Tapahtumat
9. huhtik. klo 15 - 10. huhtik. klo 12
Koodaa tulevaisuus tekoälyn avulla ja luo yhteys Java-vertaisiin ja asiantuntijoihin JDConf 2025 :ssä.
Rekisteröidy nytTätä selainta ei enää tueta.
Päivitä Microsoft Edgeen, jotta voit hyödyntää uusimpia ominaisuuksia, suojauspäivityksiä ja teknistä tukea.
This topic shows how to enable passwordless authentication to on-premises resources for environments with devices that run Windows 10 version 2004 or later. Devices can be Microsoft Entra joined or Microsoft Entra hybrid joined. This passwordless authentication functionality provides seamless single sign-on (SSO) to on-premises resources when you use Microsoft-compatible security keys, or with Windows Hello for Business Cloud trust.
Microsoft Entra ID can issue Kerberos ticket-granting tickets (TGTs) for one or more of your Active Directory domains. With this functionality, users can sign in to Windows with modern credentials, such as FIDO2 security keys, and then access traditional Active Directory-based resources. Kerberos Service Tickets and authorization continue to be controlled by your on-premises Active Directory domain controllers (DCs).
A Microsoft Entra Kerberos server object is created in your on-premises Active Directory instance and then securely published to Microsoft Entra ID. The object isn't associated with any physical servers. It's simply a resource that can be used by Microsoft Entra ID to generate Kerberos TGTs for your Active Directory domain.
A user signs in to a Windows 10 device with an FIDO2 security key and authenticates to Microsoft Entra ID.
Microsoft Entra ID checks the directory for a Kerberos Server key that matches the user's on-premises Active Directory domain.
Microsoft Entra ID generates a Kerberos TGT for the user's on-premises Active Directory domain. The TGT includes the user's SID only, and no authorization data.
The TGT is returned to the client along with the user's Microsoft Entra Primary Refresh Token (PRT).
The client machine contacts an on-premises Active Directory Domain Controller and trades the partial TGT for a fully formed TGT.
The client machine now has a Microsoft Entra PRT and a full Active Directory TGT and can access both cloud and on-premises resources.
Before you begin the procedures in this article, your organization must complete the instructions in Enable passkeys (FIDO2) for your organization.
You must also meet the following system requirements:
Devices must be running Windows 10 version 2004 or later.
Your Windows Server domain controllers must run Windows Server 2016 or later and have patches installed for the following servers:
AES256_HMAC_SHA1 must be enabled when Network security: Configure encryption types allowed for Kerberos policy is configured on domain controllers.
Have the credentials required to complete the steps in the scenario:
Users must have the following Microsoft Entra attributes populated through Microsoft Entra Connect:
onPremisesSamAccountName
(accountName
in Microsoft Entra Connect)onPremisesDomainName
(domainFQDN
in Microsoft Entra Connect)onPremisesSecurityIdentifier
(objectSID
in Microsoft Entra Connect)Microsoft Entra Connect synchronizes these attributes by default. If you change which attributes to synchronize, make sure you select accountName
, domainFQDN
, and objectSID
for synchronization.
The scenario in this article supports SSO in both of the following instances:
The following scenarios aren't supported:
The AzureADHybridAuthenticationManagement
module provides FIDO2 management features for administrators.
Open a PowerShell prompt using the Run as administrator option.
