mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-13 13:57:22 +00:00
minor edits
This commit is contained in:
parent
c0fdd260fe
commit
c3eef8edd2
@ -501,7 +501,7 @@ For your reference, below is a comprehensive list of the AD DS devices, containe
|
|||||||
- object of type msDS-DeviceRegistrationServiceContainer at CN=Device Registration Services,CN=Device Registration Configuration,CN=Services,CN=Configuration,DC=<domain>
|
- object of type msDS-DeviceRegistrationServiceContainer at CN=Device Registration Services,CN=Device Registration Configuration,CN=Services,CN=Configuration,DC=<domain>
|
||||||
- object of type msDS-DeviceRegistrationService in the above container
|
- object of type msDS-DeviceRegistrationService in the above container
|
||||||
|
|
||||||
[!div clas="nextstepaction"]
|
>[!div class="nextstepaction"]
|
||||||
[Configure Windows Hello for Business settings](hello-hybrid-cert-whfb-settings.md)
|
[Configure Windows Hello for Business settings](hello-hybrid-cert-whfb-settings.md)
|
||||||
|
|
||||||
<br><br>
|
<br><br>
|
||||||
|
@ -52,7 +52,7 @@ The remainder of the provisioning includes Windows Hello for Business requesting
|
|||||||
> The minimum time needed to syncrhonize the user's public key from Azure Active Directory to the on-premises Active Directory is 30 minutes. This synchronization latency delays the certificate enrollment for the user. After the user's public key has synchronized to Active Directory, the user's certificate enrolls automatically as long as the user's session is active (actively working or locked, but still signed-in). Also, the Action Center notifies the user thier PIN is ready for use.
|
> The minimum time needed to syncrhonize the user's public key from Azure Active Directory to the on-premises Active Directory is 30 minutes. This synchronization latency delays the certificate enrollment for the user. After the user's public key has synchronized to Active Directory, the user's certificate enrolls automatically as long as the user's session is active (actively working or locked, but still signed-in). Also, the Action Center notifies the user thier PIN is ready for use.
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> Microsoft is actively investigating in ways to reduce the syncrhonization latency and delays in certificate enrollment with the goal to make certificate enrollment occur real-time.
|
> Microsoft is actively investigating ways to reduce the syncrhonization latency and delays in certificate enrollment with the goal to make certificate enrollment occur real-time.
|
||||||
|
|
||||||
After a successful key registration, Windows creates a certificate request using the same key pair to request a certificate. Windows send the certificate request to the AD FS server for certificate enrollment.
|
After a successful key registration, Windows creates a certificate request using the same key pair to request a certificate. Windows send the certificate request to the AD FS server for certificate enrollment.
|
||||||
|
|
||||||
|
@ -47,7 +47,7 @@ The `Set-AdfsCertificateAuthority` cmdlet should show the following warning:
|
|||||||
This warning indicates that you have not configured multi-factor authentication in AD FS and until it is configured, the AD FS server will not issue Windows Hello certificates. Windows 10, version 1703 clients check this configuration during prerequisite checks. If detected, the prerequisite check will not succeed and the user will not provision Windows Hello for Business on sign-in.
|
This warning indicates that you have not configured multi-factor authentication in AD FS and until it is configured, the AD FS server will not issue Windows Hello certificates. Windows 10, version 1703 clients check this configuration during prerequisite checks. If detected, the prerequisite check will not succeed and the user will not provision Windows Hello for Business on sign-in.
