mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-25 03:37:23 +00:00
- minor fixes
- Updated headers of pages to reflect deployment and trust type
This commit is contained in:
parent
7954d07e44
commit
23f720c609
@ -14,9 +14,10 @@ ms.date: 08/19/2018
|
||||
# Prepare and Deploy Windows Server 2016 Active Directory Federation Services
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
- Windows 10, version 1703 or later
|
||||
- On-premises deployment
|
||||
- Certificate trust
|
||||
|
||||
> This guide only applies to Windows 10, version 1703 or higher.
|
||||
|
||||
Windows Hello for Business works exclusively with the Active Directory Federation Service role included with Windows Server 2016 and requires an additional server update. The on-premises certificate trust deployment uses Active Directory Federation Services roles for key registration, device registration, and as a certificate registration authority.
|
||||
|
||||
|
@ -14,9 +14,10 @@ ms.date: 08/19/2018
|
||||
# Configure or Deploy Multifactor Authentication Services
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
- Windows 10, version 1703 or later
|
||||
- On-premises deployment
|
||||
- Certificate trust
|
||||
|
||||
> This guide only applies to Windows 10, version 1703 or higher.
|
||||
|
||||
On-premises deployments must use the On-premises Azure MFA Server using the AD FS adapter model Optionally, you can use a third-party MFA server that provides an AD FS Multifactor authentication adapter.
|
||||
|
||||
|
@ -6,17 +6,18 @@ ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security, mobile
|
||||
author: DaniHalfin
|
||||
ms.localizationpriority: medium
|
||||
ms.author: daniha
|
||||
ms.date: 07/27/2017
|
||||
author: mikestephens-MS
|
||||
ms.author: mstephen
|
||||
ms.date: 08/20/2018
|
||||
---
|
||||
# Configure Windows Hello for Business Policy settings
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
- Windows 10, version 1703 or later
|
||||
- On-premises deployment
|
||||
- Certificate trust
|
||||
|
||||
> This guide only applies to Windows 10, version 1703 or higher.
|
||||
|
||||
You need a Windows 10, version 1703 workstation to run the Group Policy Management Console, which provides the latest Windows Hello for Business and PIN Complexity Group Policy settings. To run the Group Policy Management Console, you need to install the Remote Server Administration Tools for Windows 10. You can download these tools from the [Microsoft Download Center](https://www.microsoft.com/en-us/download/details.aspx?id=45520).
|
||||
Install the Remote Server Administration Tools for Windows 10 on a computer running Windows 10, version 1703.
|
||||
|
@ -6,17 +6,18 @@ ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security, mobile
|
||||
author: DaniHalfin
|
||||
ms.localizationpriority: medium
|
||||
ms.author: daniha
|
||||
author: mikestephens-MS
|
||||
ms.author: mstephen
|
||||
ms.date: 08/19/2018
|
||||
---
|
||||
# Validate Active Directory prerequisites
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
- Windows 10, version 1703 or later
|
||||
- On-premises deployment
|
||||
- Certificate trust
|
||||
|
||||
> This guide only applies to Windows 10, version 1703 or higher.
|
||||
|
||||
The key registration process for the On-premises deployment of Windows Hello for Business needs the Windows Server 2016 Active Directory schema. The key-trust model receives the schema extension when the first Windows Server 2016 domain controller is added to the forest. The certificate trust model requires manually updating the current schema to the Windows Server 2016 schema. If you already have a Windows Server 2016 domain controller in your forest, you can skip the next step.
|
||||
|
||||
|
@ -9,15 +9,15 @@ ms.pagetype: security, mobile
|
||||
author: mikestephens-MS
|
||||
ms.author: mstephen
|
||||
ms.localizationpriority: medium
|
||||
ms.author: daniha
|
||||
ms.date: 08/19/2018
|
||||
---
|
||||
# Validate and Deploy Multifactor Authentication Services (MFA)
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
- Windows 10, version 1703 or later
|
||||
- On-premises deployment
|
||||
- Certificate trust
|
||||
|
||||
> This guide only applies to Windows 10, version 1703 or higher.
