Merge branch 'main' into release-win11-22h2
@ -531,6 +531,18 @@ Additional lists:
|
|||||||
<!--EndSKU-->
|
<!--EndSKU-->
|
||||||
<!--EndCSP-->
|
<!--EndCSP-->
|
||||||
|
|
||||||
|
<!--StartCSP-->
|
||||||
|
[Local Administrator Password Solution CSP](laps-csp.md)
|
||||||
|
|
||||||
|
<!--StartSKU-->
|
||||||
|
|
||||||
|
|Home|Pro|Business|Enterprise|Education|
|
||||||
|
|--- |--- |--- |--- |--- |
|
||||||
|
|Yes|Yes|Yes|Yes|Yes|
|
||||||
|
|
||||||
|
<!--EndSKU-->
|
||||||
|
<!--EndCSP-->
|
||||||
|
|
||||||
<!--StartCSP-->
|
<!--StartCSP-->
|
||||||
[MultiSIM CSP](multisim-csp.md)
|
[MultiSIM CSP](multisim-csp.md)
|
||||||
|
|
||||||
|
760
windows/client-management/mdm/laps-csp.md
Normal file
@ -0,0 +1,760 @@
|
|||||||
|
---
|
||||||
|
title: Local Administrator Password Solution CSP
|
||||||
|
description: Learn how the Local Administrator Password Solution configuration service provider (CSP) is used by the enterprise to manage backup of local administrator account passwords.
|
||||||
|
ms.author: jsimmons
|
||||||
|
ms.topic: article
|
||||||
|
ms.prod: w11
|
||||||
|
ms.technology: windows
|
||||||
|
author: jsimmons
|
||||||
|
ms.localizationpriority: medium
|
||||||
|
ms.date: 07/04/2022
|
||||||
|
ms.reviewer: jsimmons
|
||||||
|
manager: jsimmons
|
||||||
|
---
|
||||||
|
|
||||||
|
# Local Administrator Password Solution CSP
|
||||||
|
|
||||||
|
The Local Administrator Password Solution (LAPS) configuration service provider (CSP) is used by the enterprise to manage back up of local administrator account passwords. This CSP was added in Windows 11 as of version 25145.
|
||||||
|
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> Windows LAPS is currently only available in Windows Insider builds as of 25145 and later. Support for the Windows LAPS Azure AD scenario is currently limited to a small group of Windows Insiders.
|
||||||
|
|
||||||
|
The following example shows the LAPS CSP in tree format.
|
||||||
|
|
||||||
|
```xml
|
||||||
|
./Device/Vendor/MSFT
|
||||||
|
LAPS
|
||||||
|
----Policies
|
||||||
|
--------BackupDirectory
|
||||||
|
--------PasswordAgeDays
|
||||||
|
--------PasswordLength
|
||||||
|
--------PasswordComplexity
|
||||||
|
--------PasswordExpirationProtectionEnabled
|
||||||
|
--------AdministratorAccountName
|
||||||
|
--------ADPasswordEncryptionEnabled
|
||||||
|
--------ADPasswordEncryptionPrincipal
|
||||||
|
--------ADEncryptedPasswordHistorySize
|
||||||
|
--------PostAuthenticationResetDelay
|
||||||
|
--------PostAuthenticationActions
|
||||||
|
----Actions
|
||||||
|
--------ResetPassword
|
||||||
|
--------ResetPasswordStatus
|
||||||
|
```
|
||||||
|
|
||||||
|
The LAPS CSP can be used to manage devices that are either joined to Azure AD or joined to both Azure AD and Active Directory (hybrid-joined). The LAPS CSP manages a mix of AAD-only and AD-only settings. The AD-only settings are only applicable for hybrid-joined devices, and then only when BackupDirectory is set to 2.
|
||||||
|
|
||||||
|
|Setting name|Azure-joined|Hybrid-joined|
|
||||||
|
|---|---|---|
|
||||||
|
|BackupDirectory|Yes|Yes
|
||||||
|
|PasswordAgeDays|Yes|Yes
|
||||||
|
|PasswordLength|Yes|Yes|
|
||||||
|
|PasswordComplexity|Yes|Yes|
|
||||||
|
|PasswordExpirationProtectionEnabled|No|Yes|
|
||||||
|
|AdministratorAccountName|Yes|Yes|
|
||||||
|
|ADPasswordEncryptionEnabled|No|Yes|
|
||||||
|
|ADPasswordEncryptionPrincipal|No|Yes|
|
||||||
|
|ADEncryptedPasswordHistorySize|No|Yes|
|
||||||
|
|PostAuthenticationResetDelay|Yes|Yes|
|
||||||
|
|PostAuthenticationActions|Yes|Yes|
|
||||||
|
|ResetPassword|Yes|Yes|
|
||||||
|
|ResetPasswordStatus|Yes|Yes|
|
||||||
|
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> Windows supports a LAPS Group Policy Object that is entirely separate from the LAPS CSP. Many of the various settings are common across both the LAPS GPO and CSP (GPO does not support any of the Action-related settings). As long as at least one LAPS setting is configured via CSP, any GPO-configured settings will be ignored. Also see the TBD reference on LAPS policy configuration.
|
||||||
|
|
||||||
|
## ./Device/Vendor/MSFT/LAPS
|
||||||
|
|
||||||
|
Defines the root node for the LAPS CSP.
|
||||||
|
|
||||||
|
<!--Policy-->
|
||||||
|
### Policies
|
||||||
|
|
||||||
|
Defines the interior parent node for all configuration-related settings in the LAPS CSP.
|
||||||
|
<!--/Policy-->
|
||||||
|
|
||||||
|
<!--Policy-->
|
||||||
|
### BackupDirectory
|
||||||
|
<!--Description-->
|
||||||
|
Allows the administrator to configure which directory the local administrator account password is backed up to.
|
||||||
|
<!--/Description-->
|
||||||
|
<!--SupportedSKUs-->
|
||||||
|
|Edition|Windows 10|Windows 11|
|
||||||
|
|--- |--- |--- |
|
||||||
|
|Home|No|Yes|
|
||||||
|
|Pro|No|Yes|
|
||||||
|
|Business|No|Yes|
|
||||||
|
|Enterprise|No|Yes|
|
||||||
|
|Education|No|Yes|
|
||||||
|
<!--/SupportedSKUs-->
|
||||||
|
|
||||||
|
Data type is integer. Supported operations are Add, Get, Replace, and Delete.
|
||||||
|
|
||||||
|
<!--SupportedValues-->
|
||||||
|
The allowable settings are:
|
||||||
|
|
||||||
|
|Value|Description of setting|
|
||||||
|
|--- |--- |
|
||||||
|
|0|Disabled (password won't be backed up)|
|
||||||
|
|1|Back up the password to Azure AD only|
|
||||||
|
|2|Back up the password to Active Directory only|
|
||||||
|
|
||||||
|
If not specified, this setting will default to 0 (disabled).
|
||||||
|
<!--/SupportedValues-->
|
||||||
|
<!--/Policy-->
|
||||||
|
|
||||||
|
<!--Policy-->
|
||||||
|
### PasswordAgeDays
|
||||||
|
<!--Description-->
|
||||||
|
Use this policy to configure the maximum password age of the managed local administrator account.
|
||||||
|
<!--/Description-->
|
||||||
|
|
||||||
|
<!--SupportedSKUs-->
|
||||||
|
|Edition|Windows 10|Windows 11|
|
||||||
|
|--- |--- |--- |
|
||||||
|
|Home|No|Yes|
|
||||||
|
|Pro|No|Yes|
|
||||||
|
|Business|No|Yes|
|
||||||
|
|Enterprise|No|Yes|
|
||||||
|
|Education|No|Yes|
|
||||||
|
<!--/SupportedSKUs-->
|
||||||
|
|
||||||
|
<!--SupportedValues-->
|
||||||
|
If not specified, this setting will default to 30 days
|
||||||
|
|
||||||
|
This setting has a minimum allowed value of 1 day when backing the password to on-premises Active Directory, and 7 days when backing the password Azure AD.
|
||||||
|
|
||||||
|
This setting has a maximum allowed value of 365 days.
|
||||||
|
<!--/SupportedValues-->
|
||||||
|
|
||||||
|
Data type is integer.
|
||||||
|
|
||||||
|
Supported operations are Add, Get, Replace, and Delete.
