Updated Section Review style for each section

This commit is contained in:
Mike Stephens
2017-08-20 19:55:41 -07:00
parent 6cfa3e06e7
commit 293827bda5
2 changed files with 43 additions and 132 deletions

View File

@ -19,25 +19,12 @@ localizationpriority: high
Windows Hello for Business involves configuring distributed technologies that may or may not exist in your current infrastructure. Hybrid certificate trust deployments of Windows Hello for Business rely on these technolgies Windows Hello for Business involves configuring distributed technologies that may or may not exist in your current infrastructure. Hybrid certificate trust deployments of Windows Hello for Business rely on these technolgies
### Prerequisites ### * [Active Directory](#active-directory)
- [ ] Active Directory * [Public Key Infrastructure](#public-key-infrastructure)
- [ ] Public Key Infrastructure * [Azure Active Directory](#azure-active-directory)
- [ ] Azure Active Directory * [Directory Synchronization](#directory-synchronization)
- [ ] Directory Synchronization * [Active Directory Federation Services](#active-directory-federation-services)
- [ ] Active Directory Federation Services
- [ ] Federation Services
- [ ] Federation Proxy Servers
- [ ] Multiple top-level domains
- [ ] Azure Device Registration
- [ ] Device Writeback
- [ ] Multifactor Authentication
- [ ] Windows Hello for Business
- [ ]Active Directory
- [ ] Directory Synchronization
- [ ] Public Key Infrastructure
- [ ] Federation Services
- [ ] Group Policy
- [ ] Sign-in and Provision
New installations are considerably more involved than existing implementations because you are building the entire infrastructure new. Microsoft recommends you review the new installation baseline to validate your exsting envrionment has all the needed configurations to support your hybrid certificate trust Windows Hello for Business deployment. If you're environment meets these needs, you can read the [Configure Windows Hello for Business settings](hello-hybrid-cert-whfb-settings.md) section to learn about specific Windows Hello for Business configuration settings. New installations are considerably more involved than existing implementations because you are building the entire infrastructure new. Microsoft recommends you review the new installation baseline to validate your exsting envrionment has all the needed configurations to support your hybrid certificate trust Windows Hello for Business deployment. If you're environment meets these needs, you can read the [Configure Windows Hello for Business settings](hello-hybrid-cert-whfb-settings.md) section to learn about specific Windows Hello for Business configuration settings.
@ -50,24 +37,10 @@ Production environments should follow Active Directory best practices regarding
Lab environments and isolated proof of concepts may want to limit the number of domain controllers. The purpose of these environments is to experiment and learn. Reducing the number of domain controllers can prevent troubleshooting of issue, such as Active Directory replication, which is unrelated to project goal. Lab environments and isolated proof of concepts may want to limit the number of domain controllers. The purpose of these environments is to experiment and learn. Reducing the number of domain controllers can prevent troubleshooting of issue, such as Active Directory replication, which is unrelated to project goal.
### Section Review ### ### Section Review ###
- [x] Active Directory > [!div class="checklist"]
- [ ] Public Key Infrastructure > * Minimum Windows Server 2008 R2 domain controllers
- [ ] Azure Active Directory > * Minimum Windows Server 2008 R2 domain and forest functional level
- [ ] Directory Synchronization > * Functional networking, name resolution, and Active Directory replication
- [ ] Active Directory Federation Services
- [ ] Federation Services
- [ ] Federation Proxy Servers
- [ ] Multiple top-level domains
- [ ] Azure Device Registration
- [ ] Device Writeback
- [ ] Multifactor Authentication
- [ ] Windows Hello for Business
- [ ]Active Directory
- [ ] Directory Synchronization
- [ ] Public Key Infrastructure
- [ ] Federation Services
- [ ] Group Policy
- [ ] Sign-in and Provision
## Public Key Infrastructure ## Public Key Infrastructure
@ -100,24 +73,11 @@ Sign-in using _Enterprise Admin_ equivalent credentials on Windows Server 2012 o
If you do have an existing public key infrastructure, please review [Certification Authority Guidance](https://technet.microsoft.com/library/hh831574.aspx) from Microsoft TechNet to properly design your infrastructure. Then, consult the [Test Lab Guide: Deploying an AD CS Two-Tier PKI Hierarchy](https://technet.microsoft.com/library/hh831348.aspx) for instructions on how to configure your public key infrastructure using the information from your design session. If you do have an existing public key infrastructure, please review [Certification Authority Guidance](https://technet.microsoft.com/library/hh831574.aspx) from Microsoft TechNet to properly design your infrastructure. Then, consult the [Test Lab Guide: Deploying an AD CS Two-Tier PKI Hierarchy](https://technet.microsoft.com/library/hh831348.aspx) for instructions on how to configure your public key infrastructure using the information from your design session.
