mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-16 10:53:43 +00:00
title changes
This commit is contained in:
@ -1,8 +1,8 @@
|
|||||||
# [Keep Windows 10 secure](index.md)
|
# [Keep Windows 10 secure](index.md)
|
||||||
## [Block untrusted fonts in an enterprise](block-untrusted-fonts-in-enterprise.md)
|
## [Block untrusted fonts in an enterprise](block-untrusted-fonts-in-enterprise.md)
|
||||||
## [Manage identity verification using Windows Hello for Business](hello-manage-identity-verification.md)
|
## [Windows Hello for Business](hello-identity-verification.md)
|
||||||
### [How Windows Hello for Business works](hello-how-it-works.md)
|
### [How Windows Hello for Business works](hello-how-it-works.md)
|
||||||
### [Implement Windows Hello for Business in your organization](hello-implement-in-organization.md)
|
### [Manage Windows Hello for Business in your organization](hello-manage-in-organization.md)
|
||||||
### [Enable phone sign-in to PC or VPN](hello-enable-phone-signin.md)
|
### [Enable phone sign-in to PC or VPN](hello-enable-phone-signin.md)
|
||||||
### [Why a PIN is better than a password](hello-why-pin-is-better-than-password.md)
|
### [Why a PIN is better than a password](hello-why-pin-is-better-than-password.md)
|
||||||
### [Prepare people to use Windows Hello](hello-prepare-people-to-use.md)
|
### [Prepare people to use Windows Hello](hello-prepare-people-to-use.md)
|
||||||
|
@ -36,9 +36,9 @@ Suppose instead that you sign in on **Device B** and change your password for yo
|
|||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
|
|
||||||
- [Manage identity verification using Windows Hello for Business](hello-manage-identity-verification.md)
|
- [Windows Hello for Business](hello-identity-verification.md)
|
||||||
- [How Windows Hello for Business works](hello-how-it-works.md)
|
- [How Windows Hello for Business works](hello-how-it-works.md)
|
||||||
- [Implement Windows Hello for Business in your organization](hello-implement-in-organization.md)
|
- [Manage Windows Hello for Business in your organization](hello-manage-in-organization.md)
|
||||||
- [Enable phone sign-in to PC or VPN](hello-enable-phone-signin.md)
|
- [Enable phone sign-in to PC or VPN](hello-enable-phone-signin.md)
|
||||||
- [Why a PIN is better than a password](hello-why-pin-is-better-than-password.md)
|
- [Why a PIN is better than a password](hello-why-pin-is-better-than-password.md)
|
||||||
- [Prepare people to use Windows Hello](hello-prepare-people-to-use.md)
|
- [Prepare people to use Windows Hello](hello-prepare-people-to-use.md)
|
||||||
|
@ -75,9 +75,9 @@ To allow facial recognition, you must have devices with integrated special infra
|
|||||||
- Effective, real world FRR with Anti-spoofing or liveness detection: <10%
|
- Effective, real world FRR with Anti-spoofing or liveness detection: <10%
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
- [Manage identity verification using Windows Hello for Business](hello-manage-identity-verification.md)
|
- [Windows Hello for Business](hello-identity-verification.md)
|
||||||
- [How Windows Hello for Business works](hello-how-it-works.md)
|
- [How Windows Hello for Business works](hello-how-it-works.md)
|
||||||
- [Implement Windows Hello for Business in your organization](hello-implement-in-organization.md)
|
- [Manage Windows Hello for Business in your organization](hello-manage-in-organization.md)
|
||||||
- [Enable phone sign-in to PC or VPN](hello-enable-phone-signin.md)
|
- [Enable phone sign-in to PC or VPN](hello-enable-phone-signin.md)
|
||||||
- [Why a PIN is better than a password](hello-why-pin-is-better-than-password.md)
|
- [Why a PIN is better than a password](hello-why-pin-is-better-than-password.md)
|
||||||
- [Prepare people to use Windows Hello](hello-prepare-people-to-use.md)
|
- [Prepare people to use Windows Hello](hello-prepare-people-to-use.md)
|
||||||
|
@ -63,9 +63,9 @@ If you want to distribute the **Microsoft Authenticator** app, your organization
|
|||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
|
|
||||||
- [Manage identity verification using Windows Hello for Business](hello-manage-identity-verification.md)
|
- [Windows Hello for Business](hello-identity-verification.md)
|
||||||
- [How Windows Hello for Business works](hello-how-it-works.md)
|
- [How Windows Hello for Business works](hello-how-it-works.md)
|
||||||
- [Implement Windows Hello for Business in your organization](hello-implement-in-organization.md)
|
- [Manage Windows Hello for Business in your organization](hello-manage-in-organization.md)
|
||||||
- [Why a PIN is better than a password](hello-why-pin-is-better-than-password.md)
|
- [Why a PIN is better than a password](hello-why-pin-is-better-than-password.md)
|
||||||
- [Prepare people to use Windows Hello](hello-prepare-people-to-use.md)
|
- [Prepare people to use Windows Hello](hello-prepare-people-to-use.md)
|
||||||
- [Windows Hello and password changes](hello-and-password-changes.md)
|
- [Windows Hello and password changes](hello-and-password-changes.md)
|
||||||
|
@ -222,9 +222,9 @@ For errors listed in this table, contact Microsoft Support for assistance.
