หมายเหตุ
การเข้าถึงหน้านี้ต้องได้รับการอนุญาต คุณสามารถลอง ลงชื่อเข้าใช้หรือเปลี่ยนไดเรกทอรีได้
การเข้าถึงหน้านี้ต้องได้รับการอนุญาต คุณสามารถลองเปลี่ยนไดเรกทอรีได้
This article introduces how to fix the error "Your credentials could not be verified" that occurs when you try to log on to Windows with Windows Hello for Business (WHFB).
Applies to: Windows 10, Windows 11
Original KB number: 4519735
Symptom
When you try to sign in to a Windows 10 or Windows 11 device by using a WHFB certificate or key trust, it fails with one of the following error messages:
Your credentials could not be verified
Something went wrong and your PIN isn't available (status: 0xc00000bb, substatus:0x0). Click to set up your PIN again.
Cause
This issue occurs because the issuing Certificate Authority (CA) certificate is missing in the NTAuth store of the domain controller and client machine.
When you use WHFB, the domain controller needs to validate the certificate sent by the client machine. During the validation, it checks the Key Distribution Center (KDC) service on the domain controller to verify if it can find the issuing CA certificate in the NTAuth registry key. The NTAuth registry key locates at HKLM\Software\Microsoft\EnterpriseCertificates\NTAuth\Certificates
.
Note
What the EnterpriseCertificates registry key presents is a location in Active Directory. During a Group policy update, these certificates are imported to the registry by all client machines, members, and domain controllers in the forest.
How to identify the issue
- Open the Certificate Authority snap-in.
- Right-click on the issuing CA server and select Properties.
- Go to the General tab and select the current certificates if there are multiple certificates, and then select View Certificate.
- Go to the Details tab and scroll down to the Thumbprint attribute.
- Write down the thumbprint of the issuing CA certificate.
- Open the registry on the domain controller and navigate to
HKLM\Software\Microsoft\EnterpriseCertificates\NTAuth\Certificates
. - Verify if you have a folder under the above registry key with the thumbprint value.
Resolution
Open the Certificate Authority snap-in.
Right-click on the issuing CA server and select Properties.
Go to the General tab and select the current certificates if there are multiple certificates, and then select View Certificate.
Export the certificate by using the Copy to File option. And save it as a file such as IssuingCA.cer.
Sign in by using the Enterprise administrator credentials on a domain controller and run the following command:
certutil -dspublish -f IssuingCA.cer NTAuthCA certutil -enterprise -addstore NTAuth IssuingCA.cer
Run
gpupdate /force
and confirm that the thumbprint of your issuing CA is created under this registry hive,HKLM\Software\Microsoft\EnterpriseCertificates\NTAuth\Certificates
.Wait for the Active Directory replication to complete.
Run
gpupdate /force
on the client computers as well and ensure that the thumbprint of the issuing CA certificate is created on the client computers.