### Section Review ### ### Section Review ###
- [x] Active Directory
- [x] Public Key Infrastructure > [!div class="checklist"]
- [ ] Azure Active Directory > * Miniumum Windows Server 2012 Certificate Authority.
- [ ] Directory Synchronization > * Enterprise Certificate Authority.
- [ ] Active Directory Federation Services > * Functioning public key infrastructure.
- [ ] Federation Services
- [ ] Federation Proxy Servers
- [ ] Multiple top-level domains
- [ ] Azure Device Registration
- [ ] Device Writeback
- [ ] Multifactor Authentication
- [ ] Windows Hello for Business
- [ ]Active Directory
- [ ] Directory Synchronization
- [ ] Public Key Infrastructure
- [ ] Federation Services
- [ ] Group Policy
- [ ] Sign-in and Provision
## Azure Active Directory ## ## Azure Active Directory ##
Youve prepared your Active Directory. Hybrid Windows Hello for Business deployment needs Azure Active Directory to host your cloud-based identities. Youve prepared your Active Directory. Hybrid Windows Hello for Business deployment needs Azure Active Directory to host your cloud-based identities.
@ -125,53 +85,25 @@ Youve prepared your Active Directory. Hybrid Windows Hello for Business depl
The next step of the deployment is to follow the [Creating an Azure AD tenant](https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-howto-tenant) process to provision an Azure tenant for your organization. The next step of the deployment is to follow the [Creating an Azure AD tenant](https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-howto-tenant) process to provision an Azure tenant for your organization.
### Section Review ### Section Review
- [x] Active Directory
- [x] Public Key Infrastructure > [!div class="checklist"]
- [x] Azure Active Directory > * Review the different ways to establish an Azure Active Directory tenant.
- [ ] Directory Synchronization > * Create an Azure Active Directory Tenant.
- [ ] Active Directory Federation Services > * Purchase the appropriate Azure Active Directory subscription or licenses, if necessary.
- [ ] Federation Services
- [ ] Federation Proxy Servers
- [ ] Multiple top-level domains
- [ ] Azure Device Registration
- [ ] Device Writeback
- [ ] Multifactor Authentication
- [ ] Windows Hello for Business
- [ ]Active Directory
- [ ] Directory Synchronization
- [ ] Public Key Infrastructure
- [ ] Federation Services
- [ ] Group Policy
- [ ] Sign-in and Provision
### Directory Synchronization ### ### Directory Synchronization ###
At this point, you should have your Active Directory installed and configured with user and computer accounts. You should also have an enterprise certificate authority, and you should have provisioned your Azure tenant. At this point, you should have your Active Directory installed and configured with user and computer accounts. You should also have an enterprise certificate authority, and you should have provisioned your Azure tenant.
Next, you need to synchronizes the on-premises Active Directory with Azure Active Directory. To do this, youll download, install, and configure Azure Active Directory Connect. Next, you need to synchronizes the on-premises Active Directory with Azure Active Directory. To do this, youll download, install, and configure Azure Active Directory Connect.
Review the [Integrating on-prem directories with Azure Active Directory](https://docs.microsoft.com/en-us/azure/active-directory/connect/active-directory-aadconnect) topic to understand why youre using Azure Active Directory Connect and how it works. Next, review the [hardware and prerequisites](https://docs.microsoft.com/en-us/azure/active-directory/connect/active-directory-aadconnect-prerequisites) needed and then [download the software](http://go.microsoft.com/fwlink/?LinkId=615771). When you are done with your review, follow the [Express Installation](https://docs.microsoft.com/en-us/azure/active-directory/connect/active-directory-aadconnect-get-started-express) to configure directory synchronization.