|
||||||
|
<!--/Policy-->
|
||||||
|
|
||||||
|
<!--Policy-->
|
||||||
|
### PasswordComplexity
|
||||||
|
<!--Description-->
|
||||||
|
Use this setting to configure password complexity of the managed local administrator account.
|
||||||
|
<!--/Description-->
|
||||||
|
|
||||||
|
<!--SupportedSKUs-->
|
||||||
|
|Edition|Windows 10|Windows 11|
|
||||||
|
|--- |--- |--- |
|
||||||
|
|Home|No|Yes|
|
||||||
|
|Pro|No|Yes|
|
||||||
|
|Business|No|Yes|
|
||||||
|
|Enterprise|No|Yes|
|
||||||
|
|Education|No|Yes|
|
||||||
|
<!--/SupportedSKUs-->
|
||||||
|
|
||||||
|
<!--SupportedValues-->
|
||||||
|
The allowable settings are:
|
||||||
|
|
||||||
|
|Value|Description of setting|
|
||||||
|
|--- |--- |
|
||||||
|
|1|Large letters|
|
||||||
|
|2|Large letters + small letters|
|
||||||
|
|3|Large letters + small letters + numbers|
|
||||||
|
|4|Large letters + small letters + numbers + special characters|
|
||||||
|
|
||||||
|
|
||||||
|
If not specified, this setting will default to 4.
|
||||||
|
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> Windows supports the lower password complexity settings (1, 2, and 3) only for backwards compatibility with older versions of LAPS. Microsoft recommends that this setting always be configured to 4.
|
||||||
|
<!--/SupportedValues-->
|
||||||
|
|
||||||
|
Data type is integer.
|
||||||
|
|
||||||
|
Supported operations are Add, Get, Replace, and Delete.
|
||||||
|
<!--/Policy-->
|
||||||
|
|
||||||
|
<!--Policy-->
|
||||||
|
### PasswordLength
|
||||||
|
<!--Description-->
|
||||||
|
Use this setting to configure the length of the password of the managed local administrator account.
|
||||||
|
<!--/Description-->
|
||||||
|
|
||||||
|
<!--SupportedSKUs-->
|
||||||
|
|Edition|Windows 10|Windows 11|
|
||||||
|
|--- |--- |--- |
|
||||||
|
|Home|No|Yes|
|
||||||
|
|Pro|No|Yes|
|
||||||
|
|Business|No|Yes|
|
||||||
|
|Enterprise|No|Yes|
|
||||||
|
|Education|No|Yes|
|
||||||
|
<!--/SupportedSKUs-->
|
||||||
|
|
||||||
|
<!--SupportedValues-->
|
||||||
|
If not specified, this setting will default to 14 characters.
|
||||||
|
|
||||||
|
This setting has a minimum allowed value of 8 characters.
|
||||||
|
|
||||||
|
This setting has a maximum allowed value of 64 characters.
|
||||||
|
<!--/SupportedValues-->
|
||||||
|
|
||||||
|
Data type is integer.
|
||||||
|
|
||||||
|
Supported operations are Add, Get, Replace, and Delete.
|
||||||
|
<!--/Policy-->
|
||||||
|
|
||||||
|
<!--Policy-->
|
||||||
|
### AdministratorAccountName
|
||||||
|
<!--Description-->
|
||||||
|
Use this setting to configure the name of the managed local administrator account.
|
||||||
|
<!--/Description-->
|
||||||
|
|
||||||
|
<!--SupportedSKUs-->
|
||||||
|
|Edition|Windows 10|Windows 11|
|
||||||
|
|--- |--- |--- |
|
||||||
|
|Home|No|Yes|
|
||||||
|
|Pro|No|Yes|
|
||||||
|
|Business|No|Yes|
|
||||||
|
|Enterprise|No|Yes|
|
||||||
|
|Education|No|Yes|
|
||||||
|
<!--/SupportedSKUs-->
|
||||||
|
|
||||||
|
<!--SupportedValues-->
|
||||||
|
If not specified, the default built-in local administrator account will be located by well-known SID (even if renamed).
|
||||||
|
|
||||||
|
If specified, the specified account's password will be managed.
|
||||||
|
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> If a custom account name is specified in this setting, the specified account must be created via other means. Specifying a name in this setting will not cause the account to be created.
|
||||||
|
<!--/SupportedValues-->
|
||||||
|
|
||||||
|
Data type is string.
|
||||||
|
|
||||||
|
Supported operations are Add, Get, Replace, and Delete.
|
||||||
|
<!--/Policy-->
|
||||||
|
|
||||||
|
<!--Policy-->
|
||||||
|
### PasswordExpirationProtectionEnabled
|
||||||
|
<!--Description-->
|
||||||
|
Use this setting to configure additional enforcement of maximum password age for the managed local administrator account.
|
||||||
|
<!--/Description-->
|
||||||
|
|
||||||
|
<!--SupportedSKUs-->
|
||||||
|
|Edition|Windows 10|Windows 11|
|
||||||
|
|--- |--- |--- |
|
||||||
|
|Home|No|Yes|
|
||||||
|
|Pro|No|Yes|
|
||||||
|
|Business|No|Yes|
|
||||||
|
|Enterprise|No|Yes|
|
||||||
|
|Education|No|Yes|
|
||||||
|
<!--/SupportedSKUs-->
|
||||||
|
|
||||||
|
<!--SupportedValues-->
|
||||||
|
When this setting is set to True, planned password expiration that would result in a password age greater than what is specified by the "PasswordAgeDays" policy is NOT allowed. When such expiration is detected, the password is changed immediately, and the new password expiration date is set according to policy.
|
||||||
|
|
||||||
|
If not specified, this setting defaults to True.
|
||||||
|
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> This setting is ignored unless BackupDirectory is configured to back up the password to Active Directory.
|
||||||
|
<!--/SupportedValues-->
|
||||||
|
|
||||||
|
Data type is boolean.
|
||||||
|
|
||||||
|
Supported operations are Add, Get, Replace, and Delete.
|
||||||
|
<!--/Policy-->
|
||||||
|
|
||||||
|
<!--Policy-->
|
||||||
|
### ADPasswordEncryptionEnabled
|
||||||
|
<!--Description-->
|
||||||
|
Use this setting to configure whether the password is encrypted before being stored in Active Directory.
|
||||||
|
<!--/Description-->
|
||||||
|
|
||||||
|
<!--SupportedSKUs-->
|
||||||
|
|Edition|Windows 10|Windows 11|
|
||||||
|
|--- |--- |--- |
|
||||||
|
|Home|No|Yes|
|
||||||
|
|Pro|No|Yes|
|
||||||
|
|Business|No|Yes|
|
||||||
|
|Enterprise|No|Yes|
|
||||||
|
|Education|No|Yes|
|
||||||
|
<!--/SupportedSKUs-->
|
||||||
|
|
||||||
|
<!--SupportedValues-->
|
||||||
|
This setting is ignored if the password is currently being stored in Azure.
|
||||||
|
|
||||||
|
If this setting is set to True, and the Active Directory domain meets the 2016 DFL prerequisite, the password is encrypted before being stored in Active Directory.
|
||||||
|
|
||||||
|
If this setting is missing or set to False, or the Active Directory domain doesn't meet the DFL prerequisite, the password is stored as clear-text in Active Directory.
|
||||||
|
|
||||||
|
If not specified, this setting defaults to False.
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> This setting is ignored unless BackupDirectory is configured to back up the password to Active Directory, AND the the Active Directory domain is at Windows Server 2016 Domain Functional Level or higher.
|
||||||
|
<!--/SupportedValues-->
|
||||||
|
|
||||||
|
Data type is boolean.
|
||||||
|
|
||||||
|
Supported operations are Add, Get, Replace, and Delete.
|
||||||
|
<!--/Policy-->
|
||||||
|
|
||||||
|
<!--Policy-->
|
||||||
|
### ADPasswordEncryptionPrincipal
|
||||||
|
<!--Description-->
|
||||||
|
Use this setting to configure the name or SID of a user or group that can decrypt the password stored in Active Directory.
|
||||||
|
<!--/Description-->
|
||||||
|
|
||||||
|
<!--SupportedSKUs-->
|
||||||
|
|Edition|Windows 10|Windows 11|
|
||||||
|
|--- |--- |--- |
|
||||||
|
|Home|No|Yes|
|
||||||
|
|Pro|No|Yes|
|
||||||
|
|Business|No|Yes|
|
||||||
|
|Enterprise|No|Yes|
|
||||||
|
|Education|No|Yes|
|
||||||
|
<!--/SupportedSKUs-->
|
||||||
|
|
||||||
|
<!--SupportedValues-->
|
||||||
|
This setting is ignored if the password is currently being stored in Azure.
|
||||||
|
|
||||||
|
If not specified, the password can only be decrypted by the Domain Admins group in the device's domain.
|
||||||
|
|
||||||
|
If specified, the specified user or group will be able to decrypt the password stored in Active Directory.
|
||||||
|
|
||||||
|
If the specified user or group account is invalid the device will fall back to using the Domain Admins group in the device's domain.