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
> If you gave your Windows Hello for Business Enrollment Agent and Windows Hello for Business Authentication certificate templates different names, then replace **WHFBEnrollmentAgent** and WHFBAuthentication in the above command with the name of your certificate templates. It<EFBFBD>s important that you use the template name rather than the template display name. You can view the template name on the **General** tab of the certificate template using the **Certificate Template** management console (certtmpl.msc). Or, you can view the template name using the **Get-CATemplate** ADCS Administration Windows PowerShell cmdlet on a Windows Server 2012 or later certificate authority.
|
> If you gave your Windows Hello for Business Enrollment Agent and Windows Hello for Business Authentication certificate templates different names, then replace **WHFBEnrollmentAgent** and WHFBAuthentication in the above command with the name of your certificate templates. It's important that you use the template name rather than the template display name. You can view the template name on the **General** tab of the certificate template using the **Certificate Template** management console (certtmpl.msc). Or, you can view the template name using the **Get-CATemplate** ADCS Administration Windows PowerShell cmdlet on a Windows Server 2012 or later certificate authority.
|
||||||
|
|
||||||
|
|
||||||
### Group Memberships for the AD FS Service Account
|
### Group Memberships for the AD FS Service Account
|
||||||
|
@ -63,5 +63,5 @@ Sign-in a domain controller or management workstations with *Domain Admin* equiv
|
|||||||
2. [Prerequistes](hello-hybrid-cert-trust-prereqs.md)
|
2. [Prerequistes](hello-hybrid-cert-trust-prereqs.md)
|
||||||
3. [New Installation Baseline](hello-hybrid-cert-new-install.md)
|
3. [New Installation Baseline](hello-hybrid-cert-new-install.md)
|
||||||
4. [Configure Azure Device Registration](hello-hybrid-cert-trust-devreg.md)
|
4. [Configure Azure Device Registration](hello-hybrid-cert-trust-devreg.md)
|
||||||
5. Configure Windows Hello for Business settings: Active Directory (*You are here*)
|
5. Configure Windows Hello for Business settings: Directory Syncrhonization (*You are here*)
|
||||||
6. [Sign-in and Provision](hello-hybrid-cert-whfb-provision.md)
|
6. [Sign-in and Provision](hello-hybrid-cert-whfb-provision.md)
|
||||||
|
@ -118,7 +118,7 @@ Sign-in a certificate authority or management workstations with *Domain Admin* e
|
|||||||
9. Click the **adfssvc** from the **Group or users names** list. In the **Permissions for adfssvc** section, select the **Allow** check box for the **Enroll** permission. Excluding the **adfssvc** user, clear the **Allow** check boxes for the **Enroll** and **Autoenroll** permissions for all other items in the **Group or users names** list if the check boxes are not already cleared. Click **OK**.
|
9. Click the **adfssvc** from the **Group or users names** list. In the **Permissions for adfssvc** section, select the **Allow** check box for the **Enroll** permission. Excluding the **adfssvc** user, clear the **Allow** check boxes for the **Enroll** and **Autoenroll** permissions for all other items in the **Group or users names** list if the check boxes are not already cleared. Click **OK**.
|
||||||
10. Close the console.
|
10. Close the console.
|
||||||
|
|
||||||
### Creating Windows Hello for Business authentication certiicate template
|
### Creating Windows Hello for Business authentication certificate template
|
||||||
|
|
||||||
During Windows Hello for Business provisioning, the Windows 10, version 1703 client requests an authentication certificate from the Active Directory Federation Service, which requests the authentication certificate on behalf of the user. This task configures the Windows Hello for Business authentication certificate template. You use the name of the certificate template when configuring.
|
During Windows Hello for Business provisioning, the Windows 10, version 1703 client requests an authentication certificate from the Active Directory Federation Service, which requests the authentication certificate on behalf of the user. This task configures the Windows Hello for Business authentication certificate template. You use the name of the certificate template when configuring.
|
||||||
|
|
||||||
|
@ -137,13 +137,13 @@ The application of the Windows Hello for Business Group Policy object uses secur
|
|||||||
|
|
||||||
Just to reassure, linking the **Windows Hello for Business** Group Policy object to the domain ensures the Group Policy object is in scope for all domain users. However, not all users will have the policy settings applied to them. Only users who are members of the Windows Hello for Business group receive the policy settings. All others users ignore the Group Policy object.