### Section Review ### Section Review
- [x] Active Directory > [div class="checklist"]
- [x] Public Key Infrastructure > * Review the [Integrating on-prem directories with Azure Active Directory](https://docs.microsoft.com/en-us/azure/active-directory/connect/active-directory-aadconnect).
- [x] Azure Active Directory > * Review the [hardware and prerequisites](https://docs.microsoft.com/en-us/azure/active-directory/connect/active-directory-aadconnect-prerequisites) needed and then [download the software](http://go.microsoft.com/fwlink/?LinkId=615771).
- [x] Directory Synchronization > * Follow the [Express Installation](https://docs.microsoft.com/en-us/azure/active-directory/connect/active-directory-aadconnect-get-started-express) to configure directory synchronization.
- [ ] Active Directory Federation Services
- [ ] Federation Services
- [ ] Federation Proxy Servers
- [ ] Multiple top-level domains
- [ ] Azure Device Registration
- [ ] Device Writeback
- [ ] Multifactor Authentication
- [ ] Windows Hello for Business
- [ ]Active Directory
- [ ] Directory Synchronization
- [ ] Public Key Infrastructure
- [ ] Federation Services
- [ ] Group Policy
- [ ] Sign-in and Provision
## Active Directory Federation Services ##
## Active Directory Federation Services
Active Directory Federation Services (AD FS) provides simplified, secured identity federation and Web single sign-on (SSO) capabilities for end users who want to access applications within an AD FS-secured enterprise, in federation partner organizations, or in the cloud. Active Directory Federation Services (AD FS) provides simplified, secured identity federation and Web single sign-on (SSO) capabilities for end users who want to access applications within an AD FS-secured enterprise, in federation partner organizations, or in the cloud.
### Federation Services ### ### Federation Services ###
@ -206,24 +138,12 @@ As previously mentioned, Windows Hello for Busines hybrid certificate- trust dep
Use the [Enabling device writeback](https://docs.microsoft.com/en-us/azure/active-directory/connect/active-directory-aadconnect-feature-device-writeback) section to configure device writeback functionality in your environment. Use the [Enabling device writeback](https://docs.microsoft.com/en-us/azure/active-directory/connect/active-directory-aadconnect-feature-device-writeback) section to configure device writeback functionality in your environment.
### Section Review ### Section Review
- [x] Active Directory > [div class="checklist"]
- [x] Public Key Infrastructure > * Federation Proxy Servers
- [x] Azure Active Directory > * Multiple top-level domains
- [x] Directory Synchronization > * Azure Device Registration
- [x] Active Directory Federation Services > * Device Writeback
- [x] Federation Services
- [x] Federation Proxy Servers
- [x] Multiple top-level domains
- [x] Azure Device Registration
- [x] Device Writeback
- [ ] Multifactor Authentication
- [ ] Windows Hello for Business
- [ ]Active Directory
- [ ] Directory Synchronization
- [ ] Public Key Infrastructure
- [ ] Federation Services
- [ ] Group Policy
- [ ] Sign-in and Provision
## Multifactor Authentication Services ## ## Multifactor Authentication Services ##
Windows Hello for Business uses multifactor authentication during provisioning and during user initiated PIN reset scenarios, such as when a user forgets their PIN. There are two preferred multifactor authentication configurations with hybrid deployments—Azure MFA and AD FS using Azure MFA Windows Hello for Business uses multifactor authentication during provisioning and during user initiated PIN reset scenarios, such as when a user forgets their PIN. There are two preferred multifactor authentication configurations with hybrid deployments—Azure MFA and AD FS using Azure MFA
@ -239,8 +159,9 @@ As long as your users have licenses that include Azure Multi-Factor Authenticati
> >
> If you have one of these subscriptions or licenses, skip the Azure MFA Adapter section. > If you have one of these subscriptions or licenses, skip the Azure MFA Adapter section.
#### Azure MFA Adapter #### #### Azure MFA Provider ####
If your organization uses Azure MFA on a per-consumption model (no licenses), then review the [Create a Multifactor Authentication Provider](https://docs.microsoft.com/en-us/azure/multi-factor-authentication/multi-factor-authentication-get-started-auth-provider) section to create an Azure MFA Authentication provider and associate it with your Azure tenant. If your organization uses Azure MFA on a per-consumption model (no licenses), then review the [Create a Multifactor Authentication Provider](https://docs.microsoft.com/en-us/azure/multi-factor-authentication/multi-factor-authentication-get-started-auth-provider) section to create an Azure MFA Authentication provider and associate it with your Azure tenant.