Install the AzureADHybridAuthenticationManagement
module:
# First, ensure TLS 1.2 for PowerShell gallery access.
[Net.ServicePointManager]::SecurityProtocol = [Net.ServicePointManager]::SecurityProtocol -bor [Net.SecurityProtocolType]::Tls12
# Install the AzureADHybridAuthenticationManagement PowerShell module.
Install-Module -Name AzureADHybridAuthenticationManagement -AllowClobber
Huomautus
AzureADHybridAuthenticationManagement
module on any computer from which you can access your on-premises Active Directory Domain Controller, without dependency on the Microsoft Entra Connect solution.AzureADHybridAuthenticationManagement
module is distributed through the PowerShell Gallery. The PowerShell Gallery is the central repository for PowerShell content. In it, you can find useful PowerShell modules that contain PowerShell commands and Desired State Configuration (DSC) resources.Administrators use the AzureADHybridAuthenticationManagement
module to create a Microsoft Entra Kerberos server object in their on-premises directory. The object must be created on the Microsoft Entra Connect server or on a server that has the Microsoft.Online.PasswordSynchronization.Rpc.dll dependency installed.
Run the following steps in each domain and forest in your organization that contain Microsoft Entra users:
By default the Set-AzureADKerberosSever
cmdlet will use the Commercial cloud endpoints. If you are configuring Kerberos in another cloud environment, you need to set the cmdlet to use the specified cloud.
To get a list of the available clouds and the numeric value needed to change, run the following:
Get-AzureADKerberosServerEndpoint
Example Output:
Current Endpoint = 0(Public)
Supported Endpoints:
0 :Public
1 :China
2 :Us Government
Note the numeric value next to your desired cloud environment.
To then set the desired cloud environment, run the following:
(Example: For US Government Cloud)
Set-AzureADKerberosServerEndpoint -TargetEndpoint 2
Vihje
For Additional information comparing Azure commercial and sovereign clouds, See: Differences between Azure Commercial and Azure sovereign clouds.
# Specify the on-premises Active Directory domain. A new Microsoft Entra ID
# Kerberos Server object will be created in this Active Directory domain.
$domain = $env:USERDNSDOMAIN
# Enter an Azure Active Directory Hybrid Identity Administrator username and password.
$cloudCred = Get-Credential -Message 'An Active Directory user who is a member of the Hybrid Identity Administrators group for Microsoft Entra ID.'
# Enter a Domain Administrator username and password.
$domainCred = Get-Credential -Message 'An Active Directory user who is a member of the Domain Admins group.'
# Create the new Microsoft Entra ID Kerberos Server object in Active Directory
# and then publish it to Azure Active Directory.
Set-AzureADKerberosServer -Domain $domain -CloudCredential $cloudCred -DomainCredential $domainCred
Huomautus
If you're working on a domain-joined machine with an account that has domain administrator privileges, you can skip the "-DomainCredential" parameter. If the "-DomainCredential" parameter isn't provided, the current Windows login credential is used to access your on-premises Active Directory Domain Controller.
# Specify the on-premises Active Directory domain. A new Microsoft Entra ID
# Kerberos Server object will be created in this Active Directory domain.
$domain = $env:USERDNSDOMAIN
# Enter an Azure Active Directory Hybrid Identity Administrator username and password.
$cloudCred = Get-Credential
# Create the new Microsoft Entra ID Kerberos Server object in Active Directory
# and then publish it to Azure Active Directory.
# Use the current windows login credential to access the on-premises AD.
Set-AzureADKerberosServer -Domain $domain -CloudCredential $cloudCred
Huomautus
If your organization protects password-based sign-in and enforces modern authentication methods such as multifactor authentication, FIDO2, or smart card technology, you must use the -UserPrincipalName
parameter with the User Principal Name (UPN) of a Hybrid Identity Administrator.
contoso.corp.com
in the following example with your on-premises Active Directory domain name.administrator@contoso.onmicrosoft.com
in the following example with the UPN of a Hybrid Identity Administrator.# Specify the on-premises Active Directory domain. A new Microsoft Entra ID
# Kerberos Server object will be created in this Active Directory domain.
$domain = $env:USERDNSDOMAIN
# Enter a UPN of a Hybrid Identity Administrator
$userPrincipalName = "administrator@contoso.onmicrosoft.com"