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> The string stored in this setting must be either a SID in string form or the fully qualified name of a user or group. Valid examples include:
|
||||||
|
>
|
||||||
|
> "S-1-5-21-2127521184-1604012920-1887927527-35197"
|
||||||
|
>
|
||||||
|
> "contoso\LAPSAdmins"
|
||||||
|
>
|
||||||
|
> "lapsadmins@contoso.com"
|
||||||
|
>
|
||||||
|
> The principal identified (either by SID or user\group name) must exist and be resolvable by the device.
|
||||||
|
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> This setting is ignored unless ADPasswordEncryptionEnabled is configured to True and all other prerequisites are met.
|
||||||
|
<!--/SupportedValues-->
|
||||||
|
|
||||||
|
Data type is string.
|
||||||
|
|
||||||
|
Supported operations are Add, Get, Replace, and Delete.
|
||||||
|
<!--/Policy-->
|
||||||
|
|
||||||
|
<!--Policy-->
|
||||||
|
### ADEncryptedPasswordHistorySize
|
||||||
|
<!--Description-->
|
||||||
|
Use this setting to configure how many previous encrypted passwords will be remembered in Active Directory.
|
||||||
|
<!--/Description-->
|
||||||
|
|
||||||
|
<!--SupportedSKUs-->
|
||||||
|
|Edition|Windows 10|Windows 11|
|
||||||
|
|--- |--- |--- |
|
||||||
|
|Home|No|Yes|
|
||||||
|
|Pro|No|Yes|
|
||||||
|
|Business|No|Yes|
|
||||||
|
|Enterprise|No|Yes|
|
||||||
|
|Education|No|Yes|
|
||||||
|
<!--/SupportedSKUs-->
|
||||||
|
|
||||||
|
<!--SupportedValues-->
|
||||||
|
If not specified, this setting will default to 0 passwords (disabled).
|
||||||
|
|
||||||
|
This setting has a minimum allowed value of 0 passwords.
|
||||||
|
|
||||||
|
This setting has a maximum allowed value of 12 passwords.
|
||||||
|
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> This setting is ignored unless ADPasswordEncryptionEnabled is configured to True and all other prerequisites are met.
|
||||||
|
<!--/SupportedValues-->
|
||||||
|
|
||||||
|
Data type is integer.
|
||||||
|
|
||||||
|
Supported operations are Add, Get, Replace, and Delete.
|
||||||
|
<!--/Policy-->
|
||||||
|
|
||||||
|
<!--Policy-->
|
||||||
|
### PostAuthenticationResetDelay
|
||||||
|
<!--Description-->
|
||||||
|
Use this setting to specify the amount of time (in hours) to wait after an authentication before executing the specified post-authentication actions (see the PostAuthenticationActions setting below).
|
||||||
|
<!--/Description-->
|
||||||
|
|
||||||
|
<!--SupportedSKUs-->
|
||||||
|
|Edition|Windows 10|Windows 11|
|
||||||
|
|--- |--- |--- |
|
||||||
|
|Home|No|Yes|
|
||||||
|
|Pro|No|Yes|
|
||||||
|
|Business|No|Yes|
|
||||||
|
|Enterprise|No|Yes|
|
||||||
|
|Education|No|Yes|
|
||||||
|
<!--/SupportedSKUs-->
|
||||||
|
|
||||||
|
<!--SupportedValues-->
|
||||||
|
If not specified, this setting will default to 24 hours.
|
||||||
|
|
||||||
|
This setting has a minimum allowed value of 0 hours (this disables all post-authentication actions).
|
||||||
|
|
||||||
|
This setting has a maximum allowed value of 24 hours.
|
||||||
|
<!--/SupportedValues-->
|
||||||
|
|
||||||
|
Data type is integer.
|
||||||
|
|
||||||
|
Supported operations are Add, Get, Replace, and Delete.
|
||||||
|
<!--/Policy-->
|
||||||
|
|
||||||
|
<!--Policy-->
|
||||||
|
### PostAuthenticationActions
|
||||||
|
<!--Description-->
|
||||||
|
Use this setting to specify the actions to take upon expiration of the configured grace period (see the PostAuthenticationResetDelay setting above).
|
||||||
|
<!--/Description-->
|
||||||
|
|
||||||
|
<!--SupportedSKUs-->
|
||||||
|
|Edition|Windows 10|Windows 11|
|
||||||
|
|--- |--- |--- |
|
||||||
|
|Home|No|Yes|
|
||||||
|
|Pro|No|Yes|
|
||||||
|
|Business|No|Yes|
|
||||||
|
|Enterprise|No|Yes|
|
||||||
|
|Education|No|Yes|
|
||||||
|
<!--/SupportedSKUs-->
|
||||||
|
|
||||||
|
<!--SupportedValues-->
|
||||||
|
This setting can have ONE of the following values:
|
||||||
|
|
||||||
|
|Value|Name|Action(s) taken upon expiry of the grace period|
|
||||||
|
|--- |--- |--- |
|
||||||
|
|1|Reset password|The managed account password will be reset|
|
||||||
|
|3|Reset password and log off|The managed account password will be reset and any interactive logon sessions using the managed account will be terminated|
|
||||||
|
|5|Reset password and reboot|The managed account password will be reset and the managed device will be immediately rebooted.|
|
||||||
|
|
||||||
|
If not specified, this setting will default to 3.
|
||||||
|
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> The allowed post-authentication actions are intended to help limit the amount of time that a LAPS password may be used before being reset. Logging off the managed account - or rebooting the device - are options to help ensure this. Abrupt termination of logon sessions, or rebooting the device, may result in data loss.
|
||||||
|
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> From a security perspective, a malicious user who acquires administrative privileges on a device using a valid LAPS password does have the ultimate ability to prevent or circumvent these mechanisms.
|
||||||
|
<!--/SupportedValues-->
|
||||||
|
|
||||||
|
Data type is integer.
|
||||||
|
|
||||||
|
Supported operations are Add, Get, Replace, and Delete.
|
||||||
|
<!--/Policy-->
|
||||||
|
|
||||||
|
<!--Policy-->
|
||||||
|
## Actions
|
||||||
|
|
||||||
|
Defines the parent interior node for all action-related settings in the LAPS CSP.
|
||||||
|
<!--/Policy-->
|
||||||
|
|
||||||
|
<!--Policy-->
|
||||||
|
### ResetPassword
|
||||||
|
<!--Description-->
|
||||||
|
Use this Execute action to request an immediate reset of the local administrator account password, ignoring the normal constraints such as PasswordLengthDays, etc.
|
||||||
|
<!--/Description-->
|
||||||
|
|
||||||
|
<!--SupportedSKUs-->
|
||||||
|
|Edition|Windows 10|Windows 11|
|
||||||
|
|--- |--- |--- |
|
||||||
|
|Home|No|Yes|
|
||||||
|
|Pro|No|Yes|
|
||||||
|
|Business|No|Yes|
|
||||||
|
|Enterprise|No|Yes|
|
||||||
|
|Education|No|Yes|
|
||||||
|
<!--/SupportedSKUs-->
|
||||||
|
|
||||||
|
<!--SupportedValues-->
|
||||||
|
|
||||||
|
<!--/SupportedValues-->
|
||||||
|
|
||||||
|
Data type is integer.
|
||||||
|
|
||||||
|
Supported operations are Execute.
|
||||||
|
<!--/Policy-->
|
||||||
|
|
||||||
|
<!--Policy-->
|
||||||
|
### ResetPasswordStatus
|
||||||
|
<!--Description-->
|
||||||
|
Use this setting to query the status of the last submitted ResetPassword action.
|
||||||
|
<!--/Description-->
|
||||||
|
|
||||||
|
<!--SupportedSKUs-->
|
||||||
|
|Edition|Windows 10|Windows 11|
|
||||||
|
|--- |--- |--- |
|
||||||
|
|Home|No|Yes|
|
||||||
|
|Pro|No|Yes|
|
||||||
|
|Business|No|Yes|
|
||||||
|
|Enterprise|No|Yes|
|
||||||
|
|Education|No|Yes|
|
||||||
|
<!--/SupportedSKUs-->
|
||||||
|
|
||||||
|
<!--SupportedValues-->
|
||||||
|
The value returned is an HRESULT code.