|
Just to reassure, linking the **Windows Hello for Business** Group Policy object to the domain ensures the Group Policy object is in scope for all domain users. However, not all users will have the policy settings applied to them. Only users who are members of the Windows Hello for Business group receive the policy settings. All others users ignore the Group Policy object.
|
||||||
|
|
||||||
### Other Related Group Policy settings
|
## Other Related Group Policy settings
|
||||||
|
|
||||||
#### Windows Hello for Business
|
### Windows Hello for Business
|
||||||
|
|
||||||
There are other Windows Hello for Business policy settings you can configure to manage your Windows Hello for Business deployment. These policy settings are computer-based policy setting; so they are applicable to any user that sign-in from a computer with these policy settings.
|
There are other Windows Hello for Business policy settings you can configure to manage your Windows Hello for Business deployment. These policy settings are computer-based policy setting; so they are applicable to any user that sign-in from a computer with these policy settings.
|
||||||
|
|
||||||
##### Use a hardware security device
|
#### Use a hardware security device
|
||||||
|
|
||||||
The default configuration for Windows Hello for Business is to prefer hardware protected credentials; however, not all computers are able to create hardware protected credentials. When Windows Hello for Business enrollment encounters a computer that cannot create a hardware protected credential, it will create a software-based credential.
|
The default configuration for Windows Hello for Business is to prefer hardware protected credentials; however, not all computers are able to create hardware protected credentials. When Windows Hello for Business enrollment encounters a computer that cannot create a hardware protected credential, it will create a software-based credential.
|
||||||
|
|
||||||
@ -151,13 +151,13 @@ You can enable and deploy the **Use a hardware security device** Group Policy Se
|
|||||||
|
|
||||||
Another policy setting becomes available when you enable the **Use a hardware security device** Group Policy setting that enables you to prevent Windows Hello for Business enrollment from using version 1.2 Trusted Platform Modules (TPM). Version 1.2 TPMs typically perform cryptographic operations slower than version 2.0 TPMs and are more unforgiven during anti-hammering and PIN lockout activities. Therefore, some organization may want not want slow sign-in performance and management overhead associated with version 1.2 TPMs. To prevent Windows Hello for Business from using version 1.2 TPMs, simply select the TPM 1.2 check box after you enable the Use a hardware security device Group Policy object.
|
Another policy setting becomes available when you enable the **Use a hardware security device** Group Policy setting that enables you to prevent Windows Hello for Business enrollment from using version 1.2 Trusted Platform Modules (TPM). Version 1.2 TPMs typically perform cryptographic operations slower than version 2.0 TPMs and are more unforgiven during anti-hammering and PIN lockout activities. Therefore, some organization may want not want slow sign-in performance and management overhead associated with version 1.2 TPMs. To prevent Windows Hello for Business from using version 1.2 TPMs, simply select the TPM 1.2 check box after you enable the Use a hardware security device Group Policy object.
|
||||||
|
|
||||||
##### Use biometrics
|
#### Use biometrics
|
||||||
|
|
||||||
Windows Hello for Business provides a great user experience when combined with the use of biometrics. Rather than providing a PIN to sign-in, a user can use a fingerprint or facial recognition to sign-in to Windows, without sacrificing security.
|
Windows Hello for Business provides a great user experience when combined with the use of biometrics. Rather than providing a PIN to sign-in, a user can use a fingerprint or facial recognition to sign-in to Windows, without sacrificing security.
|
||||||
|
|
||||||
The default Windows Hello for Business enables users to enroll and use biometrics. However, some organization may want more time before using biometrics and want to disable their use until they are ready. To not allow users to use biometrics, configure the **Use biometrics** Group Policy setting to disabled and apply it to your computers. The policy setting disabled all biometrics. Currently, Windows does not provide granular policy setting that enable you to disable specific modalities of biometrics such as allow facial recognition, but disallow fingerprint.
|
The default Windows Hello for Business enables users to enroll and use biometrics. However, some organization may want more time before using biometrics and want to disable their use until they are ready. To not allow users to use biometrics, configure the **Use biometrics** Group Policy setting to disabled and apply it to your computers. The policy setting disabled all biometrics. Currently, Windows does not provide granular policy setting that enable you to disable specific modalities of biometrics such as allow facial recognition, but disallow fingerprint.
