Refactor authentication and deployment options in index.md

This commit is contained in:
Paolo Matarazzo 2023-12-28 09:51:09 -05:00
parent 942a5aac3a
commit ea628e0bbb

View File

@ -99,21 +99,21 @@ For on-premises deployments, the identity provider is the on-premises server run
Here's a list of requirements for federated and non-federated deployments. Here's a list of requirements for federated and non-federated deployments.
| | Deployment model | Authentication options | Requirements and details | | Deployment model | Authentication options | Requirements |
|--|--|--|--| |--|--|--|
| :black_square_button: | Cloud-only | :black_square_button: Microsoft Entra ID<br> :black_square_button: Federated | Federated authentication requires a third-party federation service. | | Cloud-only | :black_square_button: **Non-federated**<br> :black_square_button: **Federated** | Federated authentication requires a third-party federation service. |
| :black_square_button: | Hybrid | :black_square_button: Microsoft Entra ID<br> :black_square_button: Federated | :black_square_button: Federated authentication requires AD FS or a third-party federation service<br> :black_square_button: **Cloud Kerberos trust** requires Microsoft Entra Kerberos<br> :black_square_button: **Key trust, non-federated**: [Password hash synchronization (PHS)][ENTRA-6] or [Microsoft Entra pass-through authentication (PTA)][ENTRA-7]<br> :black_square_button: **Certificate trust** doesn't support [PTA][ENTRA-7] or [(PHS)][ENTRA-6]. Active Directory must be federated with Microsoft Entra ID using AD FS. Additionally, you need to configure your AD FS farm to support Azure registered devices | | Hybrid | :black_square_button: **Non-federated**<br> :black_square_button: **Federated** | :black_square_button: Federated authentication requires AD FS or a third-party federation service<br> :black_square_button: **Cloud Kerberos trust** requires Microsoft Entra Kerberos<br> :black_square_button: **Key trust, non-federated**: [Password hash synchronization (PHS)][ENTRA-6] or [Microsoft Entra pass-through authentication (PTA)][ENTRA-7]<br> :black_square_button: **Certificate trust** doesn't support [PTA][ENTRA-7] or [(PHS)][ENTRA-6]. Active Directory must be federated with Microsoft Entra ID using AD FS. Additionally, you must configure your AD FS farm to support Microsoft Entra registered devices |
| :black_square_button: | On-premises | AD FS | n/a | | On-premises | AD FS | n/a |
### Device registration ### Device registration
All devices included in the Windows Hello for Business deployment must go through a process called *device registration*. Device registration enables devices to authenticate to identity providers: All devices included in the Windows Hello for Business deployment must go through a process called *device registration*. Device registration enables devices to authenticate to identity providers:
| | Deployment model | Device registration IdP | | Deployment model | Device registration IdP |
|-|-|-|-| |-|-|
|:black_square_button:| Cloud-only |Microsoft Entra ID | | Cloud-only |Microsoft Entra ID |
|:black_square_button:|Hybrid|Microsoft Entra ID| |Hybrid|Microsoft Entra ID|
|:black_square_button:|On-premises | AD FS | |On-premises | AD FS |
For *Microsoft Entra hybrid joined* devices, review the guidance on the [Plan your Microsoft Entra hybrid join implementation][ENTRA-5] page. For *Microsoft Entra hybrid joined* devices, review the guidance on the [Plan your Microsoft Entra hybrid join implementation][ENTRA-5] page.
@ -121,11 +121,11 @@ For *Microsoft Entra hybrid joined* devices, review the guidance on the [Plan yo
The built-in Windows Hello for Business provisioning experience creates a device-bound asymmetric key pair as the user's credentials. The private key is protected by the device's security modules. The credential is a *user key*, not a *device key*. The provisioning experience registers the user's public key with the identity provider: The built-in Windows Hello for Business provisioning experience creates a device-bound asymmetric key pair as the user's credentials. The private key is protected by the device's security modules. The credential is a *user key*, not a *device key*. The provisioning experience registers the user's public key with the identity provider:
| | Deployment model | Key registration IdP | | Deployment model | Key registration IdP |
|-|-|-|-| |-|-|
| :black_square_button:| Cloud-only | Microsoft Entra ID | |Cloud-only | Microsoft Entra ID |
| :black_square_button:|Hybrid| Microsoft Entra ID | |Hybrid| Microsoft Entra ID |
| :black_square_button:|On-premises | AD FS | |On-premises | AD FS |