|
||||||
|
|
||||||
|
S_OK (0x0) - the last submitted ResetPassword action succeeded.
|
||||||
|
|
||||||
|
E_PENDING (0x8000000) - the last submitted ResetPassword action is still executing.
|
||||||
|
|
||||||
|
other - the last submitted ResetPassword action encountered the returned error.
|
||||||
|
<!--/SupportedValues-->
|
||||||
|
|
||||||
|
Data type is integer.
|
||||||
|
|
||||||
|
Supported operations are Get.
|
||||||
|
<!--/Policy-->
|
||||||
|
|
||||||
|
### SyncML examples
|
||||||
|
|
||||||
|
The following examples are provided to show proper format and shouldn't be taken as a recommendation.
|
||||||
|
|
||||||
|
#### Azure-joined device backing password up to Azure AD
|
||||||
|
|
||||||
|
This example is configuring an Azure-joined device to back up its password to Azure Active Directory:
|
||||||
|
|
||||||
|
```xml
|
||||||
|
<SyncMl xmlns="SYNCML:SYNCML1.2">
|
||||||
|
<SyncBody>
|
||||||
|
<Add>
|
||||||
|
<CmdId>1</CmdId>
|
||||||
|
<Item>
|
||||||
|
<Target>
|
||||||
|
<LocURI>./Device/Vendor/MSFT/LAPS/Policies/BackupDirectory</LocURI>
|
||||||
|
</Target>
|
||||||
|
<Meta>
|
||||||
|
<Format xmlns="syncml:metinf">int</Format>
|
||||||
|
<Type>text/plain</Type>
|
||||||
|
</Meta>
|
||||||
|
<Data>1</Data>
|
||||||
|
</Item>
|
||||||
|
</Add>
|
||||||
|
<Add>
|
||||||
|
<CmdId>2</CmdId>
|
||||||
|
<Item>
|
||||||
|
<Target>
|
||||||
|
<LocURI>./Device/Vendor/MSFT/LAPS/Policies/PasswordAgeDays</LocURI>
|
||||||
|
</Target>
|
||||||
|
<Meta>
|
||||||
|
<Format xmlns="syncml:metinf">int</Format>
|
||||||
|
<Type>text/plain</Type>
|
||||||
|
</Meta>
|
||||||
|
<Data>7</Data>
|
||||||
|
</Item>
|
||||||
|
</Add>
|
||||||
|
<Add>
|
||||||
|
<CmdId>3</CmdId>
|
||||||
|
<Item>
|
||||||
|
<Target>
|
||||||
|
<LocURI>./Device/Vendor/MSFT/LAPS/Policies/PasswordComplexity</LocURI>
|
||||||
|
</Target>
|
||||||
|
<Meta>
|
||||||
|
<Format xmlns="syncml:metinf">int</Format>
|
||||||
|
<Type>text/plain</Type>
|
||||||
|
</Meta>
|
||||||
|
<Data>4</Data>
|
||||||
|
</Item>
|
||||||
|
</Add>
|
||||||
|
<Add>
|
||||||
|
<CmdId>4</CmdId>
|
||||||
|
<Item>
|
||||||
|
<Target>
|
||||||
|
<LocURI>./Device/Vendor/MSFT/LAPS/Policies/PasswordLength</LocURI>
|
||||||
|
</Target>
|
||||||
|
<Meta>
|
||||||
|
<Format xmlns="syncml:metinf">int</Format>
|
||||||
|
<Type>text/plain</Type>
|
||||||
|
</Meta>
|
||||||
|
<Data>32</Data>
|
||||||
|
</Item>
|
||||||
|
</Add>
|
||||||
|
<Add>
|
||||||
|
<CmdId>5</CmdId>
|
||||||
|
<Item>
|
||||||
|
<Target>
|
||||||
|
<LocURI>./Device/Vendor/MSFT/LAPS/Policies/AdministratorAccountName</LocURI>
|
||||||
|
</Target>
|
||||||
|
<Meta>
|
||||||
|
<Format xmlns="syncml:metinf">chr</Format>
|
||||||
|
<Type>text/plain</Type>
|
||||||
|
</Meta>
|
||||||
|
<Data>ContosoLocalLapsAdmin</Data>
|
||||||
|
</Item>
|
||||||
|
</Add>
|
||||||
|
<Add>
|
||||||
|
<CmdId>6</CmdId>
|
||||||
|
<Item>
|
||||||
|
<Target>
|
||||||
|
<LocURI>./Device/Vendor/MSFT/LAPS/Policies/PostAuthenticationResetDelay</LocURI>
|
||||||
|
</Target>
|
||||||
|
<Meta>
|
||||||
|
<Format xmlns="syncml:metinf">int</Format>
|
||||||
|
<Type>text/plain</Type>
|
||||||
|
</Meta>
|
||||||
|
<Data>8</Data>
|
||||||
|
</Item>
|
||||||
|
</Add>
|
||||||
|
<Add>
|
||||||
|
<CmdId>7</CmdId>
|
||||||
|
<Item>
|
||||||
|
<Target>
|
||||||
|
<LocURI>./Device/Vendor/MSFT/LAPS/Policies/PostAuthenticationActions</LocURI>
|
||||||
|
</Target>
|
||||||
|
<Meta>
|
||||||
|
<Format xmlns="syncml:metinf">int</Format>
|
||||||
|
<Type>text/plain</Type>
|
||||||
|
</Meta>
|
||||||
|
<Data>3</Data>
|
||||||
|
</Item>
|
||||||
|
</Add><Final/></SyncBody>
|
||||||
|
</SyncMl>
|
||||||
|
```
|
||||||
|
|
||||||
|
#### Hybrid-joined device backing password up to Active Directory
|
||||||
|
|
||||||
|
This example is configuring a hybrid device to back up its password to Active Directory with password encryption enabled:
|
||||||
|
|
||||||
|
```xml
|
||||||
|
<SyncMl xmlns="SYNCML:SYNCML1.2">
|
||||||
|
<SyncBody>
|
||||||
|
<Add>
|
||||||
|
<CmdId>1</CmdId>
|
||||||
|
<Item>
|
||||||
|
<Target>
|
||||||
|
<LocURI>./Device/Vendor/MSFT/LAPS/Policies/BackupDirectory</LocURI>
|
||||||
|
</Target>
|
||||||
|
<Meta>
|
||||||
|
<Format xmlns="syncml:metinf">int</Format>
|
||||||
|
<Type>text/plain</Type>
|
||||||
|
</Meta>
|
||||||
|
<Data>2</Data>
|
||||||
|
</Item>
|
||||||
|
</Add>
|
||||||
|
<Add>
|
||||||
|
<CmdId>2</CmdId>
|
||||||
|
<Item>
|
||||||
|
<Target>
|
||||||
|
<LocURI>./Device/Vendor/MSFT/LAPS/Policies/PasswordAgeDays</LocURI>
|
||||||
|
</Target>
|
||||||
|
<Meta>
|
||||||
|
<Format xmlns="syncml:metinf">int</Format>
|
||||||
|
<Type>text/plain</Type>
|
||||||
|
</Meta>
|
||||||
|
<Data>20</Data>
|
||||||
|
</Item>
|
||||||
|
</Add>
|
||||||
|
<Add>
|
||||||
|
<CmdId>3</CmdId>
|
||||||
|
<Item>
|
||||||
|
<Target>
|
||||||
|
<LocURI>./Device/Vendor/MSFT/LAPS/Policies/PasswordComplexity</LocURI>
|
||||||
|
</Target>
|
||||||
|
<Meta>
|
||||||
|
<Format xmlns="syncml:metinf">int</Format>
|
||||||
|
<Type>text/plain</Type>
|
||||||
|
</Meta>
|
||||||
|
<Data>3</Data>
|
||||||
|
</Item>
|
||||||
|
</Add>
|
||||||
|
<Add>
|
||||||
|
<CmdId>4</CmdId>
|
||||||
|
<Item>
|
||||||
|
<Target>
|
||||||
|
<LocURI>./Device/Vendor/MSFT/LAPS/Policies/PasswordLength</LocURI>
|
||||||
|
</Target>
|
||||||
|
<Meta>
|
||||||
|
<Format xmlns="syncml:metinf">int</Format>
|
||||||
|
<Type>text/plain</Type>
|
||||||
|
</Meta>
|
||||||
|
<Data>14</Data>
|
||||||
|
</Item>
|
||||||
|
</Add>
|
||||||
|
<Add>
|
||||||
|
<CmdId>5</CmdId>
|
||||||
|
<Item>
|
||||||
|
<Target>
|
||||||
|
<LocURI>./Device/Vendor/MSFT/LAPS/Policies/AdministratorAccountName</LocURI>
|
||||||
|
</Target>
|
||||||
|
<Meta>
|
||||||
|
<Format xmlns="syncml:metinf">chr</Format>
|
||||||
|
<Type>text/plain</Type>
|
||||||
|
</Meta>
|
||||||
|
<Data>ContosoLocalLapsAdmin</Data>
|
||||||
|
</Item>
|
||||||
|
</Add>
|
||||||
|
<Add>
|
||||||
|
<CmdId>6</CmdId>
|
||||||
|
<Item>
|
||||||
|
<Target>
|
||||||
|
