Update Windows Hello for Business deployment model

This commit is contained in:
Paolo Matarazzo
2024-01-02 11:47:43 -05:00
parent fc70f1ea34
commit b44a369935
5 changed files with 6 additions and 2 deletions

View File

@ -61,7 +61,7 @@ For more information about how Microsoft Entra Kerberos works with Windows Hello
After setting up the Microsoft Entra Kerberos object, Windows Hello for business must be enabled and configured to use cloud Kerberos trust. There are 2 policy settings required to configure Windows Hello for Business in a cloud Kerberos trust model:
- [Use Windows Hello for Business](../policy-settings.md#use-windows-hello-for-business)
- [use-cloud-trust-for-on-premises-authentication](../policy-settings.md#use-cloud-trust-for-on-premises-authentication)
- [Use cloud trust for on-premises authentication](../policy-settings.md#use-cloud-trust-for-on-premises-authentication)
Another optional, but recommended, policy setting is:

View File

@ -47,7 +47,7 @@ It's fundamentally important to understand which deployment model to use for a s
There are three deployment models from which you can choose:
| :ballot_box_with_check: | Deployment model | Description |
|| Deployment model | Description |
|--|--|--|
| :black_square_button: | **Cloud-only** |For organizations that only have cloud identities and don't access on-premises resources. These organizations typically join their devices to the cloud and exclusively use resources in the cloud such as SharePoint Online, OneDrive, and others. Also, since the users don't use on-premises resources, they don't need certificates for things like VPN because everything they need is hosted in cloud services|
| :black_square_button: | **Hybrid** |For organizations that have identities synchronized from Active Directory to Microsoft Entra ID. These organizations use applications registered in Microsoft Entra ID, and want a single sign-on (SSO) experience for both on-premises and Microsoft Entra resources|
@ -250,8 +250,12 @@ The next video shows the Windows Hello for Business enrollment experience after
1. The provisioning flow proceeds to the multi-factor authentication portion of the enrollment. Provisioning informs the user that it's actively attempting to contact the user through their configured form of MFA. The provisioning process doesn't proceed until authentication succeeds, fails or times out. A failed or timeout MFA results in an error and asks the user to retry
1. After a successful MFA, the provisioning flow asks the user to create and validate a PIN. This PIN must observe any PIN complexity policies configured on the device
<p style="text-align: center;">
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=36dc8679-0fcc-4abf-868d-97ec8b749da7 alt-text="Video showing the Windows Hello for Business enrollment steps after signing in with a password."]
</p>
After enrollment in Windows Hello, users should use their gesture (such as a PIN or fingerprint) for access to their devices and corporate resources. The unlock gesture is valid only on the enrolled device.
> [!IMPORTANT]