|
||||
|
||||
Windows Hello for Business requires all users perform multi-factor authentication prior to creating and registering a Windows Hello for Business credential. Windows Hello for Business deployments use Azure Multi-Factor Authentication (Azure MFA) services for the secondary authentication. On-Premises deployments use Azure MFA server, an on-premises implementation that do not require synchronizing Active Directory credentials to Azure Active Directory.
|
||||
|
||||
|
@ -14,9 +14,10 @@ ms.date: 08/19/2018
|
||||
# Validate and Configure Public Key Infrastructure
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
- Windows 10, version 1703 or later
|
||||
- On-premises deployment
|
||||
- Certificate trust
|
||||
|
||||
> This guide only applies to Windows 10, version 1703 or higher.
|
||||
|
||||
Windows Hello for Business must have a public key infrastructure regardless of the deployment or trust model. All trust models depend on the domain controllers having a certificate. The certificate serves as a root of trust for clients to ensure they are not communicating with a rogue domain controller. The certificate trust model extends certificate issuance to client computers. During Windows Hello for Business provisioning, the user receives a sign-in certificate.
|
||||
|
||||
|
@ -6,17 +6,18 @@ ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security, mobile
|
||||
author: DaniHalfin
|
||||
ms.localizationpriority: medium
|
||||
ms.author: daniha
|
||||
ms.date: 07/27/2017
|
||||
author: mikestephens-MS
|
||||
ms.author: mstephen
|
||||
ms.date: 08/19/2018
|
||||
---
|
||||
# On Premises Certificate Trust Deployment
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
- Windows 10, version 1703 or later
|
||||
- On-premises deployment
|
||||
- Certificate trust
|
||||
|
||||
> This guide only applies to Windows 10, version 1703 or higher.
|
||||
|
||||
Windows Hello for Business replaces username and password sign-in to Windows with strong user authentication based on asymmetric key pair. The following deployment guide provides the information needed to successfully deploy Windows Hello for Business in an existing environment.
|
||||
|
||||
|
@ -9,14 +9,15 @@ ms.pagetype: security, mobile
|
||||
author: mikestephens-MS
|
||||
ms.author: mstephen
|
||||
ms.localizationpriority: medium
|
||||
ms.date: 10/23/2017
|
||||
ms.date: 08/20/2018
|
||||
---
|
||||
# On Premises Key Trust Deployment
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
- Windows 10, version 1703 or later
|
||||
- On-premises deployment
|
||||
- Key trust
|
||||
|
||||
> This guide only applies to Windows 10, version 1703 or higher.
|
||||
|
||||
Windows Hello for Business replaces username and password sign-in to Windows with strong user authentication based on asymmetric key pair. The following deployment guide provides the information needed to successfully deploy Windows Hello for Business in an existing environment.
|
||||
|
||||
|
@ -292,7 +292,9 @@ Sign-in a workstation with access equivalent to a _domain user_.
|
||||
8. Select **Enabled** from the **Configure Windows Hello for Business** list.
|
||||
9. Select **Required** next to **Use a Trusted Platform Module (TPM). By default, Windows Hello for Business prefers TPM 2.0 or falls backs to software. Choosing **Required** forces Windows Hello for Business to only use TPM 2.0 or TPM 1.2 and does not allow fall back to software based keys.
|
||||
10. Type the desired **Minimum PIN length** and **Maximum PIN length**.
|
||||
> [!IMPORTANT]> The default minimum PIN length for Windows Hello for Business on Windows 10 is 6. Microsoft Intune defaults the minimum PIN length to 4, which reduces the security of the user's PIN. If you do not have a desired PIN length, set the minimum PIN length to 6.
|
||||
> [!IMPORTANT]
|
||||
> The default minimum PIN length for Windows Hello for Business on Windows 10 is 6. Microsoft Intune defaults the minimum PIN length to 4, which reduces the security of the user's PIN. If you do not have a desired PIN length, set the minimum PIN length to 6.