|
|||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
|
|
||||||
- [Manage identity verification using Windows Hello for Business](hello-manage-identity-verification.md)
|
- [Windows Hello for Business](hello-identity-verification.md)
|
||||||
- [How Windows Hello for Business works](hello-how-it-works.md)
|
- [How Windows Hello for Business works](hello-how-it-works.md)
|
||||||
- [Implement Windows Hello for Business in your organization](hello-implement-in-organization.md)
|
- [Manage Windows Hello for Business in your organization](hello-manage-in-organization.md)
|
||||||
- [Enable phone sign-in to PC or VPN](hello-enable-phone-signin.md)
|
- [Enable phone sign-in to PC or VPN](hello-enable-phone-signin.md)
|
||||||
- [Why a PIN is better than a password](hello-why-pin-is-better-than-password.md)
|
- [Why a PIN is better than a password](hello-why-pin-is-better-than-password.md)
|
||||||
- [Prepare people to use Windows Hello](hello-prepare-people-to-use.md)
|
- [Prepare people to use Windows Hello](hello-prepare-people-to-use.md)
|
||||||
|
@ -35,9 +35,9 @@ This is a normal condition. No further action is required.
|
|||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
|
|
||||||
- [Manage identity verification using Windows Hello for Business](hello-manage-identity-verification.md)
|
- [Windows Hello for Business](hello-identity-verification.md)
|
||||||
- [How Windows Hello for Business works](hello-how-it-works.md)
|
- [How Windows Hello for Business works](hello-how-it-works.md)
|
||||||
- [Implement Windows Hello for Business in your organization](hello-implement-in-organization.md)
|
- [Manage Windows Hello for Business in your organization](hello-manage-in-organization.md)
|
||||||
- [Enable phone sign-in to PC or VPN](hello-enable-phone-signin.md)
|
- [Enable phone sign-in to PC or VPN](hello-enable-phone-signin.md)
|
||||||
- [Why a PIN is better than a password](hello-why-pin-is-better-than-password.md)
|
- [Why a PIN is better than a password](hello-why-pin-is-better-than-password.md)
|
||||||
- [Prepare people to use Windows Hello](hello-prepare-people-to-use.md)
|
- [Prepare people to use Windows Hello](hello-prepare-people-to-use.md)
|
||||||
|
@ -26,7 +26,7 @@ A goal of Windows Hello is to allow a user to open a brand-new device, securely
|
|||||||
The registration process works like this:
|
The registration process works like this:
|
||||||
|
|
||||||
1. The user configures an account on the device. This account can be a local account on the device, a domain account stored in the on-premises Active Directory domain, a Microsoft account, or an Azure AD account. For a new device, this step may be as simple as signing in with a Microsoft account. Signing in with a Microsoft account on a Windows 10 device automatically sets up Windows Hello on the device; users don’t have to do anything extra to enable it.
|
1. The user configures an account on the device. This account can be a local account on the device, a domain account stored in the on-premises Active Directory domain, a Microsoft account, or an Azure AD account. For a new device, this step may be as simple as signing in with a Microsoft account. Signing in with a Microsoft account on a Windows 10 device automatically sets up Windows Hello on the device; users don’t have to do anything extra to enable it.
|
||||||
2. To sign in using that account, the user has to enter the existing credentials for it. The IDP that “owns” the account receives the credentials and authenticates the user. This IDP authentication may include the use of an existing second authentication factor, or proof. For example, a user who registers a new device by using an Azure AD account will have to provide an SMS-based proof that Azure AD sends.
|
2. To sign in using that account, the user has to enter the existing credentials for it. The identity provider (IDP) that “owns” the account receives the credentials and authenticates the user. This IDP authentication may include the use of an existing second authentication factor, or proof. For example, a user who registers a new device by using an Azure AD account will have to provide an SMS-based proof that Azure AD sends.
|
||||||
3. When the user has provided the proof to the IDP, the user enables PIN authentication. The PIN will be associated with this particular credential. When the user sets the PIN, it becomes usable immediately
|
3. When the user has provided the proof to the IDP, the user enables PIN authentication. The PIN will be associated with this particular credential. When the user sets the PIN, it becomes usable immediately
|
||||||
|
|
||||||
Remember that Windows Hello depends on pairing a device and a credential, so the PIN chosen is associated only with the combination of the active account and that specific device. The PIN must comply with whatever length and complexity policy the account administrator has configured; this policy is enforced on the device side. Other registration scenarios that Windows Hello supports are:
|
Remember that Windows Hello depends on pairing a device and a credential, so the PIN chosen is associated only with the combination of the active account and that specific device. The PIN must comply with whatever length and complexity policy the account administrator has configured; this policy is enforced on the device side. Other registration scenarios that Windows Hello supports are:
|
||||||
@ -112,8 +112,8 @@ Windows Hello depends on having compatible IDPs available to it. As of this writ
|
|||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
|
|
||||||
- [Manage identity verification using Windows Hello for Business](hello-manage-identity-verification.md)
|
- [Windows Hello for Business](hello-identity-verification.md)
|
||||||
- [Implement Windows Hello for Business in your organization](hello-implement-in-organization.md)
|
- [Manage Windows Hello for Business in your organization](hello-manage-in-organization.md)
|
||||||
- [Enable phone sign-in to PC or VPN](hello-enable-phone-signin.md)
|
- [Enable phone sign-in to PC or VPN](hello-enable-phone-signin.md)
|
||||||
- [Why a PIN is better than a password](hello-why-pin-is-better-than-password.md)
|
- [Why a PIN is better than a password](hello-why-pin-is-better-than-password.md)
|
||||||
- [Prepare people to use Windows Hello](hello-prepare-people-to-use.md)
|
- [Prepare people to use Windows Hello](hello-prepare-people-to-use.md)
|
||||||
|
129
windows/keep-secure/hello-identity-verification.md
Normal file
129
windows/keep-secure/hello-identity-verification.md
Normal file
@ -0,0 +1,129 @@
|
|||||||
|
---
|
||||||
|
title: Windows Hello for Business (Windows 10)
|
||||||
|
description: In Windows 10, Windows Hello for Business replaces passwords with strong two-factor authentication on PCs and mobile devices. This authentication consists of a new type of user credential that is tied to a device and a biometric or PIN.
|
||||||
|
ms.assetid: 5BF09642-8CF5-4FBC-AC9A-5CA51E19387E
|
||||||
|
keywords: identity, PIN, biometric, Hello, passport
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security, mobile
|
||||||
|
author: jdeckerMS
|
||||||
|
localizationpriority: high
|
||||||
|
---
|
||||||
|
# Windows Hello for Business
|
||||||
|
|
||||||
|
**Applies to**
|
||||||
|
- Windows 10
|
||||||
|
- Windows 10 Mobile
|
||||||
|
|
||||||
|
In Windows 10, Windows Hello for Business replaces passwords with strong two-factor authentication on PCs and mobile devices. This authentication consists of a new type of user credential that is tied to a device and uses a biometric or PIN.