# Enter a Domain Administrator username and password.
$domainCred = Get-Credential
# Create the new Microsoft Entra ID Kerberos Server object in Active Directory
# and then publish it to Azure Active Directory.
# Open an interactive sign-in prompt with given username to access the Microsoft Entra ID.
Set-AzureADKerberosServer -Domain $domain -UserPrincipalName $userPrincipalName -DomainCredential $domainCred
Huomautus
If you are working on a domain-joined machine with an account that has domain administrator privileges and your organization protects password-based sign-in and enforces modern authentication methods such as multifactor authentication, FIDO2, or smart card technology, you must use the -UserPrincipalName
parameter with the User Principal Name (UPN) of a Hybrid Identity Administrator. And you can skip the "-DomainCredential" parameter.
> - Replace administrator@contoso.onmicrosoft.com
in the following example with the UPN of a Hybrid Identity Administrator.
# Specify the on-premises Active Directory domain. A new Microsoft Entra ID
# Kerberos Server object will be created in this Active Directory domain.
$domain = $env:USERDNSDOMAIN
# Enter a UPN of a Hybrid Identity Administrator
$userPrincipalName = "administrator@contoso.onmicrosoft.com"
# Create the new Microsoft Entra ID Kerberos Server object in Active Directory
# and then publish it to Azure Active Directory.
# Open an interactive sign-in prompt with given username to access the Microsoft Entra ID.
Set-AzureADKerberosServer -Domain $domain -UserPrincipalName $userPrincipalName
You can view and verify the newly created Microsoft Entra Kerberos server by using the following command:
# When prompted to provide domain credentials use the userprincipalname format for the username instead of domain\username
Get-AzureADKerberosServer -Domain $domain -UserPrincipalName $userPrincipalName -DomainCredential (get-credential)
This command outputs the properties of the Microsoft Entra Kerberos server. You can review the properties to verify that everything is in good order.
Huomautus
Running against another domain by supplying the credential in domain\username format will connect over NTLM, and then it fails. However, using the userprincipalname format for the domain administrator will ensure RPC bind to the DC is attempted using Kerberos correctly. If the users are in the Protected Users security group in Active Directory, complete these steps to resolve the issue: Sign in as another domain user in ADConnect and don’t supply "-domainCredential". The Kerberos ticket of the user that's currently signed in is used. You can confirm by executing whoami /groups
to validate whether the user has the required permissions in Active Directory to execute the preceding command.
Property | Description |
---|---|
ID | The unique ID of the AD DS DC object. This ID is sometimes referred to as its slot or its branch ID. |
DomainDnsName | The DNS domain name of the Active Directory domain. |
ComputerAccount | The computer account object of the Microsoft Entra Kerberos server object (the DC). |
UserAccount | The disabled user account object that holds the Microsoft Entra Kerberos server TGT encryption key. The domain name of this account is CN=krbtgt_AzureAD,CN=Users,<Domain-DN> . |
KeyVersion | The key version of the Microsoft Entra Kerberos server TGT encryption key. The version is assigned when the key is created. The version is then incremented every time the key is rotated. The increments are based on replication metadata and likely greater than one. For example, the initial KeyVersion could be 192272. The first time the key is rotated, the version could advance to 212621. The important thing to verify is that the KeyVersion for the on-premises object and the CloudKeyVersion for the cloud object are the same. |
KeyUpdatedOn | The date and time that the Microsoft Entra Kerberos server TGT encryption key was updated or created. |
KeyUpdatedFrom | The DC where the Microsoft Entra Kerberos server TGT encryption key was last updated. |
CloudId | The ID from the Microsoft Entra object. Must match the ID from the first line of the table. |
CloudDomainDnsName | The DomainDnsName from the Microsoft Entra object. Must match the DomainDnsName from the second line of the table. |
CloudKeyVersion | The KeyVersion from the Microsoft Entra object. Must match the KeyVersion from the fifth line of the table. |
CloudKeyUpdatedOn | The KeyUpdatedOn from the Microsoft Entra object. Must match the KeyUpdatedOn from the sixth line of the table. |
The Microsoft Entra Kerberos server encryption krbtgt keys should be rotated on a regular basis. We recommend that you follow the same schedule you use to rotate all other Active Directory DC krbtgt keys.
