, and Active Directory replication

Public Key Infrastructure

Windows Hello for Business must have a public key infrastructure regardless of the deployment or trust model. All trust models depend on the domain controllers having a certificate. The certificate serves as a root of trust for clients to ensure they are not communicating with a rogue domain controller. The certificate trust model extends certificate issuance to client computers. During Windows Hello for Business provisioning, the user receives a sign-in certificate.

This guide assumes most enterprises have an existing public key infrastructure. Windows Hello for Business depends on a Windows enterprise public key infrastructure running the Active Directory Certificate Services role from Windows Server 2012 or later.

For more details about configuring a Windows enterprise public key infrastructure and installing Active Directory Certificate Services, see Follow the Windows Hello for Business hybrid key trust deployment guide and Install the Certification Authority.

Note

Never install a certificate authority on a domain controller in a production environment.

Lab-based public key infrastructure

The following instructions may be used to deploy simple public key infrastructure that is suitable for a lab environment.

Sign-in using Enterprise Admin equivalent credentials on Windows Server 2012 or later server where you want the certificate authority installed.

  1. Open an elevated Windows PowerShell prompt.

  2. Use the following command to install the Active Directory Certificate Services role.

    Add-WindowsFeature Adcs-Cert-Authority -IncludeManagementTools
    
  3. Use the following command to configure the Certificate Authority using a basic certificate authority configuration.

    Install-AdcsCertificationAuthority
    

Configure a Production Public Key Infrastructure

If you do have an existing public key infrastructure, please review Certification Authority Guidance from Microsoft TechNet to properly design your infrastructure. Then, consult the Test Lab Guide: Deploying an AD CS Two-Tier PKI Hierarchy for instructions on how to configure your public key infrastructure using the information from your design session.

Section Review

  • Minimum Windows Server 2012 Certificate Authority.
  • Enterprise Certificate Authority.
  • Functioning public key infrastructure.

Azure Active Directory

You’ve prepared your Active Directory. Hybrid Windows Hello for Business deployment needs Azure Active Directory to host your cloud-based identities.

The next step of the deployment is to follow the Creating an Azure AD tenant process to provision an Azure tenant for your organization.

Section Review

  • Review the different ways to establish an Azure Active Directory tenant.
  • Create an Azure Active Directory Tenant.
  • Purchase the appropriate Azure Active Directory subscription or licenses, if necessary.

Multifactor Authentication Services

Windows Hello for Business uses multi-factor authentication during provisioning and during user initiated PIN reset scenarios, such as when a user forgets their PIN. There are two preferred multi-factor authentication configurations with hybrid deployments—Azure MFA and AD FS using Azure MFA

Review the What is Azure AD Multi-Factor Authentication topic to familiarize yourself its purpose and how it works.

Azure AD Multi-Factor Authentication (MFA) Cloud

Important

As long as your users have licenses that include Azure AD Multi-Factor Authentication, there's nothing that you need to do to turn on Azure MFA. You can start requiring two-step verification on an individual user basis. The licenses that enable Azure MFA are:

  • Azure AD Multi-Factor Authentication
  • Azure Active Directory Premium
  • Enterprise Mobility + Security

If you have one of these subscriptions or licenses, skip the Azure MFA Adapter section.

Azure MFA Provider

If your organization uses Azure MFA on a per-consumption model (no licenses), then review the Create a Multifactor Authentication Provider section to create an Azure MFA Authentication provider and associate it with your Azure tenant.

Configure Azure MFA Settings

Once you have created your Azure MFA authentication provider and associated it with an Azure tenant, you need to configure the multi-factor authentication settings. Review the Configure Azure AD Multi-Factor Authentication settings section to configure your settings.

Azure MFA User States

After you have completed configuring your Azure MFA settings, you want to review configure User States to understand user states. User states determine how you enable Azure MFA for your users.

Azure MFA via ADFS 2016

Alternatively, you can configure Windows Server 2016 Active Directory Federation Services (AD FS) to provide additional multi-factor authentication. To configure, read the Configure AD FS 2016 and Azure MFA section

Section Review

  • Review the overview and uses of Azure AD Multi-Factor Authentication Authentication.
  • Review your Azure Active Directory subscription for Azure AD Multi-Factor Authentication.
  • Create an Azure AD Multi-Factor Authentication Provider, if necessary.
  • Configure Azure AD Multi-Factor Authentication features and settings.
  • Understand the different User States and their effect on Azure AD Multi-Factor Authentication.
  • Consider using Azure AD Multi-Factor Authentication or a third-party multifactor authentication provider with Windows Server 2016 Active Directory Federation Services, if necessary.




Follow the Windows Hello for Business hybrid certificate trust deployment guide

  1. Overview
  2. Prerequisites
  3. New Installation Baseline (You are here)
  4. Configure Azure Device Registration
  5. Configure Windows Hello for Business settings
  6. Sign-in and Provision