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
> When Windows 10 first shipped, it included Microsoft Passport and Windows Hello, which worked together to provide multi-factor authentication. To simplify deployment and improve supportability, Microsoft has combined these technologies into a single solution under the Windows Hello name. Customers who have already deployed these technologies will not experience any change in functionality. Customers who have yet to evaluate Windows Hello will find it easier to deploy due to simplified policies, documentation, and semantics.
|
||||||
|
|
||||||
|
Windows Hello addresses the following problems with passwords:
|
||||||
|
- Strong passwords can be difficult to remember, and users often reuse passwords on multiple sites.
|
||||||
|
- Server breaches can expose symmetric network credentials (passwords).
|
||||||
|
- Passwords are subject to [replay attacks](https://go.microsoft.com/fwlink/p/?LinkId=615673).
|
||||||
|
- Users can inadvertently expose their passwords due to [phishing attacks](https://go.microsoft.com/fwlink/p/?LinkId=615674).
|
||||||
|
|
||||||
|
Windows Hello lets users authenticate to:
|
||||||
|
- a Microsoft account.
|
||||||
|
- an Active Directory account.
|
||||||
|
- a Microsoft Azure Active Directory (Azure AD) account.
|
||||||
|
- Identity Provider Services or Relying Party Services that support [Fast ID Online (FIDO) v2.0](https://go.microsoft.com/fwlink/p/?LinkId=533889) authentication (in progress)
|
||||||
|
|
||||||
|
After an initial two-step verification of the user during enrollment, Windows Hello is set up on the user's device and Windows asks the user to set a gesture, which can be a biometric, such as a fingerprint, or a PIN. The user provides the gesture to verify their identity. Windows then uses Windows Hello to authenticate users.
|
||||||
|
|
||||||
|
As an administrator in an enterprise or educational organization, you can create policies to manage Windows Hello for Business use on Windows 10-based devices that connect to your organization.
|
||||||
|
|
||||||
|
## Biometric sign-in
|
||||||
|
|
||||||
|
Windows Hello provides reliable, fully integrated biometric authentication based on facial recognition or fingerprint matching. Windows Hello uses a combination of special infrared (IR) cameras and software to increase accuracy and guard against spoofing. Major hardware vendors are shipping devices that have integrated Windows Hello-compatible cameras. Fingerprint reader hardware can be used or added to devices that don’t currently have it. On devices that support Windows Hello, an easy biometric gesture unlocks users’ credentials.
|
||||||
|
|
||||||
|
- **Facial recognition**. This type of biometric recognition uses special cameras that see in IR light, which allows them to reliably tell the difference between a photograph or scan and a living person. Several vendors are shipping external cameras that incorporate this technology, and major laptop manufacturers are incorporating it into their devices, as well.
|
||||||
|
- **Fingerprint recognition**. This type of biometric recognition uses a capacitive fingerprint sensor to scan your fingerprint. Fingerprint readers have been available for Windows computers for years, but the current generation of sensors is significantly more reliable and less error-prone. Most existing fingerprint readers (whether external or integrated into laptops or USB keyboards) work with Windows 10.
|
||||||
|
|
||||||
|
Windows stores biometric data that is used to implement Windows Hello securely on the local device only. The biometric data doesn’t roam and is never sent to external devices or servers. Because Windows Hello only stores biometric identification data on the device, there’s no single collection point an attacker can compromise to steal biometric data.
|
||||||
|
|
||||||
|
|
||||||
|
## The difference between Windows Hello and Windows Hello for Business
|
||||||
|
|
||||||
|
- Individuals can create a PIN or biometric gesture on their personal devices for convenient sign-in. This use of Windows Hello is unique to the device on which it is set up, however it is not backed by asymmetric (public/private key) or certificate-based authentication.
|
||||||
|
|
||||||
|
- Windows Hello for Business, which is configured by Group Policy or mobile device management (MDM) policy, uses key-based or certificate-based authentication.
|
||||||
|
|
||||||
|
- Currently Active Directory accounts using Windows Hello are not backed by key-based or certificate-based authentication. Support for key-based or certificate-based authentication is on the roadmap for a future release.
|
||||||
|
|
||||||
|
## Benefits of Windows Hello
|
||||||
|
|
||||||
|
Reports of identity theft and large-scale hacking are frequent headlines. Nobody wants to be notified that their user name and password have been exposed.
|
||||||
|
|
||||||
|
You may wonder [how a PIN can help protect a device better than a password](why-a-pin-is-better-than-a-password.md). Passwords are shared secrets; they are entered on a device and transmitted over the network to the server. An intercepted account name and password can be used by anyone. Because they're stored on the server, a server breach can reveal those stored credentials.
|
||||||
|
|
||||||
|
In Windows 10, Windows Hello replaces passwords. When the identity provider supports keys, the Windows Hello provisioning process creates a cryptographic key pair bound to the Trusted Platform Module (TPM), if a device has a TPM, or in software. Access to these keys and obtaining a signature to validate user possession of the private key is enabled only by the PIN or biometric gesture. The two-step verification that takes place during Windows Hello enrollment creates a trusted relationship between the identity provider and the user when the public portion of the public/private key pair is sent to an identity provider and associated with a user account. When a user enters the gesture on the device, the identity provider knows from the combination of Hello keys and gesture that this is a verified identity and provides an authentication token that allows Windows 10 to access resources and services.