|
||||||
|
|
||||||
#### PIN Complexity
|
### PIN Complexity
|
||||||
|
|
||||||
PIN complexity is not specific to Windows Hello for Business. Windows 10 enables users to use PINs outside of Windows Hello for Business. PIN Complexity Group Policy settings apply to all uses of PINs, even when Windows Hello for Business is not deployed.
|
PIN complexity is not specific to Windows Hello for Business. Windows 10 enables users to use PINs outside of Windows Hello for Business. PIN Complexity Group Policy settings apply to all uses of PINs, even when Windows Hello for Business is not deployed.
|
||||||
|
|
||||||
@ -173,7 +173,7 @@ Windows 10 provides eight PIN Complexity Group Policy settings that give you gra
|
|||||||
|
|
||||||
Starting with Windows 10, version 1703, the PIN complexity Group Policy settings have moved to remove misunderstanding that PIN complexity policy settings were exclusive to Windows Hello for Business. The new location of these Group Policy settings is under **Computer Configuration\Administrative Templates\System\PIN Complexity** of the Group Policy editor.
|
Starting with Windows 10, version 1703, the PIN complexity Group Policy settings have moved to remove misunderstanding that PIN complexity policy settings were exclusive to Windows Hello for Business. The new location of these Group Policy settings is under **Computer Configuration\Administrative Templates\System\PIN Complexity** of the Group Policy editor.
|
||||||
|
|
||||||
### Add users to the Windows Hello for Business Users group
|
## Add users to the Windows Hello for Business Users group
|
||||||
|
|
||||||
Users must receive the Windows Hello for Business group policy settings and have the proper permission to enroll for the Wwindows Hello for Business Authentication certificate. You can provide users with these settings and permissions by adding the group used synchronize users to the Windows Hello for Business Users group. Users and groups who are not members of this group will not attempt to enroll for Windows Hello for Business.
|
Users must receive the Windows Hello for Business group policy settings and have the proper permission to enroll for the Wwindows Hello for Business Authentication certificate. You can provide users with these settings and permissions by adding the group used synchronize users to the Windows Hello for Business Users group. Users and groups who are not members of this group will not attempt to enroll for Windows Hello for Business.
|
||||||
|
|
||||||
|
@ -18,7 +18,8 @@
|
|||||||
#### [New Installation Baseline](hello-hybrid-cert-new-install.md)
|
#### [New Installation Baseline](hello-hybrid-cert-new-install.md)
|
||||||
#### [Configure Azure Device Registration](hello-hybrid-cert-trust-devreg.md)
|
#### [Configure Azure Device Registration](hello-hybrid-cert-trust-devreg.md)
|
||||||
#### [Configure Windows Hello for Business policy settings](hello-hybrid-cert-whfb-settings.md)
|
#### [Configure Windows Hello for Business policy settings](hello-hybrid-cert-whfb-settings.md)
|
||||||
#### [Sign-in and Provision](hello-hybrid-cert-whfb-provision.md)
|
#### [Sign-in and Provision](hello-hybrid-cert-whfb-provision.md)
|
||||||
|
|
||||||
### [On Premises Certificate Trust Deployment](hello-deployment-cert-trust.md)
|
### [On Premises Certificate Trust Deployment](hello-deployment-cert-trust.md)
|
||||||
#### [Validate Active Directory prerequisites](hello-cert-trust-validate-ad-prereq.md)
|
#### [Validate Active Directory prerequisites](hello-cert-trust-validate-ad-prereq.md)
|
||||||
#### [Validate and Configure Public Key Infrastructure](hello-cert-trust-validate-pki.md)
|
#### [Validate and Configure Public Key Infrastructure](hello-cert-trust-validate-pki.md)
|
||||||
|
Loading…
x
Reference in New Issue
Block a user