<LocURI>./Device/Vendor/MSFT/LAPS/Policies/PasswordExpirationProtectionEnabled</LocURI>
|
||||||
|
</Target>
|
||||||
|
<Meta>
|
||||||
|
<Format xmlns="syncml:metinf">bool</Format>
|
||||||
|
<Type>text/plain</Type>
|
||||||
|
</Meta>
|
||||||
|
<Data>True</Data>
|
||||||
|
</Item>
|
||||||
|
</Add>
|
||||||
|
<Add>
|
||||||
|
<CmdId>7</CmdId>
|
||||||
|
<Item>
|
||||||
|
<Target>
|
||||||
|
<LocURI>./Device/Vendor/MSFT/LAPS/Policies/ADPasswordEncryptionEnabled</LocURI>
|
||||||
|
</Target>
|
||||||
|
<Meta>
|
||||||
|
<Format xmlns="syncml:metinf">bool</Format>
|
||||||
|
<Type>text/plain</Type>
|
||||||
|
</Meta>
|
||||||
|
<Data>True</Data>
|
||||||
|
</Item>
|
||||||
|
</Add>
|
||||||
|
<Add>
|
||||||
|
<CmdId>8</CmdId>
|
||||||
|
<Item>
|
||||||
|
<Target>
|
||||||
|
<LocURI>./Device/Vendor/MSFT/LAPS/Policies/ADPasswordEncryptionPrincipal</LocURI>
|
||||||
|
</Target>
|
||||||
|
<Meta>
|
||||||
|
<Format xmlns="syncml:metinf">chr</Format>
|
||||||
|
<Type>text/plain</Type>
|
||||||
|
</Meta>
|
||||||
|
<Data>LAPSAdmins@contoso.com</Data>
|
||||||
|
</Item>
|
||||||
|
</Add>
|
||||||
|
<Add>
|
||||||
|
<CmdId>9</CmdId>
|
||||||
|
<Item>
|
||||||
|
<Target>
|
||||||
|
<LocURI>./Device/Vendor/MSFT/LAPS/Policies/ADEncryptedPasswordHistorySize</LocURI>
|
||||||
|
</Target>
|
||||||
|
<Meta>
|
||||||
|
<Format xmlns="syncml:metinf">int</Format>
|
||||||
|
<Type>text/plain</Type>
|
||||||
|
</Meta>
|
||||||
|
<Data>6</Data>
|
||||||
|
</Item>
|
||||||
|
</Add>
|
||||||
|
<Add>
|
||||||
|
<CmdId>10</CmdId>
|
||||||
|
<Item>
|
||||||
|
<Target>
|
||||||
|
<LocURI>./Device/Vendor/MSFT/LAPS/Policies/PostAuthenticationResetDelay</LocURI>
|
||||||
|
</Target>
|
||||||
|
<Meta>
|
||||||
|
<Format xmlns="syncml:metinf">int</Format>
|
||||||
|
<Type>text/plain</Type>
|
||||||
|
</Meta>
|
||||||
|
<Data>4</Data>
|
||||||
|
</Item>
|
||||||
|
</Add>
|
||||||
|
<Add>
|
||||||
|
<CmdId>11</CmdId>
|
||||||
|
<Item>
|
||||||
|
<Target>
|
||||||
|
<LocURI>./Device/Vendor/MSFT/LAPS/Policies/PostAuthenticationActions</LocURI>
|
||||||
|
</Target>
|
||||||
|
<Meta>
|
||||||
|
<Format xmlns="syncml:metinf">int</Format>
|
||||||
|
<Type>text/plain</Type>
|
||||||
|
</Meta>
|
||||||
|
<Data>5</Data>
|
||||||
|
</Item>
|
||||||
|
</Add><Final/></SyncBody>
|
||||||
|
</SyncMl>
|
||||||
|
```
|
||||||
|
|
||||||
|
## Related articles
|
||||||
|
|
||||||
|
[Configuration service provider reference](configuration-service-provider-reference.md)
|
654
windows/client-management/mdm/laps-ddf-file.md
Normal file
@ -0,0 +1,654 @@
|
|||||||
|
---
|
||||||
|
title: LAPS DDF file
|
||||||
|
description: Learn about the OMA DM device description framework (DDF) for the Local Administrator Password Solution configuration service provider.
|
||||||
|
ms.author: jsimmons
|
||||||
|
ms.topic: article
|
||||||
|
ms.prod: w11
|
||||||
|
ms.technology: windows
|
||||||
|
author: jsimmons
|
||||||
|
ms.localizationpriority: medium
|
||||||
|
ms.date: 07/04/2022
|
||||||
|
ms.reviewer: jsimmons
|
||||||
|
manager: jsimmons
|
||||||
|
---
|
||||||
|
|
||||||
|
# Local Administrator Password Solution DDF file
|
||||||
|
|
||||||
|
This article shows the OMA DM device description framework (DDF) for the Local Administrator Password Solution (LAPS) configuration service provider.
|
||||||
|
|
||||||
|
Looking for the DDF XML files? See [CSP DDF files download](configuration-service-provider-reference.md#csp-ddf-files-download).
|
||||||
|
|
||||||
|
The XML below is the current version for this CSP.
|
||||||
|
|
||||||
|
```xml
|
||||||
|
<?xml version='1.0' encoding='utf-8' standalone='yes'?>
|
||||||
|
<identity
|
||||||
|
xmlns="urn:Microsoft.CompPlat/ManifestSchema.v1.00"
|
||||||
|
xmlns:xsd="http://www.w3.org/2001/XMLSchema"
|
||||||
|
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
||||||
|
owner="Microsoft"
|
||||||
|
namespace="Windows-DeviceManagement-CspDefinition"
|
||||||
|
name="LAPS">
|
||||||
|
<cspDefinition>
|
||||||
|
<MgmtTree>
|
||||||
|
<VerDTD>1.2</VerDTD>
|
||||||
|
<BinaryPath>"%windir%\system32\LapsCSP.dll</BinaryPath>
|
||||||
|
<Diagnostics></Diagnostics>
|
||||||
|
<ComClsid>{298a6f17-03e7-4bd4-971c-544f359527b7}</ComClsid>
|
||||||
|
<Node>
|
||||||
|
<NodeName>LAPS</NodeName>
|
||||||
|
<Path>./Device/Vendor/MSFT</Path>
|
||||||
|
<DFProperties>
|
||||||
|
<AccessType>
|
||||||
|
<Get />
|
||||||
|
</AccessType>
|
||||||
|
<Description>The root node for the LAPS configuration service provider.</Description>
|
||||||
|
<DFFormat>
|
||||||
|
<node />
|
||||||
|
</DFFormat>
|
||||||
|
<Occurrence>
|
||||||
|
<One />
|
||||||
|
</Occurrence>
|
||||||
|
<Scope>
|
||||||
|
<Permanent />
|
||||||
|
</Scope>
|
||||||
|
<DFType>
|
||||||
|
<DDFName></DDFName>
|
||||||
|
</DFType>
|
||||||
|
<Applicability>
|
||||||
|
<OsBuildVersion>99.9.99999</OsBuildVersion>
|
||||||
|
<CspVersion>1.0</CspVersion>
|
||||||
|
</Applicability>
|
||||||
|
<ExposedTo>
|
||||||
|
<Mdm />
|
||||||
|
</ExposedTo>
|
||||||
|
</DFProperties>
|
||||||
|
<Node>
|
||||||
|
<NodeName>Policies</NodeName>
|
||||||
|
<DFProperties>
|
||||||
|
<AccessType>
|
||||||
|
<Get />
|
||||||
|
</AccessType>
|
||||||
|
<Description>Root node for LAPS policies.</Description>
|
||||||
|
<DFFormat>
|
||||||
|
<node />
|
||||||
|
</DFFormat>
|
||||||
|
<Occurrence>
|
||||||
|
<One />
|
||||||
|
</Occurrence>
|
||||||
|
<Scope>
|
||||||
|
<Permanent />
|
||||||
|
</Scope>
|
||||||
|
<DFTitle>Policies</DFTitle>
|
||||||
|
<DFType>
|
||||||
|
<DDFName></DDFName>
|
||||||
|
</DFType>
|
||||||
|
<AtomicRequired />
|
||||||
|
</DFProperties>
|
||||||
|
<Node>
|
||||||
|
<NodeName>BackupDirectory</NodeName>
|
||||||
|
<DFProperties>
|
||||||
|
<AccessType>
|
||||||
|
<Add />
|
||||||
|
<Delete />
|
||||||
|
<Get />
|
||||||
|
<Replace />
|
||||||
|
</AccessType>
|
||||||
|
<DefaultValue>0</DefaultValue>
|
||||||
|
<Description>Use this setting to configure which directory the local admin account password is backed up to.