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
>Windows Hello as a convenience sign-in uses regular user name and password authentication, without the user entering the password.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
Imagine that someone is looking over your shoulder as you get money from an ATM and sees the PIN that you enter. Having that PIN won't help them access your account because they don't have your ATM card. In the same way, learning your PIN for your device doesn't allow that attacker to access your account because the PIN is local to your specific device and doesn't enable any type of authentication from any other device.
|
||||||
|
|
||||||
|
Windows Hello helps protect user identities and user credentials. Because the user doesn't enter a password (except during provisioning), it helps circumvent phishing and brute force attacks. It also helps prevent server breaches because Windows Hello credentials are an asymmetric key pair, which helps prevent replay attacks when these keys are protected by TPMs.
|
||||||
|
|
||||||
|
For customers using a hybrid Active Directory and Azure Active Directorye environment, Windows Hello also enables Windows 10 Mobile devices to be used as [a remote credential](prepare-people-to-use-microsoft-passport.md#bmk-remote) when signing into Windows 10 PCs. During the sign-in process, the Windows 10 PC can connect using Bluetooth to access Windows Hello on the user’s Windows 10 Mobile device. Because users carry their phone with them, Windows Hello makes implementing two-factor authentication across the enterprise less costly and complex than other solutions.
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> Phone sign-in is currently limited to select Technology Adoption Program (TAP) participants.
|
||||||
|
|
||||||
|
|
||||||
|
## How Windows Hello for Business works: key points
|
||||||
|
|
||||||
|
- Windows Hello credentials are based on certificate or asymmetrical key pair. Windows Hello credentials can be bound to the device, and the token that is obtained using the credential is also bound to the device.
|
||||||
|
- Identity provider (such as Active Directory, Azure AD, or a Microsoft account) validates user identity and maps the Windows Hello public key to a user account during the registration step.
|
||||||
|
- Keys can be generated in hardware (TPM 1.2 or 2.0 for enterprises, and TPM 2.0 for consumers) or software, based on the policy.
|
||||||
|
- Authentication is the two-factor authentication with the combination of a key or certificate tied to a device and something that the person knows (a PIN) or something that the person is (Windows Hello). The Windows Hello gesture does not roam between devices and is not shared with the server; it is stored locally on a device.
|
||||||
|
- Private key never leaves a device when using TPM. The authenticating server has a public key that is mapped to the user account during the registration process.
|
||||||
|
- PIN entry and biometric gesture both trigger Windows 10 to use the private key to cryptographically sign data that is sent to the identity provider. The identity provider verifies the user's identity and authenticates the user.
|
||||||
|
- Personal (Microsoft account) and corporate (Active Directory or Azure AD) accounts use a single container for keys. All keys are separated by identity providers' domains to help ensure user privacy.
|
||||||
|
- Certificate private keys can be protected by the Windows Hello container and the Windows Hello gesture.
|
||||||
|
|
||||||
|
For details, see [How Windows Hello for Business works](hello-how-it-works.md).
|
||||||
|
|
||||||
|
## Comparing key-based and certificate-based authentication
|
||||||
|
|
||||||
|
Windows Hello for Business can use either keys (hardware or software) or certificates in hardware or software. Enterprises that have a public key infrastructure (PKI) for issuing and managing certificates can continue to use PKI in combination with Windows Hello. Enterprises that do not use PKI or want to reduce the effort associated with managing certificates can rely on key-based credentials for Windows Hello but still use certificates on their domain controllers as a root of trust.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
## Learn more
|
||||||
|
|
||||||
|
[Introduction to Windows Hello](https://go.microsoft.com/fwlink/p/?LinkId=786649), video presentation on Microsoft Virtual Academy
|
||||||
|
|
||||||
|
[What's new in Active Directory Domain Services (AD DS) in Windows Server Technical Preview](https://go.microsoft.com/fwlink/p/?LinkId=708533)
|
||||||
|
|
||||||
|
[Windows Hello face authentication](https://go.microsoft.com/fwlink/p/?LinkId=626024)
|
||||||
|
|
||||||
|
[Biometrics hardware guidelines](https://go.microsoft.com/fwlink/p/?LinkId=626995)
|
||||||
|
|
||||||
|
[Windows 10: Disrupting the Revolution of Cyber-Threats with Revolutionary Security!](https://go.microsoft.com/fwlink/p/?LinkId=533890)
|
||||||
|
|
||||||
|
[Windows 10: The End Game for Passwords and Credential Theft?](https://go.microsoft.com/fwlink/p/?LinkId=533891)
|
||||||
|
|
||||||
|
[Authenticating identities without passwords through Microsoft Passport](https://go.microsoft.com/fwlink/p/?LinkId=616778)
|
||||||
|
|
||||||
|
[Microsoft Passport guide](https://go.microsoft.com/fwlink/p/?LinkId=691928)
|
||||||
|
|
||||||
|
## Related topics
|
||||||
|
|
||||||
|
- [How Windows Hello for Business works](hello-how-it-works.md)
|
||||||
|
- [Manage Windows Hello for Business in your organization](hello-manage-in-organization.md)
|
||||||
|
- [Enable phone sign-in to PC or VPN](hello-enable-phone-signin.md)
|
||||||
|
- [Why a PIN is better than a password](hello-why-pin-is-better-than-password.md)
|
||||||
|
- [Prepare people to use Windows Hello](hello-prepare-people-to-use.md)
|
||||||
|
- [Windows Hello and password changes](hello-and-password-changes.md)
|
||||||
|
- [Windows Hello errors during PIN creation](hello-errors-during-pin-creation.md)
|
||||||
|
- [Event ID 300 - Windows Hello successfully created](hello-event-300.md)
|
||||||
|
- [Windows Hello biometrics in the enterprise](hello-biometrics-in-enterprise.md)
|
||||||
|
|
@ -1,129 +0,0 @@
|
|||||||
---
|
|
||||||
title: Manage identity verification using Windows Hello for Business (Windows 10)
|
|
||||||
description: In Windows 10, Windows Hello for Business replaces passwords with strong two-factor authentication on PCs and mobile devices. This authentication consists of a new type of user credential that is tied to a device and a biometric or PIN.
