diff --git a/windows/security/identity-protection/hello-for-business/deploy/index.md b/windows/security/identity-protection/hello-for-business/deploy/index.md index 113d823195..0da8019716 100644 --- a/windows/security/identity-protection/hello-for-business/deploy/index.md +++ b/windows/security/identity-protection/hello-for-business/deploy/index.md @@ -117,7 +117,7 @@ Users can authenticate to Microsoft Entra ID using federated authentication or c | **🔲** | **Hybrid** | Cloud Kerberos trust | Federated authentication | AD FS or third-party federation service | | **🔲** | **Hybrid** | Key trust | Cloud authentication | Password hash sync (PHS) or Pass-through authentication (PTA) | | **🔲** | **Hybrid** | Key trust | Federated authentication | AD FS or third-party federation service | -| **🔲** | **Hybrid** | Certificate trust | Federated authentication | This deployment model doesn't support PTA or PHS. Active Directory must be federated with Microsoft Entra ID using AD FS. The AD FS farm must support device registration.| +| **🔲** | **Hybrid** | Certificate trust | Federated authentication | This deployment model doesn't support PTA or PHS. Active Directory must be federated with Microsoft Entra ID using AD FS| To learn more: diff --git a/windows/security/identity-protection/hello-for-business/how-it-works.md b/windows/security/identity-protection/hello-for-business/how-it-works.md index 7acdefc44c..ed50c3575a 100644 --- a/windows/security/identity-protection/hello-for-business/how-it-works.md +++ b/windows/security/identity-protection/hello-for-business/how-it-works.md @@ -6,61 +6,44 @@ ms.topic: overview --- # How Windows Hello for Business works + -Windows Hello for Business is a distributed system that requires multiple technologies to work together. To simplify the explanation of how Windows Hello for Business works, it can be broken down into 5 components. 2 of these components are required only for specific deplyoment types. +Windows Hello for Business is a distributed system that requires multiple technologies to work together. To simplify the explanation of how Windows Hello for Business works, it can be broken down into 5 phases. 2 of these phases are required only for specific deplyoment types. :::row::: :::column span="1"::: **Device Registration** + :::image type="content" source="images/howitworks/device-registration.png" alt-text="Icon representing the device registration phase."::: :::column-end::: :::column span="3"::: - Registration is a fundamental prerequisite for Windows Hello for Business. Without registration, Windows Hello for Business provisioning cannot start. + Registration is a prerequisite for Windows Hello for Business. Without device registration, Windows Hello for Business provisioning cannot start. - Registration is where the device registers its identity with the identity provider, so that it can be associated and authenticate to the identity provider. + During device registration, the device registers its identity with the identity provider (IdP), so that it can be associated and authenticate to the IdP. The IdP can be Active Directory or Microsoft Entra ID. :::column-end::: :::row-end::: :::row::: :::column span="1"::: **Provisioning** +:::image type="content" source="images/howitworks/provisioning.png" alt-text="Icon representing the provisioning phase."::: :::column-end::: :::column span="3"::: - Provisioning is when the user uses one form of authentication to request a new Windows Hello for Business credential. Typically the user signs in to Windows using user name and password. The provisioning flow requires a second factor of authentication before it can create a strong, two-factor Windows Hello for Business credential. + During this phase, the user authenticates using one form of authentication (typically, username/password) to request a new Windows Hello for Business credential. The provisioning flow requires a second factor of authentication before it can create a strong, two-factor Windows Hello for Business credential. - The Windows Hello provisioning process creates a cryptographic key pair bound to the Trusted Platform Module (TPM), if a device has a TPM 2.0, or in software. Access to these keys and obtaining a signature to validate user possession of the private key is enabled only by the PIN or biometric gesture. The two-step verification that takes place during Windows Hello enrollment creates a trusted relationship between the identity provider and the user when the public portion of the public/private key pair is sent to an identity provider and associated with a user account. When a user enters the gesture on the device, the identity provider knows that it's a verified identity, because of the combination of Windows Hello keys and gestures. It then provides an authentication token that allows Windows to access resources and