|
||||||
|
|
||||||
|
The allowable settings are:
|
||||||
|
|
||||||
|
0=Disabled (password will not be backed up)
|
||||||
|
1=Backup the password to Azure AD only
|
||||||
|
2=Backup the password to Active Directory only
|
||||||
|
|
||||||
|
If not specified, this setting will default to 0.</Description>
|
||||||
|
<DFFormat>
|
||||||
|
<int />
|
||||||
|
</DFFormat>
|
||||||
|
<Occurrence>
|
||||||
|
<ZeroOrOne />
|
||||||
|
</Occurrence>
|
||||||
|
<Scope>
|
||||||
|
<Dynamic />
|
||||||
|
</Scope>
|
||||||
|
<DFType>
|
||||||
|
<MIME>text/plain</MIME>
|
||||||
|
</DFType>
|
||||||
|
<AllowedValues ValueType="ENUM">
|
||||||
|
<Enum>
|
||||||
|
<Value>0</Value>
|
||||||
|
<ValueDescription>Disabled (password will not be backed up)</ValueDescription>
|
||||||
|
</Enum>
|
||||||
|
<Enum>
|
||||||
|
<Value>1</Value>
|
||||||
|
<ValueDescription>Backup the password to Azure AD only</ValueDescription>
|
||||||
|
</Enum>
|
||||||
|
<Enum>
|
||||||
|
<Value>2</Value>
|
||||||
|
<ValueDescription>Backup the password to Active Directory only</ValueDescription>
|
||||||
|
</Enum>
|
||||||
|
</AllowedValues>
|
||||||
|
</DFProperties>
|
||||||
|
</Node>
|
||||||
|
<Node>
|
||||||
|
<NodeName>PasswordAgeDays</NodeName>
|
||||||
|
<DFProperties>
|
||||||
|
<AccessType>
|
||||||
|
<Add />
|
||||||
|
<Delete />
|
||||||
|
<Get />
|
||||||
|
<Replace />
|
||||||
|
</AccessType>
|
||||||
|
<DefaultValue>30</DefaultValue>
|
||||||
|
<Description>Use this policy to configure the maximum password age of the managed local administrator account.
|
||||||
|
|
||||||
|
If not specified, this setting will default to 30 days
|
||||||
|
|
||||||
|
This setting has a minimum allowed value of 1 day when backing the password to onpremises Active Directory, and 7 days when backing the password to Azure AD.
|
||||||
|
|
||||||
|
This setting has a maximum allowed value of 365 days.</Description>
|
||||||
|
<DFFormat>
|
||||||
|
<int />
|
||||||
|
</DFFormat>
|
||||||
|
<Occurrence>
|
||||||
|
<ZeroOrOne />
|
||||||
|
</Occurrence>
|
||||||
|
<Scope>
|
||||||
|
<Dynamic />
|
||||||
|
</Scope>
|
||||||
|
<DFType>
|
||||||
|
<MIME>text/plain</MIME>
|
||||||
|
</DFType>
|
||||||
|
<AllowedValues ValueType="Range">
|
||||||
|
<Value>[1-365]</Value>
|
||||||
|
</AllowedValues>
|
||||||
|
<DependencyBehavior>
|
||||||
|
<DependencyGroup FriendlyId="BackupDirectory">
|
||||||
|
<DependencyChangedAllowedValues ValueType="Range">
|
||||||
|
<Value>[7-365]</Value>
|
||||||
|
</DependencyChangedAllowedValues>
|
||||||
|
<Dependency Type="DependsOn">
|
||||||
|
<DependencyUri>Vendor/MSFT/LAPS/Policies/BackupDirectory</DependencyUri>
|
||||||
|
<DependencyAllowedValue ValueType="ENUM">
|
||||||
|
<Enum>
|
||||||
|
<Value>1</Value>
|
||||||
|
<ValueDescription>BackupDirectory configured to Azure AD</ValueDescription>
|
||||||
|
</Enum>
|
||||||
|
</DependencyAllowedValue>
|
||||||
|
</Dependency>
|
||||||
|
</DependencyGroup>
|
||||||
|
</DependencyBehavior>
|
||||||
|
</DFProperties>
|
||||||
|
</Node>
|
||||||
|
<Node>
|
||||||
|
<NodeName>PasswordComplexity</NodeName>
|
||||||
|
<DFProperties>
|
||||||
|
<AccessType>
|
||||||
|
<Add />
|
||||||
|
<Delete />
|
||||||
|
<Get />
|
||||||
|
<Replace />
|
||||||
|
</AccessType>
|
||||||
|
<DefaultValue>4</DefaultValue>
|
||||||
|
<Description>Use this setting to configure password complexity of the managed local administrator account.
|
||||||
|
|
||||||
|
The allowable settings are:
|
||||||
|
|
||||||
|
1=Large letters
|
||||||
|
2=Large letters + small letters
|
||||||
|
3=Large letters + small letters + numbers
|
||||||
|
4=Large letters + small letters + numbers + special characters
|
||||||
|
|
||||||
|
If not specified, this setting will default to 4.</Description>
|
||||||
|
<DFFormat>
|
||||||
|
<int />
|
||||||
|
</DFFormat>
|
||||||
|
<Occurrence>
|
||||||
|
<ZeroOrOne />
|
||||||
|
</Occurrence>
|
||||||
|
<Scope>
|
||||||
|
<Dynamic />
|
||||||
|
</Scope>
|
||||||
|
<DFType>
|
||||||
|
<MIME>text/plain</MIME>
|
||||||
|
</DFType>
|
||||||
|
<AllowedValues ValueType="ENUM">
|
||||||
|
<Enum>
|
||||||
|
<Value>1</Value>
|
||||||
|
<ValueDescription>Large letters</ValueDescription>
|
||||||
|
</Enum>
|
||||||
|
<Enum>
|
||||||
|
<Value>2</Value>
|
||||||
|
<ValueDescription>Large letters + small letters</ValueDescription>
|
||||||
|
</Enum>
|
||||||
|
<Enum>
|
||||||
|
<Value>3</Value>
|
||||||
|
<ValueDescription>Large letters + small letters + numbers</ValueDescription>
|
||||||
|
</Enum>
|
||||||
|
<Enum>
|
||||||
|
<Value>4</Value>
|
||||||
|
<ValueDescription>Large letters + small letters + numbers + special characters</ValueDescription>
|
||||||
|
</Enum>
|
||||||
|
</AllowedValues>
|
||||||
|
</DFProperties>
|
||||||
|
</Node>
|
||||||
|
<Node>
|
||||||
|
<NodeName>PasswordLength</NodeName>
|
||||||
|
<DFProperties>
|
||||||
|
<AccessType>
|
||||||
|
<Add />
|
||||||
|
<Delete />
|
||||||
|
<Get />
|
||||||
|
<Replace />
|
||||||
|
</AccessType>
|
||||||
|
<DefaultValue>14</DefaultValue>
|
||||||
|
<Description>Use this setting to configure the length of the password of the managed local administrator account.
|
||||||
|
|
||||||
|
If not specified, this setting will default to 14 characters.