|
|
||||||
ms.assetid: 5BF09642-8CF5-4FBC-AC9A-5CA51E19387E
|
|
||||||
keywords: identity, PIN, biometric, Hello, passport
|
|
||||||
ms.prod: w10
|
|
||||||
ms.mktglfcycl: deploy
|
|
||||||
ms.sitesec: library
|
|
||||||
ms.pagetype: security, mobile
|
|
||||||
author: jdeckerMS
|
|
||||||
localizationpriority: high
|
|
||||||
---
|
|
||||||
# Manage identity verification using Windows Hello for Business
|
|
||||||
|
|
||||||
**Applies to**
|
|
||||||
- Windows 10
|
|
||||||
- Windows 10 Mobile
|
|
||||||
|
|
||||||
In Windows 10, Windows Hello for Business replaces passwords with strong two-factor authentication on PCs and mobile devices. This authentication consists of a new type of user credential that is tied to a device and a biometric or PIN.
|
|
||||||
|
|
||||||
>[!NOTE]
|
|
||||||
> When Windows 10 first shipped, it included Microsoft Passport and Windows Hello, which worked together to provide multi-factor authentication. To simplify deployment and improve supportability, Microsoft has combined these technologies into a single solution under the Windows Hello name. Customers who have already deployed these technologies will not experience any change in functionality. Customers who have yet to evaluate Windows Hello will find it easier to deploy due to simplified policies, documentation, and semantics.
|
|
||||||
|
|
||||||
Hello addresses the following problems with passwords:
|
|
||||||
- Passwords can be difficult to remember, and users often reuse passwords on multiple sites.
|
|
||||||
- Server breaches can expose symmetric network credentials.
|
|
||||||
- Passwords can be subject to [replay attacks](https://go.microsoft.com/fwlink/p/?LinkId=615673).
|
|
||||||
- Users can inadvertently expose their passwords due to [phishing attacks](https://go.microsoft.com/fwlink/p/?LinkId=615674).
|
|
||||||
|
|
||||||
Hello lets users authenticate to:
|
|
||||||
- a Microsoft account.
|
|
||||||
- an Active Directory account.
|
|
||||||
- a Microsoft Azure Active Directory (Azure AD) account.
|
|
||||||
- Identity Provider Services or Relying Party Services that support [Fast ID Online (FIDO) v2.0](https://go.microsoft.com/fwlink/p/?LinkId=533889) authentication
|
|
||||||
|
|
||||||
After an initial two-step verification of the user during enrollment, Hello is set up on the user's device and the user is asked to set a gesture, which can be a biometric, such as a fingerprint, or a PIN. The user provides the gesture to verify their identity. Windows then uses Hello to authenticate users and help them to access protected resources and services.
|
|
||||||
|
|
||||||
As an administrator in an enterprise or educational organization, you can create policies to manage Hello use on Windows 10-based devices that connect to your organization.
|
|
||||||
|
|
||||||
## Biometric sign-in
|
|
||||||
|
|
||||||
Windows Hello provides reliable, fully integrated biometric authentication based on facial recognition or fingerprint matching. Hello uses a combination of special infrared (IR) cameras and software to increase accuracy and guard against spoofing. Major hardware vendors are shipping devices that have integrated Windows Hello-compatible cameras, and fingerprint reader hardware can be used or added to devices that don’t currently have it. On devices that support Windows Hello, an easy biometric gesture unlocks users’ credentials.
|
|
||||||
|
|
||||||
- **Facial recognition**. This type uses special cameras that see in IR light, which allows them to reliably tell the difference between a photograph or scan and a living person. Several vendors are shipping external cameras that incorporate this technology, and major laptop manufacturers are incorporating it into their devices, as well.
|
|
||||||
- **Fingerprint recognition**. This type uses a capacitive fingerprint sensor to scan your fingerprint. Fingerprint readers have been available for Windows computers for years, but the current generation of sensors is significantly more reliable and less error-prone. Most existing fingerprint readers (whether external or integrated into laptops or USB keyboards) work with Windows 10.
|
|
||||||
|
|
||||||
Biometric data used to implement Windows Hello is stored securely on the local device only. It doesn’t roam and is never sent to external devices or servers. Because Windows Hello only stores biometric identification data on the device, there’s no single collection point an attacker can compromise to steal biometric data.
|
|
||||||
|
|
||||||
|
|
||||||
## The difference between Windows Hello and Windows Hello for Business
|
|
||||||
|
|
||||||
- Individuals can create a PIN or biometric gesture on their personal devices for convenient sign-in. This use of Hello provides a layer of protection by being unique to the device on which it is set up, however it is not backed by certificate-based authentication.
|
|
||||||
|
|
||||||
- Windows Hello for Business, which is configured by Group Policy or MDM policy, uses key-based or certificate-based authentication.
|
|
||||||
|
|
||||||
- Currently Active Directory accounts using Windows Hello are not backed by key-based or certificate-based authentication. Support for key-based or certificate-based authentication is on the roadmap for a future release.
|
|
||||||
|
|
||||||
## Benefits of Windows Hello
|
|
||||||
|
|
||||||
Reports of identity theft and large-scale hacking are frequent headlines. Nobody wants to be notified that their user name and password have been exposed.
|
|
||||||
|
|
||||||
You may wonder [how a PIN can help protect a device better than a password](why-a-pin-is-better-than-a-password.md). Passwords are shared secrets; they are entered on a device and transmitted over the network to the server. An intercepted account name and password can be used by anyone. Because they're stored on the server, a server breach can reveal those stored credentials.
