mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 13:27:23 +00:00
feat: Update Windows Hello and Windows Hello for Business documentation
The code changes include updating the FAQ and index files for the Windows Hello and Windows Hello for Business documentation. The changes provide clearer explanations of the differences between the two authentication technologies and highlight the security features of Windows Hello for Business. Recent user commits: - Merge pull request #10135 from MicrosoftDocs/main: OOB publish main to live: Remove & redirect Store for Business - Merge pull request #10134 from MicrosoftDocs/ADO-9268422-retire-store-for-business: [ADO 9268422] Retire Store for Business - Configure store for business as is_archived and is_retired - Delete content in ./store-for-business/ - Redirect articles in ./store-for-business/ to "/microsoft-365/admin/" - Merge pull request #10133 from MicrosoftDocs/main: Publish main to live 08/19/2024, 3:30 PM - Merge pull request #11932 from joeltuckwell/patch-1: Update applications-that-can-bypass-wdac.md to fix MSBuild.exe original filename case - Merge pull request #10132 from MicrosoftDocs/main: Publish main to live, Friday 10:30AM PDT, 08/19 - Merge pull request #10128 from vinaypamnani-msft/vp-csp-surfacehub: Add UpdateBootManager to Surface Hub CSP - Merge branch 'main' into vp-csp-surfacehub Recent repository commits: - Merge pull request #10135 from MicrosoftDocs/main: OOB publish main to live: Remove & redirect Store for Business - Merge pull request #10134 from MicrosoftDocs/ADO-9268422-retire-store-for-business: [ADO 9268422] Retire Store for Business - Configure store for business as is_archived and is_retired - Delete content in ./store-for-business/ - Redirect articles in ./store-for-business/ to "/microsoft-365/admin/" - Merge pull request #10133 from MicrosoftDocs/main: Publish main to live 08/19/2024, 3:30 PM - Merge pull request #11932 from joeltuckwell/patch-1: Update applications-that-can-bypass-wdac.md to fix MSBuild.exe original filename case - Merge pull request #10132 from MicrosoftDocs/main: Publish main to live, Friday 10:30AM PDT, 08/19 - Merge pull request #10128 from vinaypamnani-msft/vp-csp-surfacehub: Add UpdateBootManager to Surface Hub CSP - Merge branch 'main' into vp-csp-surfacehub
This commit is contained in:
parent
17ec7ace94
commit
6725c19f29
@ -16,7 +16,10 @@ sections:
|
|||||||
questions:
|
questions:
|
||||||
- question: What's the difference between Windows Hello and Windows Hello for Business?
|
- question: What's the difference between Windows Hello and Windows Hello for Business?
|
||||||
answer: |
|
answer: |
|
||||||
Windows Hello represents the biometric framework provided in Windows. Windows Hello lets users use biometrics to sign in to their devices by securely storing their user name and password and releasing it for authentication when the user successfully identifies themselves using biometrics. Windows Hello for Business uses asymmetric keys protected by the device's security module that requires a user gesture (PIN or biometrics) to authenticate.
|
*Windows Hello* is an authentication technology that allows users to sign in to their Windows devices using biometric data, or a PIN, instead of a traditional password.
|
||||||
|
|
||||||
|
*Windows Hello for Business* is an extension of Windows Hello that provides enterprise-grade security and management capabilities, including device attestation, certificate-based authentication, and conditional access policies. Policy settings can be deployed to devices to ensure they're secure and compliant with organizational requirements.
|
||||||
|
|
||||||
- question: Why a PIN is better than an online password
|
- question: Why a PIN is better than an online password
|
||||||
answer: |
|
answer: |
|
||||||
Three main reasons:
|
Three main reasons:
|
||||||
|
@ -18,7 +18,7 @@ The following table lists the main authentication and security differences betwe
|
|||||||
||Windows Hello for Business|Windows Hello|
|
||Windows Hello for Business|Windows Hello|
|
||||||
|-|-|-|
|
|-|-|-|
|
||||||
|**Authentication**|Users can authenticate to:<br>- A Microsoft Entra ID account<br>- An Active Directory account<br>- Identity provider (IdP) or relying party (RP) services that support [Fast ID Online (FIDO) v2.0](https://fidoalliance.org/) authentication.|Users can authenticate to:<br>- A Microsoft account<br>- Identity provider (IdP) or relying party (RP) services that support [Fast ID Online (FIDO) v2.0](https://fidoalliance.org/) authentication.|
|
|**Authentication**|Users can authenticate to:<br>- A Microsoft Entra ID account<br>- An Active Directory account<br>- Identity provider (IdP) or relying party (RP) services that support [Fast ID Online (FIDO) v2.0](https://fidoalliance.org/) authentication.|Users can authenticate to:<br>- A Microsoft account<br>- Identity provider (IdP) or relying party (RP) services that support [Fast ID Online (FIDO) v2.0](https://fidoalliance.org/) authentication.|
|
||||||
|**Security**|It uses **key-based** or **certificate-based** authentication. There's no symmetric secret (password) which can be stolen from a server or phished from a user and used remotely.<br>Enhanced security is available on devices with a Trusted Platform Module (TPM).|Users can create a PIN or biometric gesture on their personal devices for convenient sign-in. This use of Windows Hello is unique to the device on which it's set up, but can use a password hash depending on the account type. This configuration is referred to as *Windows Hello convenience PIN*, and it's not backed by asymmetric (public/private key) or certificate-based authentication.|
|
|**Security**|It uses **key-based** or **certificate-based** authentication. There's no symmetric secret (password) which can be stolen from a server or phished from a user and used remotely.<br>Enhanced security is available on devices with a Trusted Platform Module (TPM).|Users can create a PIN or biometric gesture on their personal devices for convenient sign-in. This use of Windows Hello is unique to the device on which it's set up, but can use a password hash depending on the account type. This configuration isn't backed by asymmetric (public/private key) or certificate-based authentication.|
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> FIDO2 (Fast Identity Online) authentication is an open standard for passwordless authentication. It allows users to sign in to their devices and apps using biometric authentication or a physical security key, without the need for a traditional password. FIDO2 support in Windows Hello for Business provides an additional layer of security and convenience for users, while also reducing the risk of password-related attacks.
|
> FIDO2 (Fast Identity Online) authentication is an open standard for passwordless authentication. It allows users to sign in to their devices and apps using biometric authentication or a physical security key, without the need for a traditional password. FIDO2 support in Windows Hello for Business provides an additional layer of security and convenience for users, while also reducing the risk of password-related attacks.
|
||||||
|
Loading…
x
Reference in New Issue
Block a user