|
||||
|
||||

|
||||
|
||||
11. Select the appropriate configuration for the following settings.
|
||||
|
@ -14,9 +14,10 @@ ms.date: 08/19/2018
|
||||
# Prepare and Deploy Windows Server 2016 Active Directory Federation Services
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
- Windows 10, version 1703 or later
|
||||
- On-premises deployment
|
||||
- Key trust
|
||||
|
||||
> This guide only applies to Windows 10, version 1703 or higher.
|
||||
|
||||
Windows Hello for Business works exclusively with the Active Directory Federation Service role included with Windows Server 2016 and requires an additional server update. The on-premises key trust deployment uses Active Directory Federation Services roles for key registration and device registration.
|
||||
|
||||
|
@ -14,9 +14,10 @@ ms.date: 08/19/2018
|
||||
# Configure or Deploy Multifactor Authentication Services
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
- Windows 10, version 1703 or later
|
||||
- On-premises deployment
|
||||
- Key trust
|
||||
|
||||
> This guide only applies to Windows 10, version 1703 or higher.
|
||||
|
||||
On-premises deployments must use the On-premises Azure MFA Server using the AD FS adapter model Optionally, you can use a third-party MFA server that provides an AD FS Multifactor authentication adapter.
|
||||
|
||||
|
@ -14,9 +14,10 @@ ms.date: 08/19/2018
|
||||
# Configure Windows Hello for Business Policy settings
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
- Windows 10, version 1703 or later
|
||||
- On-premises deployment
|
||||
- Key trust
|
||||
|
||||
> This guide only applies to Windows 10, version 1703 or higher.
|
||||
|
||||
You need a Windows 10, version 1703 workstation to run the Group Policy Management Console, which provides the latest Windows Hello for Business and PIN Complexity Group Policy settings. To run the Group Policy Management Console, you need to install the Remote Server Administration Tools for Windows 10. You can download these tools from the [Microsoft Download Center](https://www.microsoft.com/en-us/download/details.aspx?id=45520).
|
||||
Install the Remote Server Administration Tools for Windows 10 on a computer running Windows 10, version 1703.
|
||||
|
@ -15,9 +15,10 @@ ms.date: 08/19/2018
|
||||
# Validate Active Directory prerequisites
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
- Windows 10, version 1703 or later
|
||||
- On-premises deployment
|
||||
- Key trust
|
||||
|
||||
> This guide only applies to Windows 10, version 1703 or higher.
|
||||
|
||||
Key trust deployments need an adequate number of 2016 domain controllers to ensure successful user authentication with Windows Hello for Business. To learn more about domain controller planning for key trust deployments, read the [Windows Hello for Business planning guide](hello-planning-guide.md), the [Planning an adequate number of Windows Server 2016 Domain Controllers for Windows Hello for Business deployments](hello-adequate-domain-controllers.md) section.
|
||||
|
||||
|
@ -14,9 +14,10 @@ ms.date: 08/19/2018
|
||||
# Validate and Deploy Multifactor Authentication Services (MFA)
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
- Windows 10, version 1703 or later
|
||||
- On-premises deployment
|
||||
- Key trust
|
||||
|
||||
> This guide only applies to Windows 10, version 1703 or higher.
|
||||
|
||||
Windows Hello for Business requires all users perform an additional factor of authentication prior to creating and registering a Windows Hello for Business credential. Windows Hello for Business deployments use Azure Multi-Factor Authentication (Azure MFA) services for the secondary authentication. On-Premises deployments use Azure MFA server, an on-premises implementation that do not require synchronizing Active Directory credentials to Azure Active Directory.
|
||||
|
||||
|
@ -14,9 +14,10 @@ ms.date: 08/19/2018
|
||||
# Validate and Configure Public Key Infrastructure
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
- Windows 10, version 1703 or later
|
||||
- On-premises deployment
|
||||
- Key trust
|
||||
|
||||
> This guide only applies to Windows 10, version 1703 or higher.
|
||||
|
||||
Windows Hello for Business must have a public key infrastructure regardless of the deployment or trust model. All trust models depend on the domain controllers having a certificate. The certificate serves as a root of trust for clients to ensure they are not communicating with a rogue domain controller.
|
||||
|
||||
|
Loading…
x
Reference in New Issue
Block a user