|
|
||||||
|
|
||||||
In Windows 10, Hello replaces passwords. The Hello provisioning process creates a cryptographic key pair bound to the Trusted Platform Module (TPM), if a device has a TPM, or in software. Access to these keys and obtaining a signature to validate user possession of the private key is enabled only by the PIN or biometric gesture. The two-step verification that takes place during Hello enrollment creates a trusted relationship between the identity provider and the user when the public portion of the public/private key pair is sent to an identity provider and associated with a user account. When a user enters the gesture on the device, the identify provider knows from the combination of Hello keys and gesture that this is a verified identity and provides an authentication token that allows Windows 10 to access resources and services. In addition, during the registration process, the attestation claim is produced for every identity provider to cryptographically prove that the Hello keys are tied to TPM. During registration, when the attestation claim is not presented to the identity provider, the identity provider must assume that the Hello key is created in software.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
Imagine that someone is looking over your shoulder as you get money from an ATM and sees the PIN that you enter. Having that PIN won't help them access your account because they don't have your ATM card. In the same way, learning your PIN for your device doesn't allow that attacker to access your account because the PIN is local to your specific device and doesn't enable any type of authentication from any other device.
|
|
||||||
|
|
||||||
Hello helps protect user identities and user credentials. Because no passwords are used, it helps circumvent phishing and brute force attacks. It also helps prevent server breaches because Hello credentials are an asymmetric key pair, which helps prevent replay attacks when these keys are protected by TPMs.
|
|
||||||
|
|
||||||
Hello also enables Windows 10 Mobile devices to be used as [a remote credential](prepare-people-to-use-microsoft-passport.md#bmk-remote) when signing into Windows 10 PCs. During the sign-in process, the Windows 10 PC can connect using Bluetooth to access Hello on the user’s Windows 10 Mobile device. Because users carry their phone with them, Hello makes implementing two-factor authentication across the enterprise less costly and complex than other solutions.
|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> Phone sign-in is currently limited to select Technology Adoption Program (TAP) participants.
|
|
||||||
|
|
||||||
|
|
||||||
## How Windows Hello for Business works: key points
|
|
||||||
|
|
||||||
- Hello credentials are based on certificate or asymmetrical key pair. Hello credentials are bound to the device, and the token that is obtained using the credential is also bound to the device.
|
|
||||||
- Identify provider (such as Active Directory, Azure AD, or a Microsoft account) validates user identity and maps Hello's public key to a user account during the registration step.
|
|
||||||
- Keys can be generated in hardware (TPM 1.2 or 2.0 for enterprises, and TPM 2.0 for consumers) or software, based on the policy.
|
|
||||||
- Authentication is the two-factor authentication with the combination of a key or certificate tied to a device and something that the person knows (a PIN) or something that the person is (Windows Hello). The Hello gesture does not roam between devices and is not shared with the server; it is stored locally on a device.
|
|
||||||
- Private key never leaves a device. The authenticating server has a public key that is mapped to the user account during the registration process.
|
|
||||||
- PIN entry and biometric gesture both trigger Windows 10 to verify the user's identity and authenticate using Hello keys or certificates.
|
|
||||||
- Personal (Microsoft account) and corporate (Active Directory or Azure AD) accounts use a single container for keys. All keys are separated by identity providers' domains to help ensure user privacy.
|
|
||||||
- Certificate private keys can be protected by the Hello container and the Hello gesture.
|
|
||||||
|
|
||||||
For details, see [How Windows Hello for Business works](hello-how-it-works.md).
|
|
||||||
|
|
||||||
## Comparing key-based and certificate-based authentication
|
|
||||||
|
|
||||||
Windows Hello for Business can use either keys (hardware or software) or certificates with keys in hardware or software to confirm identity. Enterprises that have a public key infrastructure (PKI) for issuing and managing certificates can continue to use PKI in combination with Hello. Enterprises that do not use PKI or want to reduce the effort associated with managing certificates can rely on key-based credentials for Hello.
|
|
||||||
|
|
||||||
Hardware-based keys, which are generated by TPM, provide the highest level of assurance. When the TPM is manufactured, an Endorsement Key (EK) certificate is resident in the TPM. This EK certificate creates a root trust for all other keys that are generated on this TPM.
|
|
||||||
EK certification is used to generate an attestation identity key (AIK) certificate issued by a Microsoft certificate authority. This AIK certificate can be used as an attestation claim to prove to identity providers that the Hello keys are generated on the same TPM. The Microsoft certificate authority (CA) generates the AIK certificate per device, per user, and per IDP to help ensure that user privacy is protected.
|
|
||||||
|
|
||||||
When identity providers such as Active Directory or Azure AD enroll a certificate in Hello, Windows 10 will support the same set of scenarios as a smart card. When the credential type is a key, only key-based trust and operations will be supported.
