Configure and provision Windows Hello for Business - cloud Kerberos trust
This document describes Windows Hello for Business functionalities or scenarios that apply to:
- Deployment type: hybrid
- Trust type: cloud Kerberos trust
- Join type: Microsoft Entra join
, Microsoft Entra hybrid join
Deployment steps
Deploying Windows Hello for Business cloud Kerberos trust consists of two steps:
- Set up Microsoft Entra Kerberos.
- Configure a Windows Hello for Business policy and deploy it to the devices.
Deploy Microsoft Entra Kerberos
If you've already deployed on-premises SSO for passwordless security key sign-in, then you've already deployed Microsoft Entra Kerberos in your hybrid environment. You don't need to redeploy or change your existing Microsoft Entra Kerberos deployment to support Windows Hello for Business and you can skip this section.
If you haven't deployed Microsoft Entra Kerberos, follow the instructions in the Enable passwordless security key sign-in to on-premises resources by using Microsoft Entra ID documentation. This page includes information on how to install and use the Microsoft Entra Kerberos PowerShell module. Use the module to create a Microsoft Entra Kerberos server object for the domains where you want to use Windows Hello for Business cloud Kerberos trust.
Configure Windows Hello for Business policy
After setting up the Microsoft Entra Kerberos object, Windows Hello for business cloud Kerberos trust must be enabled on your Windows devices. Follow the instructions below to configure your devices using either Microsoft Intune or group policy (GPO).
For devices managed by Intune, you can use Intune policies to configure Windows Hello for Business.
There are different ways to enable and configure Windows Hello for Business in Intune:
- When the device is enrolled in Intune, a tenant-wide policy is applied to the device. This policy is applied at enrollment time only, and any changes to its configuration won't apply to devices already enrolled in Intune. For this reason, this policy is usually disabled, and Windows Hello for Business can be enabled using a policy targeted to a security group.
- After the device is enrolled in Intune, you can apply a device configuration policy. Any changes to the policy will be applied to the devices during regular policy refresh intervals. There are different policy types to choose from:
Verify the tenant-wide policy
To check the Windows Hello for Business policy applied at enrollment time:
- Sign in to the Microsoft Intune admin center.
- Select Devices > Windows > Windows Enrollment.
- Select Windows Hello for Business.
- Verify the status of Configure Windows Hello for Business and any settings that may be configured.
If the tenant-wide policy is enabled and configured to your needs, you can skip to Configure cloud Kerberos trust policy. Otherwise, follow the instructions below to create a policy using an account protection policy.
Enable Windows Hello for Business
To configure Windows Hello for Business using an account protection policy:
- Sign in to the Microsoft Intune admin center.
- Select Endpoint security > Account protection.
- Select + Create Policy.
- For Platform, select Windows 10 and later and for Profile select Account protection.
- Select Create.
- Specify a Name and, optionally, a Description > Next.
- Under Block Windows Hello for Business, select Disabled and multiple policies become available.
- These policies are optional to configure, but it's recommended to configure Enable to use a Trusted Platform Module (TPM) to Yes.
- For more information about these policies, see MDM policy settings for Windows Hello for Business.
- Under Enable to certificate for on-premises resources, select Not configured
- Select Next.
- Optionally, add scope tags and select Next.
- Assign the policy to a security group that contains as members the devices or users that you want to configure > Next.
- Review the policy configuration and select Create.
Tip
If you want to enforce the use of digits for your Windows Hello for Business PIN, use the settings catalog and choose Digits or Digits (User) instead of using the Account protection template.
Assign the policy to a security group that contains as members the devices or users that you want to configure.
Configure the cloud Kerberos trust policy
The cloud Kerberos trust policy can be configured using a custom template, and it's configured separately from enabling Windows Hello for Business.
To configure the cloud Kerberos trust policy:
Sign in to the Microsoft Intune admin center.
Select Devices > Windows > Configuration Profiles > Create profile.
For Profile Type, select Templates and select the Custom Template.
Name the profile with a familiar name, for example, "Windows Hello for Business cloud Kerberos trust".