|
||||||
|
|
||||||
|
This setting has a minimum allowed value of 8 characters.
|
||||||
|
|
||||||
|
This setting has a maximum allowed value of 64 characters.</Description>
|
||||||
|
<DFFormat>
|
||||||
|
<int />
|
||||||
|
</DFFormat>
|
||||||
|
<Occurrence>
|
||||||
|
<ZeroOrOne />
|
||||||
|
</Occurrence>
|
||||||
|
<Scope>
|
||||||
|
<Dynamic />
|
||||||
|
</Scope>
|
||||||
|
<DFType>
|
||||||
|
<MIME>text/plain</MIME>
|
||||||
|
</DFType>
|
||||||
|
<AllowedValues ValueType="Range">
|
||||||
|
<Value>[8-64]</Value>
|
||||||
|
</AllowedValues>
|
||||||
|
</DFProperties>
|
||||||
|
</Node>
|
||||||
|
<Node>
|
||||||
|
<NodeName>AdministratorAccountName</NodeName>
|
||||||
|
<DFProperties>
|
||||||
|
<AccessType>
|
||||||
|
<Add />
|
||||||
|
<Delete />
|
||||||
|
<Get />
|
||||||
|
<Replace />
|
||||||
|
</AccessType>
|
||||||
|
<Description>Use this setting to configure the name of the managed local administrator account.
|
||||||
|
|
||||||
|
If not specified, the default built-in local administrator account will be located by well-known SID (even if renamed).
|
||||||
|
|
||||||
|
If specified, the specified account's password will be managed.
|
||||||
|
|
||||||
|
Note: if a custom managed local administrator account name is specified in this setting, that account must be created via other means. Specifying a name in this setting will not cause the account to be created.</Description>
|
||||||
|
<DFFormat>
|
||||||
|
<chr />
|
||||||
|
</DFFormat>
|
||||||
|
<Occurrence>
|
||||||
|
<ZeroOrOne />
|
||||||
|
</Occurrence>
|
||||||
|
<Scope>
|
||||||
|
<Dynamic />
|
||||||
|
</Scope>
|
||||||
|
<DFType>
|
||||||
|
<MIME>text/plain</MIME>
|
||||||
|
</DFType>
|
||||||
|
</DFProperties>
|
||||||
|
</Node>
|
||||||
|
<Node>
|
||||||
|
<NodeName>PasswordExpirationProtectionEnabled</NodeName>
|
||||||
|
<DFProperties>
|
||||||
|
<AccessType>
|
||||||
|
<Add />
|
||||||
|
<Delete />
|
||||||
|
<Get />
|
||||||
|
<Replace />
|
||||||
|
</AccessType>
|
||||||
|
<DefaultValue>True</DefaultValue>
|
||||||
|
<Description>Use this setting to configure additional enforcement of maximum password age for the managed local administrator account.
|
||||||
|
|
||||||
|
When this setting is enabled, planned password expiration that would result in a password age greater than that dictated by "PasswordAgeDays" policy is NOT allowed. When such expiration is detected, the password is changed immediately and the new password expiration date is set according to policy.
|
||||||
|
|
||||||
|
If not specified, this setting defaults to True.</Description>
|
||||||
|
<DFFormat>
|
||||||
|
<bool />
|
||||||
|
</DFFormat>
|
||||||
|
<Occurrence>
|
||||||
|
<ZeroOrOne />
|
||||||
|
</Occurrence>
|
||||||
|
<Scope>
|
||||||
|
<Dynamic />
|
||||||
|
</Scope>
|
||||||
|
<DFType>
|
||||||
|
<MIME>text/plain</MIME>
|
||||||
|
</DFType>
|
||||||
|
<AllowedValues ValueType="ENUM">
|
||||||
|
<Enum>
|
||||||
|
<Value>false</Value>
|
||||||
|
<ValueDescription>Allow configured password expiriration timestamp to exceed maximum password age</ValueDescription>
|
||||||
|
</Enum>
|
||||||
|
<Enum>
|
||||||
|
<Value>true</Value>
|
||||||
|
<ValueDescription>Do not allow configured password expiriration timestamp to exceed maximum password age</ValueDescription>
|
||||||
|
</Enum>
|
||||||
|
</AllowedValues>
|
||||||
|
<DependencyBehavior>
|
||||||
|
<DependencyGroup FriendlyId="BackupDirectory">
|
||||||
|
<Dependency Type="DependsOn">
|
||||||
|
<DependencyUri>Vendor/MSFT/LAPS/Policies/BackupDirectory</DependencyUri>
|
||||||
|
<DependencyAllowedValue ValueType="ENUM">
|
||||||
|
<Enum>
|
||||||
|
<Value>2</Value>
|
||||||
|
<ValueDescription>BackupDirectory configured to Active Directory</ValueDescription>
|
||||||
|
</Enum>
|
||||||
|
</DependencyAllowedValue>
|
||||||
|
</Dependency>
|
||||||
|
</DependencyGroup>
|
||||||
|
</DependencyBehavior>
|
||||||
|
</DFProperties>
|
||||||
|
</Node>
|
||||||
|
<Node>
|
||||||
|
<NodeName>ADPasswordEncryptionEnabled</NodeName>
|
||||||
|
<DFProperties>
|
||||||
|
<AccessType>
|
||||||
|
<Add />
|
||||||
|
<Delete />
|
||||||
|
<Get />
|
||||||
|
<Replace />
|
||||||
|
</AccessType>
|
||||||
|
<DefaultValue>False</DefaultValue>
|
||||||
|
<Description>Use this setting to configure whether the password is encrypted before being stored in Active Directory.
|
||||||
|
|
||||||
|
This setting is ignored if the password is currently being stored in Azure.
|
||||||
|
|
||||||
|
This setting is only honored when the Active Directory domain is at Windows Server 2016 Domain Functional Level or higher.
|
||||||
|
|
||||||
|
If this setting is enabled, and the Active Directory domain meets the DFL prerequisite, the password will be encrypted before before being stored in Active Directory.
|
||||||
|
|
||||||
|
If this setting is disabled, or the Active Directory domain does not meet the DFL prerequisite, the password will be stored as clear-text in Active Directory.
|
||||||
|
|
||||||
|
If not specified, this setting defaults to False.</Description>
|
||||||
|
<DFFormat>
|
||||||
|
<bool />
|
||||||
|
</DFFormat>
|
||||||
|
<Occurrence>
|
||||||
|
<ZeroOrOne />
|
||||||
|
</Occurrence>
|
||||||
|
<Scope>
|
||||||
|
<Dynamic />
|
||||||
|
</Scope>
|
||||||
|
<DFType>
|
||||||
|
<MIME>text/plain</MIME>
|
||||||
|
</DFType>
|
||||||
|
<AllowedValues ValueType="ENUM">
|
||||||
|
<Enum>
|
||||||
|
<Value>false</Value>
|
||||||
|
<ValueDescription>Store the password in clear-text form in Active Directory</ValueDescription>
|
||||||
|
</Enum>
|
||||||
|
<Enum>
|
||||||
|
<Value>true</Value>
|
||||||
|
<ValueDescription>Store the password in encrypted form in Active Directory</ValueDescription>
|
||||||
|
</Enum>
|
||||||
|
</AllowedValues>
|
||||||
|
<DependencyBehavior>
|
||||||
|
<DependencyGroup FriendlyId="BackupDirectory">
|
||||||
|
<Dependency Type="DependsOn">
|
||||||
|
<DependencyUri>Vendor/MSFT/LAPS/Policies/BackupDirectory</DependencyUri>
|
||||||
|
<DependencyAllowedValue ValueType="ENUM">
|
||||||
|
<Enum>
|
||||||
|
<Value>2</Value>
|
||||||
|
<ValueDescription>BackupDirectory configured to Active Directory</ValueDescription>
|
||||||
|
</Enum>
|
||||||
|
</DependencyAllowedValue>
|
||||||
|
</Dependency>
|
||||||
|
</DependencyGroup>
|
||||||
|
</DependencyBehavior>
|
||||||
|
</DFProperties>
|
||||||
|
</Node>
|
||||||
|
<Node>
|
||||||
|
<NodeName>ADPasswordEncryptionPrincipal</NodeName>
|
||||||
|
<DFProperties>
|
||||||
|
<AccessType>
|
||||||
|
<Add />
|
||||||
|
<Delete />
|
||||||
|
<Get />
|
||||||
|
<Replace />
|
||||||
|
</AccessType>
|
||||||
|
<Description>Use this setting to configure the name or SID of a user or group that can decrypt the password stored in Active Directory.