|
|
||||||
|
|
||||||
## Learn more
|
|
||||||
|
|
||||||
[Introduction to Windows Hello](https://go.microsoft.com/fwlink/p/?LinkId=786649), video presentation on Microsoft Virtual Academy
|
|
||||||
|
|
||||||
[What's new in Active Directory Domain Services (AD DS) in Windows Server Technical Preview](https://go.microsoft.com/fwlink/p/?LinkId=708533)
|
|
||||||
|
|
||||||
[Windows Hello face authentication](https://go.microsoft.com/fwlink/p/?LinkId=626024)
|
|
||||||
|
|
||||||
[Biometrics hardware guidelines](https://go.microsoft.com/fwlink/p/?LinkId=626995)
|
|
||||||
|
|
||||||
[Windows 10: Disrupting the Revolution of Cyber-Threats with Revolutionary Security!](https://go.microsoft.com/fwlink/p/?LinkId=533890)
|
|
||||||
|
|
||||||
[Windows 10: The End Game for Passwords and Credential Theft?](https://go.microsoft.com/fwlink/p/?LinkId=533891)
|
|
||||||
|
|
||||||
[Authenticating identities without passwords through Microsoft Passport](https://go.microsoft.com/fwlink/p/?LinkId=616778)
|
|
||||||
|
|
||||||
[Microsoft Passport guide](https://go.microsoft.com/fwlink/p/?LinkId=691928)
|
|
||||||
|
|
||||||
## Related topics
|
|
||||||
|
|
||||||
- [How Windows Hello for Business works](hello-how-it-works.md)
|
|
||||||
- [Implement Windows Hello for Business in your organization](hello-implement-in-organization.md)
|
|
||||||
- [Enable phone sign-in to PC or VPN](hello-enable-phone-signin.md)
|
|
||||||
- [Why a PIN is better than a password](hello-why-pin-is-better-than-password.md)
|
|
||||||
- [Prepare people to use Windows Hello](hello-prepare-people-to-use.md)
|
|
||||||
- [Windows Hello and password changes](hello-and-password-changes.md)
|
|
||||||
- [Windows Hello errors during PIN creation](hello-errors-during-pin-creation.md)
|
|
||||||
- [Event ID 300 - Windows Hello successfully created](hello-event-300.md)
|
|
||||||
- [Windows Hello biometrics in the enterprise](hello-biometrics-in-enterprise.md)
|
|
||||||
|
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Implement Windows Hello in your organization (Windows 10)
|
title: Manage Windows Hello in your organization (Windows 10)
|
||||||
description: You can create a Group Policy or mobile device management (MDM) policy that will implement Windows Hello for Business on devices running Windows 10.
|
description: You can create a Group Policy or mobile device management (MDM) policy that will implement Windows Hello for Business on devices running Windows 10.
|
||||||
ms.assetid: 47B55221-24BE-482D-BD31-C78B22AC06D8
|
ms.assetid: 47B55221-24BE-482D-BD31-C78B22AC06D8
|
||||||
keywords: identity, PIN, biometric, Hello
|
keywords: identity, PIN, biometric, Hello
|
||||||
@ -11,7 +11,7 @@ author: jdeckerMS
|
|||||||
localizationpriority: high
|
localizationpriority: high
|
||||||
---
|
---
|
||||||
|
|
||||||
# Implement Windows Hello for Business in your organization
|
# Manage Windows Hello for Business in your organization
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
- Windows 10
|
- Windows 10
|
||||||
@ -420,7 +420,7 @@ If you want to use Windows Hello for Business with certificates, you’ll need a
|
|||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
|
|
||||||
- [Manage identity verification using Windows Hello for Business](hello-manage-identity-verification.md)
|
- [Windows Hello for Business](hello-identity-verification.md)
|
||||||
- [How Windows Hello for Business works](hello-how-it-works.md)
|
- [How Windows Hello for Business works](hello-how-it-works.md)
|
||||||
- [Enable phone sign-in to PC or VPN](hello-enable-phone-signin.md)
|
- [Enable phone sign-in to PC or VPN](hello-enable-phone-signin.md)
|
||||||
- [Why a PIN is better than a password](hello-why-pin-is-better-than-password.md)
|
- [Why a PIN is better than a password](hello-why-pin-is-better-than-password.md)
|
@ -97,9 +97,9 @@ You simply connect to VPN as you normally would. If the phone's certificates are
|
|||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
|
|
||||||
- [Manage identity verification using Windows Hello for Business](hello-manage-identity-verification.md)
|
- [Windows Hello for Business](hello-identity-verification.md)
|
||||||
- [How Windows Hello for Business works](hello-how-it-works.md)
|
- [How Windows Hello for Business works](hello-how-it-works.md)
|
||||||
- [Implement Windows Hello for Business in your organization](hello-implement-in-organization.md)
|
- [Manage Windows Hello for Business in your organization](hello-manage-in-organization.md)
|
||||||
- [Enable phone sign-in to PC or VPN](hello-enable-phone-signin.md)
|
- [Enable phone sign-in to PC or VPN](hello-enable-phone-signin.md)
|
||||||
- [Why a PIN is better than a password](hello-why-pin-is-better-than-password.md)
|
- [Why a PIN is better than a password](hello-why-pin-is-better-than-password.md)
|
||||||
- [Windows Hello and password changes](hello-and-password-changes.md)
|
- [Windows Hello and password changes](hello-and-password-changes.md)
|
||||||
|
@ -70,9 +70,9 @@ If you only had a biometric sign-in configured and, for any reason, were unable
|
|||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
|
|
||||||
- [Manage identity verification using Windows Hello for Business](hello-manage-identity-verification.md)
|
- [Windows Hello for Business](hello-identity-verification.md)
|
||||||
- [How Windows Hello for Business works](hello-how-it-works.md)
|
- [How Windows Hello for Business works](hello-how-it-works.md)
|
||||||
- [Implement Windows Hello for Business in your organization](hello-implement-in-organization.md)
|
- [Manage Windows Hello for Business in your organization](hello-manage-in-organization.md)
|
||||||
- [Enable phone sign-in to PC or VPN](hello-enable-phone-signin.md)
|
- [Enable phone sign-in to PC or VPN](hello-enable-phone-signin.md)
|
||||||
- [Prepare people to use Windows Hello](hello-prepare-people-to-use.md)
|
- [Prepare people to use Windows Hello](hello-prepare-people-to-use.md)
|
||||||
- [Windows Hello and password changes](hello-and-password-changes.md)
|
- [Windows Hello and password changes](hello-and-password-changes.md)
|
||||||
|
@ -8,7 +8,7 @@ ms.mktglfcycl: deploy
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
author: jdeckerMS
|
author: jdeckerMS
|
||||||
redirect_url: https://technet.microsoft.com/en-us/itpro/windows/keep-secure/hello-implement-in-organization
|
redirect_url: https://technet.microsoft.com/en-us/itpro/windows/keep-secure/hello-manage-in-organization
|
||||||
---
|
---
|
||||||
|
|
||||||
# Implement Windows Hello for Business in your organization
|
# Implement Windows Hello for Business in your organization
|
||||||
|
@ -18,7 +18,7 @@ Learn about keeping Windows 10 and Windows 10 Mobile secure.