services. - :::column-end::: -:::row-end::: -:::row::: - :::column span="1"::: - **Authentication** - :::column-end::: - :::column span="3"::: - With provisioning completes, users can sign-in to Windows using biometrics or a PIN. Regardless of the gesture used, authentication occurs using the private portion of the Windows Hello for Business credential. + After multi-factor authentication (MFA), the provisioning process generates a key pair bound to the Trusted Platform Module (TPM), if available, or in software: + - the private key is protected by the TPM and can't be exported + - the public key is registered with the IdP and the private key is stored in the TPM + :::column-end::: :::row-end::: :::row::: @@ -68,7 +51,7 @@ Windows Hello for Business is a distributed system that requires multiple techno **Key synchronization** :::column-end::: :::column span="3"::: - + In this phase, applicable only to hybrid deploments, the user's public key is synchronized from Microsoft Entra ID to Active Directory. :::column-end::: :::row-end::: :::row::: @@ -76,7 +59,18 @@ Windows Hello for Business is a distributed system that requires multiple techno **Certificate enrollment** :::column-end::: :::column span="3"::: - + This phase occurs only in certificate trust deployments. A user certificate is issued by an internal PKI and the public key stored in the Windows Hello container + :::column-end::: +:::row-end::: +:::row::: + :::column span="1"::: + **Authentication** + :::column-end::: + :::column span="3"::: + Once the provisioning phase completes, users can sign-in to Windows using biometrics or a PIN. Regardless of the gesture used, authentication occurs using the private portion of the Windows Hello for Business credential. + + In this phase, WHfB is used to authenticate user against the IdP. The user provides a gesture (PIN or biometric) and the IdP validates the user identity by mapping the user account to the public key used during the key registration step + :::column-end::: :::row-end::: @@ -84,18 +78,35 @@ The following sections provide deeper insight into each of these components. ## Device Registration -All devices included in the Windows Hello for Business deployment must go through a process called *device registration*. Device registration enables devices to be associated and to authentiticate to an identity provider (IdP): +All devices included in the Windows Hello for Business deployment must go through a process called *device registration*. Device registration enables devices to be associated and to authentiticate to an IdP: - For cloud and hybrid deployments, the identity provider is Microsoft Entra ID and the device registers with the *Device Registration Service* -- For on-premises deployments, the identity provider is Active Directory Federation Services (AD FS), and the device registers with the enterprise device registration service hosted on AD FS +- For on-premises deployments, the identity provider is Active Directory Federation Services (AD FS), and the device registers with the *Enterprise Device Registration Service* hosted on AD FS When a device is registered, the IdP provides the device with an identity that is used to authenticate the device when a user signs-in. -Device registration is identified by the *join type*. For more information, read [how device registration works](/azure/active-directory/devices/device-registration-how-it-works). +Device registration is identified by the *join type*. For more information, see [how device registration works](/entra/identity/devices/device-registration-how-it-works). ## Provisioning +The IdP validates the user identity and maps the Windows Hello public key to a user account during the registration step. + + +### Windows Hello data storage + +The biometric data used to support Windows Hello is stored on the local device only. It doesn't roam and is never sent to external devices or servers. This separation helps to stop potential attackers by providing no single collection point that an attacker could potentially compromise to steal biometric data. Additionally, even if an attacker was actually able to get the biometric data from a device, it cannot be converted back into a raw biometric sample that could be recognized by the biometric sensor. + +> [!NOTE] +>Each sensor on a device will have its own biometric database file where template data is stored. Each database has a unique, randomly generated key that is encrypted to the system. The template data for the sensor will be encrypted with this per-database key using AES with CBC chaining mode. The hash is SHA256. Some fingerprint sensors have the capability to complete matching on the fingerprint sensor module instead of in the OS. These sensors will store biometric data on the fingerprint module instead of in the database file. + +> C:\WINDOWS\System32\WinBioDatabase + ### Key registration - -## Authentication - -## Key synchronization (optional) - -## Certificate enrollment (optional) - - ## Next steps diff --git a/windows/security/identity-protection/hello-for-business/images/howitworks/authentication.png b/windows/security/identity-protection/hello-for-business/images/howitworks/authentication.png new file mode 100644 index 0000000000..a2299722b1 Binary files /dev/null and b/windows/security/identity-protection/hello-for-business/images/howitworks/authentication.png differ diff --git a/windows/security/identity-protection/hello-for-business/images/howitworks/certificate-enrollment.png b/windows/security/identity-protection/hello-for-business/images/howitworks/certificate-enrollment.png new file mode 100644 index 0000000000..ce561084b4 Binary files /dev/null and b/windows/security/identity-protection/hello-for-business/images/howitworks/certificate-enrollment.png differ diff --git a/windows/security/identity-protection/hello-for-business/images/howitworks/device-registration.png b/windows/security/identity-protection/hello-for-business/images/howitworks/device-registration.png new file mode 100644 index 0000000000..aa66c4da0a Binary files /dev/null and b/windows/security/identity-protection/hello-for-business/images/howitworks/device-registration.png differ diff --git a/windows/security/identity-protection/hello-for-business/images/howitworks/provisioning.png b/windows/security/identity-protection/hello-for-business/images/howitworks/provisioning.png new file mode 100644 index 0000000000..99cd54a007 Binary files /dev/null and b/windows/security/identity-protection/hello-for-business/images/howitworks/provisioning.png differ diff --git a/windows/security/identity-protection/hello-for-business/images/howitworks/synchronization.png b/windows/security/identity-protection/hello-for-business/images/howitworks/synchronization.png new file mode 100644 index 0000000000..9445948426 Binary files /dev/null and b/windows/security/identity-protection/hello-for-business/images/howitworks/synchronization.png differ diff --git a/windows/security/identity-protection/hello-for-business/index.md b/windows/security/identity-protection/hello-for-business/index.md index 07d69aa68b..be5eae5f0a 100644 --- a/windows/security/identity-protection/hello-for-business/index.md +++ b/windows/security/identity-protection/hello-for-business/index.md @@ -6,7 +6,24 @@ ms.date: 01/03/2024 --- # Windows Hello for Business Overview + Windows Hello is an authentication feature that allows users to sign in to their Windows devices using a PIN, facial recognition, fingerprint scanning, or iris scanning, instead of a traditional password. Windows Hello addresses the following problems with passwords: @@ -183,12 +200,6 @@ Windows Hello for Business provisioning begins immediately after the user signs - -There are 5 phases related to Windows Hello for Business: - -1. Device registration -1. Provisioning - 1. When the policy is received, if all the prerequisites are met, the user will be able to configure WHfB - > [!TIP] - > The `dsregcmd.exe` tool is critical to solve registration and provisioning issues - 1. The device receives a policy that enables WHfB and passes all the pre-requisites (based on the deployment type). A user provisions, or *enrolls*, Windows Hello by authenticating to the IdP with MFA. - 1. After successful MFA, the user must provide a gesture and PIN which will trigger a key pair generation in TPM - 1. Key registration: the public key is registered with the IdP and the private key is stored in the TPM. The private key is protected by the TPM and can't be exported. -1. Authentication - In this phase, WHfB is used to authenticate user against the IdP. The user provides a gesture (PIN or biometric) and the IdP validates the user identity by mapping the user account to the public key used during the key registration step -1. Key synchronization - In this phase, applicable only to hybrid deploments, the user's public key is synchronized from Microsoft Entra ID to Active Directory. -1. Certificate enrollment - This phase occurs only in certificate trust deployments. A user certificate is issued by an internal PKI and the public key stored in the Windows Hello container - - - - ---> +--> \ No newline at end of file diff --git a/windows/security/identity-protection/hello-for-business/toc.yml b/windows/security/identity-protection/hello-for-business/toc.yml index 105d115d7c..d328574c69 100644 --- a/windows/security/identity-protection/hello-for-business/toc.yml +++ b/windows/security/identity-protection/hello-for-business/toc.yml @@ -5,6 +5,8 @@ items: items: - name: Core concepts href: how-it-works.md + - name: How device registration works 🔗 + href: /entra/identity/devices/device-registration-how-it-works - name: How provisioning works href: how-it-works-provisioning.md - name: How authentication works