mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-15 18:33:43 +00:00
Update Windows Hello for Business deployment guide
This commit is contained in:
@ -1,10 +1,11 @@
|
||||
---
|
||||
title: Windows Hello for Business cloud-only deployment
|
||||
description: Learn how to configure Windows Hello for Business in a cloud-only deployment scenario.
|
||||
ms.date: 10/03/2023
|
||||
description: Learn how to deplyo Windows Hello for Business in a cloud-only deployment scenario.
|
||||
ms.date: 01/01/2024
|
||||
ms.topic: how-to
|
||||
---
|
||||
# Cloud-only deployment
|
||||
|
||||
# Cloud-only deployment guide
|
||||
|
||||
[!INCLUDE [apply-to-cloud](includes/apply-to-cloud.md)]
|
||||
|
||||
@ -17,13 +18,29 @@ ms.topic: how-to
|
||||
> - [Licensing for cloud services](index.md#licensing-for-cloud-services)
|
||||
> - [Prepare users to use Windows Hello](index.md#prepare-users-to-use-windows-hello)
|
||||
|
||||
## Configure and enroll in Windows Hello for Business
|
||||
## Deployment steps
|
||||
|
||||
When you Microsoft Entra join a device, the system attempts to automatically enroll you in Windows Hello for Business, by default. If you want to use Windows Hello for Business in a cloud-only environment with its default settings, there's no additional configuration needed.
|
||||
> [!div class="checklist"]
|
||||
> Once the prerequisites are met, deploying Windows Hello for Business consists of the following steps:
|
||||
>
|
||||
> - [Configure Windows Hello for Business policy settings](#configure-windows-hello-for-business-policy-settings)
|
||||
> - [Enroll in Windows Hello for Business](#enroll-in-windows-hello-for-business)
|
||||
|
||||
If you want to disable the automatic Windows Hello for Business enrollment prompt, you can configure your devices with a policy setting or registry key. For more information, see [Disable Windows Hello for Business]([Disable Windows Hello for Business enrollment](../configure.md#disable-windows-hello-for-business-enrollment).
|
||||
## Configure Windows Hello for Business policy settings
|
||||
|
||||
When you Microsoft Entra join a device, the system attempts to automatically enroll you in Windows Hello for Business. If you want to use Windows Hello for Business in a cloud-only environment with its default settings, there's no additional configuration needed.
|
||||
|
||||
Cloud-only deployments use Microsoft Entra multifactor authentication (MFA) during Windows Hello for Business enrollment, and there's no additional MFA configuration needed. If you aren't already registered in MFA, you'll be guided through the MFA registration as part of the Windows Hello for Business enrollment process.
|
||||
|
||||
Policy settings can be configured to control the behavior of Windows Hello for Business. For more information, see [Windows Hello for Business policy settings](../policy-settings.md).
|
||||
|
||||
### User experience
|
||||
|
||||
[!INCLUDE [user-experience](includes/user-experience.md)]
|
||||
|
||||
## Disable automatic enrollment
|
||||
|
||||
If you want to disable the automatic Windows Hello for Business enrollment prompt, you can configure your devices with a policy setting or registry key. For more information, see [Disable Windows Hello for Business enrollment](../configure.md#disable-windows-hello-for-business-enrollment).
|
||||
|
||||
> [!NOTE]
|
||||
> During the out-of-box experience (OOBE) flow of a Microsoft Entra join, you are guided to enroll in Windows Hello for Business when you don't have Intune. You can cancel the PIN screen and configure this cancellation with registry keys to prevent future prompts.
|
||||
|
||||
Cloud-only deployments use Microsoft Entra multifactor authentication (MFA) during Windows Hello for Business enrollment, and there's no additional MFA configuration needed. If you aren't already registered in MFA, you'll be guided through the MFA registration as part of the Windows Hello for Business enrollment process.
|
||||
|
@ -144,6 +144,8 @@ The cloud Kerberos trust prerequisite check detects whether the user has a parti
|
||||
|
||||
Once a user completes enrollment with cloud Kerberos trust, the Windows Hello gesture can be used **immediately** for sign-in. On a Microsoft Entra hybrid joined device, the first use of the PIN requires line of sight to a DC. Once the user has signed in or unlocked with the DC, cached sign-in can be used for subsequent unlocks without line of sight or network connectivity.
|
||||
|
||||
While the user has completed provisioning, Microsoft Entra Connect synchronizes the user's key from Microsoft Entra ID to Active Directory.
|
||||
|
||||
## Migrate from key trust deployment model to cloud Kerberos trust
|
||||
|
||||
If you deployed Windows Hello for Business using the key trust model, and want to migrate to the cloud Kerberos trust model, follow these steps:
|
||||
|
Binary file not shown.
After Width: | Height: | Size: 242 KiB |
@ -9,6 +9,6 @@ After a user signs in, the Windows Hello for Business enrollment process begins:
|
||||
1. The user is prompted to use Windows Hello with the organization account. The user selects **OK**
|
||||
1. The provisioning flow proceeds to the multi-factor authentication portion of the enrollment. Provisioning informs the user that it's actively attempting to contact the user through their configured form of MFA. The provisioning process doesn't proceed until authentication succeeds, fails or times out. A failed or timeout MFA results in an error and asks the user to retry
|
||||
1. After a successful MFA, the provisioning flow asks the user to create and validate a PIN. This PIN must observe any PIN complexity policies configured on the device
|
||||
1. The remainder of the provisioning includes Windows Hello for Business requesting an asymmetric key pair for the user, preferably from the TPM (or required if explicitly set through policy). Once the key pair is acquired, Windows communicates with Microsoft Entra ID to register the public key. When key registration completes, Windows Hello for Business provisioning informs the user they can use their PIN to sign-in. The user may close the provisioning application and access their desktop. While the user has completed provisioning, Microsoft Entra Connect synchronizes the user's key to Active Directory
|
||||
1. The remainder of the provisioning includes Windows Hello for Business requesting an asymmetric key pair for the user, preferably from the TPM (or required if explicitly set through policy). Once the key pair is acquired, Windows communicates with Microsoft Entra ID to register the public key. When key registration completes, Windows Hello for Business provisioning informs the user they can use their PIN to sign-in. The user may close the provisioning application and access their desktop.
|
||||
|
||||
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=36dc8679-0fcc-4abf-868d-97ec8b749da7 alt-text="Video showing the Windows Hello for Business enrollment steps after signing in with a password."]
|
||||
|
@ -58,7 +58,7 @@ The Network Unlock process follows these phases:
|
||||
9. Windows continues the boot sequence
|
||||
:::column-end:::
|
||||
:::column span="2":::
|
||||
:::image type="content" source="images/network-unlock-diagram.svg" alt-text="Diagram of the Network Unlock sequence." lightbox="images/network-unlock-diagram.svg":::
|
||||
:::image type="content" source="images/network-unlock-diagram.svg" alt-text="Diagram of the Network Unlock sequence." lightbox="images/network-unlock-diagram.svg" border="false":::
|
||||
:::column-end:::
|
||||
:::row-end:::
|
||||
|
||||
|
Reference in New Issue
Block a user