#### Configure Azure MFA Settings #### #### Configure Azure MFA Settings ####
Once you have created your Azure MFA authentication provider and associated it with an Azure tenant, you need to configure the multi-factor authentication settings. Review the [Configure Azure Multi-Factor Authentication settings](https://docs.microsoft.com/en-us/azure/multi-factor-authentication/multi-factor-authentication-whats-next) section to configure your settings. Once you have created your Azure MFA authentication provider and associated it with an Azure tenant, you need to configure the multi-factor authentication settings. Review the [Configure Azure Multi-Factor Authentication settings](https://docs.microsoft.com/en-us/azure/multi-factor-authentication/multi-factor-authentication-whats-next) section to configure your settings.
@ -251,24 +172,14 @@ After you have completed configuring your Azure MFA settings, you want to review
Alternatively, you can configure Windows Server 2016 Active Directory Federation Services (AD FS) to provide additional multi-factor authentication. To configure, read the [Configure AD FS 2016 and Azure MFA](https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/operations/configure-ad-fs-2016-and-azure-mfa) section Alternatively, you can configure Windows Server 2016 Active Directory Federation Services (AD FS) to provide additional multi-factor authentication. To configure, read the [Configure AD FS 2016 and Azure MFA](https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/operations/configure-ad-fs-2016-and-azure-mfa) section
### Section Review ### Section Review
- [x] Active Directory
- [x] Public Key Infrastructure > [dev class="checklist"]
- [x] Azure Active Directory > * Review the overview and uses of Azure Multifactor Authentication.
- [x] Directory Synchronization > * Review your Azure Active Directory subscription for Azure Multifactor Authentication.
- [x] Active Directory Federation Services > * Create an Azure Multifactor Authentication Provider, if necessary.
- [x] Federation Services > * Configure Azure Multufactor Authentiation features and settings.
- [x] Federation Proxy Servers > * Understand the different User States and their effect on Azure Multifactor Authentication.
- [x] Multiple top-level domains > * Consider using Azure Multifactor Authentication or a third-party multifactor authentication provider with Windows Server 2016 Active Directory Federation Services, if necessary.
- [x] Azure Device Registration
- [x] Device Writeback
- [x] Multifactor Authentication
- [ ] Windows Hello for Business
- [ ]Active Directory
- [ ] Directory Synchronization
- [ ] Public Key Infrastructure
- [ ] Federation Services
- [ ] Group Policy
- [ ] Sign-in and Provision
### Next Steps ### ### Next Steps ###
Follow the Windows Hello for Business hybrid certificate trust deployment guide. With your baseline configuration complete, your next step is to **Configure Windows Hello for Business** if your envirionment. Follow the Windows Hello for Business hybrid certificate trust deployment guide. With your baseline configuration complete, your next step is to **Configure Windows Hello for Business** if your envirionment.

View File

@ -102,7 +102,7 @@ Hybrid organizations register their devices with their cloud. This is analogous
Hybrid certificate trust deployments need the device write back feature. Authentication to the Windows Server 2016 Active Directory Federation Services needs both the user and the computer to authenticate. Typically the users are synchronized, but not devices. This prevents AD FS from authenticating the computer and results in Windows Hello for Business certificate enrollment failures. For this reason, Windows Hello for Business deployments need device writeback, which is an Azure Active Directory premium feature. Hybrid certificate trust deployments need the device write back feature. Authentication to the Windows Server 2016 Active Directory Federation Services needs both the user and the computer to authenticate. Typically the users are synchronized, but not devices. This prevents AD FS from authenticating the computer and results in Windows Hello for Business certificate enrollment failures. For this reason, Windows Hello for Business deployments need device writeback, which is an Azure Active Directory premium feature.
### Review Checklist ### ### Section Checklist ###
> [!div class="checklist"] > [!div class="checklist"]
> * Azure Active Directory Device writeback > * Azure Active Directory Device writeback
> * Azure Active Directory Premium subscription > * Azure Active Directory Premium subscription