Varoitus
There are other tools that could rotate the krbtgt keys. However, you must use the tools mentioned in this document to rotate the krbtgt keys of your Microsoft Entra Kerberos server. This ensures that the keys are updated in both on-premises Active Directory and Microsoft Entra ID.
Set-AzureADKerberosServer -Domain $domain -CloudCredential $cloudCred -DomainCredential $domainCred -RotateServerKey
If you want to revert the scenario and remove the Microsoft Entra Kerberos server from both the on-premises Active Directory and Microsoft Entra ID, run the following command:
Remove-AzureADKerberosServer -Domain $domain -CloudCredential $cloudCred -DomainCredential $domainCred
The Microsoft Entra Kerberos server object is represented in Microsoft Entra ID as a KerberosDomain object. Each on-premises Active Directory domain is represented as a single KerberosDomain object in Microsoft Entra ID.
For example, let's say that your organization has an Active Directory forest with two domains, contoso.com
and fabrikam.com
. If you choose to allow Microsoft Entra ID to issue Kerberos TGTs for the entire forest, there are two KerberosDomain objects in Microsoft Entra ID, one KerberosDomain object for contoso.com
and the other for fabrikam.com
. If you have multiple Active Directory forests, there is one KerberosDomain object for each domain in each forest.
Follow the instructions in Create a Kerberos Server object in each domain and forest in your organization that contains Microsoft Entra users.
If your password has expired, signing in with FIDO is blocked. The expectation is that users reset their passwords before they can log in by using FIDO. This behavior also applies to hybrid on-premises synced user sign-in with Windows Hello for Business cloud kerberos trust.
If you encounter issues or want to share feedback about this passwordless security key sign-in feature, share via the Windows Feedback Hub app by doing the following:
Here are some answers to commonly asked questions about passwordless sign-in:
The feature doesn't work in a pure on-premises AD DS environment.
Security keys come in a variety of form factors. Contact the device manufacturer of record to discuss how their devices can be enabled with a PIN or biometric as a second factor.
We are working on this capability for the general availability (GA) release of this feature.
For information about compliant security keys, see FIDO2 security keys.
To delete an enrolled security key, sign in to the myaccount.microsoft.com, and then go to the Security info page.
If you're clean-installing a Microsoft Entra hybrid joined machine, after the domain join and restart process, you must sign in with a password and wait for the policy to sync before you can use the FIDO security key to sign in.
dsregcmd /status
in a Command Prompt window, and check to ensure that both the AzureAdJoined and DomainJoined statuses are showing as YES.Make sure that enough DCs are patched to respond in time to service your resource request. To see whether a DC is running the feature, run nltest /dsgetdc:contoso /keylist /kdc
, and then review the output.
Huomautus
The /keylist
switch in the nltest
command is available in client Windows 10 v2004 and later.
An FIDO2 Windows login looks for a writable DC to exchange the user TGT. As long as you have at least one writable DC per site, the login works fine.
Tapahtumat
9. huhtik. klo 15 - 10. huhtik. klo 12
Koodaa tulevaisuus tekoälyn avulla ja luo yhteys Java-vertaisiin ja asiantuntijoihin JDConf 2025 :ssä.
Rekisteröidy nytOpetus
Moduuli
Manage user authentication - Training
There are multiple options for authentication in Azure AD. Learn how to implement and manage the right authentications for users based on business needs.
Sertifiointi
Esittele Microsoft Entra ID:n ominaisuuksia, joilla nykyaikaistat käyttäjätietoratkaisuja, otat käyttöön hybridiratkaisuja ja toteutat käyttäjätietojen hallinnan.