Windows Hello for Business Deployment Prerequisite Overview
This article lists the infrastructure requirements for the different deployment models for Windows Hello for Business.
Microsoft Entra Cloud Only Deployment
- Microsoft Entra ID
- Microsoft Entra multifactor authentication
- Device management solution (Intune or supported third-party MDM), optional
- Microsoft Entra ID P1 or P2 subscription - optional, needed for automatic MDM enrollment when the device joins Microsoft Entra ID
Hybrid Deployments
The table shows the minimum requirements for each deployment. For key trust in a multi-domain/multi-forest deployment, the following requirements are applicable for each domain/forest that hosts Windows Hello for business components or is involved in the Kerberos referral process.
Requirement | Cloud Kerberos trust Group Policy or Modern managed |
Key trust Group Policy or Modern managed |
Certificate Trust Mixed managed |
Certificate Trust Modern managed |
---|---|---|---|---|
Windows Version | Any supported Windows client versions | Any supported Windows client versions | Any supported Windows client versions | |
Schema Version | No specific Schema requirement | Windows Server 2016 or later schema | Windows Server 2016 or later schema | Windows Server 2016 or later schema |
Domain and Forest Functional Level | Windows Server 2008 R2 Domain/Forest functional level | Windows Server 2008 R2 Domain/Forest functional level | Windows Server 2008 R2 Domain/Forest functional level | Windows Server 2008 R2 Domain/Forest functional level |
Domain Controller Version | Any supported Windows Server versions | Any supported Windows Server versions | Any supported Windows Server versions | Any supported Windows Server versions |
Certificate Authority | Not required | Any supported Windows Server versions | Any supported Windows Server versions | Any supported Windows Server versions |
AD FS Version | Not required | Not required | Any supported Windows Server versions | Any supported Windows Server versions |
MFA Requirement | Azure MFA, or AD FS w/Azure MFA adapter, or AD FS w/Azure MFA Server adapter, or AD FS w/3rd Party MFA Adapter |
Azure MFA tenant, or AD FS w/Azure MFA adapter, or AD FS w/Azure MFA Server adapter, or AD FS w/3rd Party MFA Adapter |
Azure MFA tenant, or AD FS w/Azure MFA adapter, or AD FS w/Azure MFA Server adapter, or AD FS w/3rd Party MFA Adapter |
Azure MFA tenant, or AD FS w/Azure MFA adapter, or AD FS w/Azure MFA Server adapter, or AD FS w/3rd Party MFA Adapter |
Microsoft Entra Connect | Not required. It's recommended to use Microsoft Entra Connect cloud sync | Required | Required | Required |
Microsoft Entra ID license | Microsoft Entra ID P1 or P2, optional | Microsoft Entra ID P1 or P2, optional | Microsoft Entra ID P1 or P2, needed for device write-back | Microsoft Entra ID P1 or P2, optional. Intune license required |
On-premises Deployments
The table shows the minimum requirements for each deployment.
Requirement | Key trust Group Policy managed |
Certificate trust Group Policy managed |
---|---|---|
Windows Version | Any supported Windows client versions | Any supported Windows client versions |
Schema Version | Windows Server 2016 Schema | Windows Server 2016 Schema |
Domain and Forest Functional Level | Windows Server 2008 R2 Domain/Forest functional level | Windows Server 2008 R2 Domain/Forest functional level |
Domain Controller Version | Any supported Windows Server versions | Any supported Windows Server versions |
Certificate Authority | Any supported Windows Server versions | Any supported Windows Server versions |
AD FS Version | Any supported Windows Server versions | Any supported Windows Server versions |
MFA Requirement | AD FS with 3rd Party MFA Adapter | AD FS with 3rd Party MFA Adapter |
Feedback
Submit and view feedback for