In Configuration Settings, add a new configuration with the following settings:
- Name: Windows Hello for Business cloud Kerberos trust or another familiar name
- Description (optional): Enable Windows Hello for Business cloud Kerberos trust for sign-in and on-premises SSO
- OMA-URI:
./Device/Vendor/MSFT/PassportForWork/
<tenant ID>/Policies/UseCloudTrustForOnPremAuth
- Data type: Boolean
- Value: True
Important
Tenant ID in the OMA-URI must be replaced with the tenant ID for your Microsoft Entra tenant. See How to find your Microsoft Entra tenant ID for instructions on looking up your tenant ID.
Assign the policy to a security group that contains as members the devices or users that you want to configure.
Important
If the Use certificate for on-premises authentication policy is enabled, certificate trust will take precedence over cloud Kerberos trust. Ensure that the machines that you want to enable cloud Kerberos trust have this policy not configured.
Provision Windows Hello for Business
The Windows Hello for Business provisioning process begins immediately after a user has signed in if certain prerequisite checks are passed. Windows Hello for Business cloud Kerberos trust adds a prerequisite check for Microsoft Entra hybrid joined devices when cloud Kerberos trust is enabled by policy.
You can determine the status of the prerequisite check by viewing the User Device Registration admin log under Applications and Services Logs > Microsoft > Windows.
This information is also available using the dsregcmd /status
command from a console. For more information, see dsregcmd.
The cloud Kerberos trust prerequisite check detects whether the user has a partial TGT before allowing provisioning to start. The purpose of this check is to validate whether Microsoft Entra Kerberos is set up for the user's domain and tenant. If Microsoft Entra Kerberos is set up, the user will receive a partial TGT during sign-in with one of their other unlock methods. This check has three states: Yes, No, and Not Tested. The Not Tested state is reported if cloud Kerberos trust isn't being enforced by policy or if the device is Microsoft Entra joined.
Note
The cloud Kerberos trust prerequisite check isn't done on Microsoft Entra joined devices. If Microsoft Entra Kerberos isn't provisioned, a user on a Microsoft Entra joined device will still be able to sign in, but won't have SSO to on-premises resources secured by Active Directory.
PIN Setup
After a user signs in, this is the process that occurs to enroll in Windows Hello for Business:
- The user is prompted with a full screen page to use Windows Hello with the organization account. The user selects OK.
- The provisioning flow proceeds to the multi-factor authentication portion of the enrollment. Provisioning informs the user that it's actively attempting to contact the user through their configured form of MFA. The provisioning process doesn't proceed until authentication succeeds, fails or times out. A failed or timeout MFA results in an error and asks the user to retry.
- After a successful MFA, the provisioning flow asks the user to create and validate a PIN. This PIN must observe any PIN complexity policies configured on the device.
Sign-in
Once a user has set up a PIN with cloud Kerberos trust, it can be used immediately for sign-in. On a Microsoft Entra hybrid joined device, the first use of the PIN requires line of sight to a DC. Once the user has signed in or unlocked with the DC, cached sign-in can be used for subsequent unlocks without line of sight or network connectivity.
Migrate from key trust deployment model to cloud Kerberos trust
If you deployed Windows Hello for Business using the key trust model, and want to migrate to the cloud Kerberos trust model, follow these steps:
- Set up Microsoft Entra Kerberos in your hybrid environment.
- Enable cloud Kerberos trust via Group Policy or Intune.
- For Microsoft Entra joined devices, sign out and sign in to the device using Windows Hello for Business.
Note
For Microsoft Entra hybrid joined devices, users must perform the first sign in with new credentials while having line of sight to a DC.
Migrate from certificate trust deployment model to cloud Kerberos trust
Important
There is no direct migration path from a certificate trust deployment to a cloud Kerberos trust deployment. The Windows Hello container must be deleted before you can migrate to cloud Kerberos trust.
If you deployed Windows Hello for Business using the certificate trust model, and want to use the cloud Kerberos trust model, you must redeploy Windows Hello for Business by following these steps:
- Disable the certificate trust policy.
- Enable cloud Kerberos trust via Group Policy or Intune.
- Remove the certificate trust credential using the command
certutil -deletehellocontainer
from the user context. - Sign out and sign back in.
- Provision Windows Hello for Business using a method of your choice.
Note
For Microsoft Entra hybrid joined devices, users must perform the first sign-in with new credentials while having line of sight to a DC.
Frequently Asked Questions
For a list of frequently asked questions about Windows Hello for Business cloud Kerberos trust, see Windows Hello for Business Frequently Asked Questions.
Feedback
Submit and view feedback for