Windows Hello for Business (WHfB) is a modern attempt to go passwordless, reinforce security and increase end user usability. It leverages Windows account authentication services to get access to resources, or in the simplest scenario: login to your device.

Key facts

  • WHfB is an authentication method that replaces username and password and enables strong two-factor authentication
  • WHfB rises device security by a new type of user credential biometric (facial recognition or fingerprint) or PIN, which is tied to a device by a private key (generated in software, hardware bound key or with a trusted platform module, TPM) >this reduces the vulnerability of lateral device movement in a domain and credential theft. With a PIN you can unlock only one device without using your password. Your password is your most valuable secret, because you can log in to any cloud resource anytime, anywhere. (without MFA)
  • To implement WHfB you need to choose a deployment model and a trust type
  • Windows Hello and Windows Hello for Business is not the same. Windows Hello stores security information only on the device (also known as convenience PIN) and Windows Hello for Business uses asymmetric (public/private key) or certificate-based authentication. Read more

Solution overview

There are multiple variants to set up and use WHfB in an enterprise environment. Depending whether AD DS, Azure AD or with a sync (Hybrid), it would require a trust from the cloud to your on-premises. These hold different prerequisites, consume a different amount of effort and some are are more future proof than others.

Deployment models

-> Are relevant in association with your environment and your identity providers.

  • Cloud only: cloud identities, no access to on-premises resources, Azure AD join
  • Hybrid: AD federated identities with Azure AD
  • On-premises: no cloud identities, no Azure resources

Trust types

-> Define the authentication to on-premises Active Directory. (if in place/hybrid scenario) There are different prerequisites for each trust type.

  • Key trust: authentication certificates are not issued to end users, enrolled to domain controllers only
  • Certificate trust: authentication certificates are issued to end users, enrolled to clients
  • Cloud trust: uses Azure AD Kerberos in combination with the functionality of SSO to on-premises resources (there are also more details and a deep dive to the authentication process)

Microsoft docs on the planning guide

Hybrid/Cloud only deployment + cloud trust is the modern way.


(Hybrid) Cloud Trust Deployment

The deployment and implementation of WHfB in a Cloud Trust deployment is fairly the simplest of all variants, the core components are: AD + Azure AD Connect sync, PKI + DC infrastructure and a client management (MDM, SCCM). I would straight follow the instruction docs of Microsoft. Microsoft explains the topic well, but I want to share some extra information to some things:

How to deploy in a nutshell

  1. Make yourself familiar with WHfB in general and prepare the resources for this project, e.g.: find a business usecase and enlighten the management, set up a schedule (testing/pilot phase), define when - who - how the deployment steps are done, prepare a rollout strategy and publish end user guides
  2. Check current WHfB state and your environment (maybe there are already configurations done), check the AD attribute: msDS-KeyCredentialLink of users and computers, futhermore, definitely read about the unsupported scenarios
  3. Choose a trust type (as mentioned I would only and alwyas do cloud trust)
  4. Do the cloud trust deployment
    4.1 Set up Azure AD Kerberos in your hybrid environment You do this with a few PowerShell commands, this will create an Azure AD Kerberos Server object both in on-prem AD and in your AAD tenant. It is important to regularly rotate the Azure AD Kerberos Server key.
    4.2 Configure Windows Hello for Business policy and deploy it to devices. In Intune/Microsoft Endpoint Manager admin center, you need to do two things:
  • Create a configuration profile (settings catalog is the recommended way)

whfb-intune-settings-catalog.png

ℹ️
It is very important that you enable the setting "Use Cloud Trust For On Prem Auth".Previously this required an OMA-URI policy, but the setting can now be found in the Settings Catalog.
  1. Test it on a device by registering WHfB information (this will also trigger MFA) and look over the provisioning state (event log)
  2. Troubleshooting and adaptions (Troubleshoot hybrid and Hybrid FAQ)
  3. Definitely implement self-service PIN recovery and consider to disable other credential providers, so username and password can be completely eliminated

Read more on my blog:

Endpoint Management with Microsoft Intune
Welcome to this coast! Learn everything on Endpoint Management with Microsoft Intune to deploy, manage, secure and monitor endpoints from all platforms through the cloud. Introduction, experience and thoughts Introduction to the Microsoft Intune product familyIntroduction This post is recommended for any reader who is new to Intune or would
Microsoft Security
Microsoft security conceptsLearn about Microsoft cloud security high-level concepts to secure your organization with Microsoft 365 and Azure built-in products and features. The way to secure your digital assets such as identities, infrastructures, platforms, apps and data. These are the official Microsoft security sources. On my blog you can find
Defender
Enterprise security solutions, cloud-based, intelligent and automated security responses for Endpoint, Identity, Office 365 and Cloud Apps. A full protection stack. Defender for Endpoint Handle threat and vulnerability events on endpoints to prevent malicious and harmful contents. Microsoft Defender: a reviewA review of Microsoft Defender + Defender of Endpoint (MDATP). Technical

You’ve successfully subscribed to Oceanleaf
Welcome back! You’ve successfully signed in.
Great! You’ve successfully signed up.
Success! Your email is updated.
Your link has expired
Success! Check your email for magic link to sign-in.