### Directory synchronization ### Directory synchronization
@ -136,11 +136,11 @@ Hybrid and on-premises deployments use directory synchronization, however, each
> Windows Hello for Business is tied between a user and a device. Both the user and device object must be synchronized between Microsoft Entra ID and Active Directory. > Windows Hello for Business is tied between a user and a device. Both the user and device object must be synchronized between Microsoft Entra ID and Active Directory.
- On-premises deployments use directory synchronization to import users from Active Directory to the Azure MFA server, which sends data to the MFA cloud service to perform the verification - On-premises deployments use directory synchronization to import users from Active Directory to the Azure MFA server, which sends data to the MFA cloud service to perform the verification
| | Deployment model | Directory sync options | | Deployment model | Directory sync options |
|-|-|-|-| |-|-|
| :black_square_button:| Cloud-only | n/a | | Cloud-only | n/a |
| :black_square_button:|Hybrid| Microsoft Entra Connect Sync| |Hybrid| Microsoft Entra Connect Sync|
| :black_square_button:|On-premises | Azure MFA server | |On-premises | Azure MFA server |
### Multifactor authentication ### Multifactor authentication
@ -152,14 +152,11 @@ The goal of Windows Hello for Business is to move organizations away from passwo
> [!IMPORTANT] > [!IMPORTANT]
> As of July 1, 2019, Microsoft doesn't offer MFA Server for new deployments. New deployments that require multifactor authentication should use cloud-based Microsoft Entra multifactor authentication. Existing deployment where the MFA Server was activated prior to July 1, 2019 can download the latest version, future updates, and generate activation credentials. See [Getting started with the Azure Multi-Factor Authentication Server][ENTRA-2] for more details. > As of July 1, 2019, Microsoft doesn't offer MFA Server for new deployments. New deployments that require multifactor authentication should use cloud-based Microsoft Entra multifactor authentication. Existing deployment where the MFA Server was activated prior to July 1, 2019 can download the latest version, future updates, and generate activation credentials. See [Getting started with the Azure Multi-Factor Authentication Server][ENTRA-2] for more details.
| | Deployment model | MFA options | | Deployment model | MFA options |
|-|-|-|-| |-|-|-|
| :black_square_button:| Cloud-only | :black_square_button: Microsoft Entra MFA <br> :black_square_button: Third-party MFA via Microsoft Entra ID custom controls or federation| | Cloud-only | :black_square_button: Microsoft Entra MFA <br> :black_square_button: Third-party MFA via Microsoft Entra ID custom controls or federation|
| :black_square_button:|Hybrid| :black_square_button:Microsoft Entra MFA <br> :black_square_button: Third-party MFA via Microsoft Entra ID custom controls or federation| |Hybrid| :black_square_button: Microsoft Entra MFA <br> :black_square_button: Third-party MFA via Microsoft Entra ID custom controls or federation <br><br> For more information how to configure Microsoft Entra multifactor authentication, see [Configure Microsoft Entra multifactor authentication settings][ENTRA-4].|
| :black_square_button:|On-premises | AD FS MFA adapter | |On-premises | AD FS MFA adapter <br><br> For more information how to configure AD FS to provide multifactor authentication, see [Configure Azure MFA as authentication provider with AD FS][SER-1]. |
For more information how to configure Microsoft Entra multifactor authentication, see [Configure Microsoft Entra multifactor authentication settings][ENTRA-4].\
For more information how to configure AD FS to provide multifactor authentication, see [Configure Azure MFA as authentication provider with AD FS][SER-1].
#### MFA and federated authentication #### MFA and federated authentication
@ -188,9 +185,9 @@ Windows Hello for Business provides organizations with a rich set of granular po
| | Deployment model | Device configuration options | | | Deployment model | Device configuration options |
|-|-|-|-| |-|-|-|-|
| :black_square_button:| Cloud-only | CSP (MDM) or local GPO | | :black_square_button:| Cloud-only | CSP (MDM) <br> GPO (local) |
| :black_square_button:|Hybrid| CSP (MDM) or Active Directory GPOs | | :black_square_button:|Hybrid| CSP (MDM) <br> GPO (Active Directory or local) |
| :black_square_button:|On-premises | Active Directory GPOs | | :black_square_button:|On-premises | GPO (Active Directory or local)|
## Public Key Infrastructure (PKI) ## Public Key Infrastructure (PKI)