|
|||||||
| - | - |
|
| - | - |
|
||||||
| [Block untrusted fonts in an enterprise](block-untrusted-fonts-in-enterprise.md) | To help protect your company from attacks which may originate from untrusted or attacker controlled font files, we’ve created the Blocking Untrusted Fonts feature. Using this feature, you can turn on a global setting that stops your employees from loading untrusted fonts processed using the Graphics Device Interface (GDI) onto your network. Untrusted fonts are any font installed outside of the %windir%/Fonts directory. Blocking untrusted fonts helps prevent both remote (web-based or email-based) and local EOP attacks that can happen during the font file-parsing process. |
|
| [Block untrusted fonts in an enterprise](block-untrusted-fonts-in-enterprise.md) | To help protect your company from attacks which may originate from untrusted or attacker controlled font files, we’ve created the Blocking Untrusted Fonts feature. Using this feature, you can turn on a global setting that stops your employees from loading untrusted fonts processed using the Graphics Device Interface (GDI) onto your network. Untrusted fonts are any font installed outside of the %windir%/Fonts directory. Blocking untrusted fonts helps prevent both remote (web-based or email-based) and local EOP attacks that can happen during the font file-parsing process. |
|
||||||
| [Device Guard certification and compliance](device-guard-certification-and-compliance.md) | Device Guard is a combination of hardware and software security features that, when configured together, will lock a device down so that it can only run trusted applications. If the app isn’t trusted it can’t run, period. It also means that even if an attacker manages to get control of the Windows kernel, he or she will be much less likely to be able to run malicious executable code after the computer restarts because of how decisions are made about what can run and when. |
|
| [Device Guard certification and compliance](device-guard-certification-and-compliance.md) | Device Guard is a combination of hardware and software security features that, when configured together, will lock a device down so that it can only run trusted applications. If the app isn’t trusted it can’t run, period. It also means that even if an attacker manages to get control of the Windows kernel, he or she will be much less likely to be able to run malicious executable code after the computer restarts because of how decisions are made about what can run and when. |
|
||||||
| [Manage identity verification using Windows Hello for Business](hello-manage-identity-verification.md) | In Windows 10, Windows Hello replaces passwords with strong two-factor authentication on PCs and mobile devices. This authentication consists of a new type of user credential that is tied to a device and a biometric or PIN. |
|
| [Windows Hello for Business](hello-identity-verification.md) | In Windows 10, Windows Hello replaces passwords with strong two-factor authentication on PCs and mobile devices. This authentication consists of a new type of user credential that is tied to a device and a biometric or PIN. |
|
||||||
| [Configure S/MIME for Windows 10 and Windows 10 Mobile](configure-s-mime.md) | In Windows 10, S/MIME lets users encrypt outgoing messages and attachments so that only intended recipients who have a digital identification (ID), also known as a certificate, can read them. Users can digitally sign a message, which provides the recipients with a way to verify the identity of the sender and that the message hasn't been tampered with. |
|
| [Configure S/MIME for Windows 10 and Windows 10 Mobile](configure-s-mime.md) | In Windows 10, S/MIME lets users encrypt outgoing messages and attachments so that only intended recipients who have a digital identification (ID), also known as a certificate, can read them. Users can digitally sign a message, which provides the recipients with a way to verify the identity of the sender and that the message hasn't been tampered with. |
|
||||||
| [Install digital certificates on Windows 10 Mobile](installing-digital-certificates-on-windows-10-mobile.md) | Digital certificates bind the identity of a user or computer to a pair of keys that can be used to encrypt and sign digital information. Certificates are issued by a certification authority (CA) that vouches for the identity of the certificate holder, and they enable secure client communications with websites and services. |
|
| [Install digital certificates on Windows 10 Mobile](installing-digital-certificates-on-windows-10-mobile.md) | Digital certificates bind the identity of a user or computer to a pair of keys that can be used to encrypt and sign digital information. Certificates are issued by a certification authority (CA) that vouches for the identity of the certificate holder, and they enable secure client communications with websites and services. |
|
||||||
| [Device Guard deployment guide](device-guard-deployment-guide.md) | Device Guard is a combination of hardware and software security features that, when configured together, will lock a device down so that it can only run trusted applications. If the app isn’t trusted it can’t run, period. It also means that even if an attacker manages to get control of the Windows kernel, he or she will be much less likely to be able to run malicious executable code after the computer restarts because of how decisions are made about what can run and when. |
|
| [Device Guard deployment guide](device-guard-deployment-guide.md) | Device Guard is a combination of hardware and software security features that, when configured together, will lock a device down so that it can only run trusted applications. If the app isn’t trusted it can’t run, period. It also means that even if an attacker manages to get control of the Windows kernel, he or she will be much less likely to be able to run malicious executable code after the computer restarts because of how decisions are made about what can run and when. |
|
||||||
|
@ -8,7 +8,7 @@ ms.mktglfcycl: deploy
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security, mobile
|
ms.pagetype: security, mobile
|
||||||
author: jdeckerMS
|
author: jdeckerMS
|
||||||
redirect_url: https://technet.microsoft.com/en-us/itpro/windows/keep-secure/hello-manage-identity-verification
|
redirect_url: https://technet.microsoft.com/en-us/itpro/windows/keep-secure/hello-identity-verification
|
||||||
---
|
---
|
||||||
# Manage identity verification using Windows Hello for Business
|
# Manage identity verification using Windows Hello for Business
|
||||||
|
|
||||||
|
Reference in New Issue
Block a user