|
||||||
|
|
||||||
|
This setting is ignored if the password is currently being stored in Azure.
|
||||||
|
|
||||||
|
If not specified, the password will be decryptable by the Domain Admins group in the device's domain.
|
||||||
|
|
||||||
|
If specified, the specified user or group will be able to decrypt the password stored in Active Directory.
|
||||||
|
|
||||||
|
If the specified user or group account is invalid the device will fallback to using the Domain Admins group in the device's domain.</Description>
|
||||||
|
<DFFormat>
|
||||||
|
<chr />
|
||||||
|
</DFFormat>
|
||||||
|
<Occurrence>
|
||||||
|
<ZeroOrOne />
|
||||||
|
</Occurrence>
|
||||||
|
<Scope>
|
||||||
|
<Dynamic />
|
||||||
|
</Scope>
|
||||||
|
<DFType>
|
||||||
|
<MIME>text/plain</MIME>
|
||||||
|
</DFType>
|
||||||
|
<DependencyBehavior>
|
||||||
|
<DependencyGroup FriendlyId="BackupDirectory">
|
||||||
|
<Dependency Type="DependsOn">
|
||||||
|
<DependencyUri>Vendor/MSFT/LAPS/Policies/BackupDirectory</DependencyUri>
|
||||||
|
<DependencyAllowedValue ValueType="ENUM">
|
||||||
|
<Enum>
|
||||||
|
<Value>2</Value>
|
||||||
|
<ValueDescription>BackupDirectory configured to Active Directory</ValueDescription>
|
||||||
|
</Enum>
|
||||||
|
</DependencyAllowedValue>
|
||||||
|
</Dependency>
|
||||||
|
</DependencyGroup>
|
||||||
|
</DependencyBehavior>
|
||||||
|
</DFProperties>
|
||||||
|
</Node>
|
||||||
|
<Node>
|
||||||
|
<NodeName>ADEncryptedPasswordHistorySize</NodeName>
|
||||||
|
<DFProperties>
|
||||||
|
<AccessType>
|
||||||
|
<Add />
|
||||||
|
<Delete />
|
||||||
|
<Get />
|
||||||
|
<Replace />
|
||||||
|
</AccessType>
|
||||||
|
<DefaultValue>0</DefaultValue>
|
||||||
|
<Description>Use this setting to configure how many previous encrypted passwords will be remembered in Active Directory.
|
||||||
|
|
||||||
|
If not specified, this setting will default to 0 passwords (disabled).
|
||||||
|
|
||||||
|
This setting has a minimum allowed value of 0 passwords.
|
||||||
|
|
||||||
|
This setting has a maximum allowed value of 12 passwords.</Description>
|
||||||
|
<DFFormat>
|
||||||
|
<int />
|
||||||
|
</DFFormat>
|
||||||
|
<Occurrence>
|
||||||
|
<ZeroOrOne />
|
||||||
|
</Occurrence>
|
||||||
|
<Scope>
|
||||||
|
<Dynamic />
|
||||||
|
</Scope>
|
||||||
|
<DFType>
|
||||||
|
<MIME>text/plain</MIME>
|
||||||
|
</DFType>
|
||||||
|
<AllowedValues ValueType="Range">
|
||||||
|
<Value>[0-12]</Value>
|
||||||
|
</AllowedValues>
|
||||||
|
<DependencyBehavior>
|
||||||
|
<DependencyGroup FriendlyId="BackupDirectory">
|
||||||
|
<Dependency Type="DependsOn">
|
||||||
|
<DependencyUri>Vendor/MSFT/LAPS/Policies/BackupDirectory</DependencyUri>
|
||||||
|
<DependencyAllowedValue ValueType="ENUM">
|
||||||
|
<Enum>
|
||||||
|
<Value>2</Value>
|
||||||
|
<ValueDescription>BackupDirectory configured to Active Directory</ValueDescription>
|
||||||
|
</Enum>
|
||||||
|
</DependencyAllowedValue>
|
||||||
|
</Dependency>
|
||||||
|
</DependencyGroup>
|
||||||
|
</DependencyBehavior>
|
||||||
|
</DFProperties>
|
||||||
|
</Node>
|
||||||
|
<Node>
|
||||||
|
<NodeName>PostAuthenticationResetDelay</NodeName>
|
||||||
|
<DFProperties>
|
||||||
|
<AccessType>
|
||||||
|
<Add />
|
||||||
|
<Delete />
|
||||||
|
<Get />
|
||||||
|
<Replace />
|
||||||
|
</AccessType>
|
||||||
|
<DefaultValue>24</DefaultValue>
|
||||||
|
<Description>Use this setting to specify the amount of time (in hours) to wait after an authentication before executing the specified post-authentication actions.
|
||||||
|
|
||||||
|
If not specified, this setting will default to 24 hours.
|
||||||
|
|
||||||
|
This setting has a minimum allowed value of 0 hours (this disables all post-authentication actions).
|
||||||
|
|
||||||
|
This setting has a maximum allowed value of 24 hours.</Description>
|
||||||
|
<DFFormat>
|
||||||
|
<int />
|
||||||
|
</DFFormat>
|
||||||
|
<Occurrence>
|
||||||
|
<ZeroOrOne />
|
||||||
|
</Occurrence>
|
||||||
|
<Scope>
|
||||||
|
<Dynamic />
|
||||||
|
</Scope>
|
||||||
|
<DFType>
|
||||||
|
<MIME>text/plain</MIME>
|
||||||
|
</DFType>
|
||||||
|
<AllowedValues ValueType="Range">
|
||||||
|
<Value>[0-24]</Value>
|
||||||
|
</AllowedValues>
|
||||||
|
</DFProperties>
|
||||||
|
</Node>
|
||||||
|
<Node>
|
||||||
|
<NodeName>PostAuthenticationActions</NodeName>
|
||||||
|
<DFProperties>
|
||||||
|
<AccessType>
|
||||||
|
<Add />
|
||||||
|
<Delete />
|
||||||
|
<Get />
|
||||||
|
<Replace />
|
||||||
|
</AccessType>
|
||||||
|
<DefaultValue>3</DefaultValue>
|
||||||
|
<Description>Use this setting to specify the actions to take upon expiration of the configured grace period.
|
||||||
|
|
||||||
|
If not specified, this setting will default to 3 (Reset the password and logoff the managed account).
|
||||||
|
</Description>
|
||||||
|
<DFFormat>
|
||||||
|
<int />
|
||||||
|
</DFFormat>
|
||||||
|
<Occurrence>
|
||||||
|
<ZeroOrOne />
|
||||||
|
</Occurrence>
|
||||||
|
<Scope>
|
||||||
|
<Dynamic />
|
||||||
|
</Scope>
|
||||||
|
<DFType>
|
||||||
|
<MIME>text/plain</MIME>
|
||||||
|
</DFType>
|
||||||
|
<AllowedValues ValueType="ENUM">
|
||||||
|
<Enum>
|
||||||
|
<Value>1</Value>
|
||||||
|
<ValueDescription>Reset password: upon expiry of the grace period, the managed account password will be reset.</ValueDescription>
|
||||||
|
</Enum>
|
||||||
|
<Enum>
|
||||||
|
<Value>3</Value>
|
||||||
|
<ValueDescription>Reset the password and logoff the managed account: upon expiry of the grace period, the managed account password will be reset and any interactive logon sessions using the managed account will terminated.</ValueDescription>
|
||||||
|
</Enum>
|
||||||
|
<Enum>
|
||||||
|
<Value>5</Value>
|
||||||
|
<ValueDescription>Reset the password and reboot: upon expiry of the grace period, the managed account password will be reset and the managed device will be immediately rebooted.</ValueDescription>
|
||||||
|
</Enum>
|
||||||
|
</AllowedValues>
|
||||||
|
</DFProperties>
|
||||||
|
</Node>
|
||||||
|
</Node>
|
||||||
|
<Node>
|
||||||
|
<NodeName>Actions</NodeName>
|
||||||
|
<DFProperties>
|
||||||
|
<AccessType>
|
||||||
|
<Get />
|
||||||
|
</AccessType>
|
||||||
|
<DFFormat>
|
||||||
|
<node />
|
||||||
|
</DFFormat>
|
||||||
|
<Occurrence>
|
||||||
|
<One />
|
||||||
|
</Occurrence>
|
||||||
|
<Scope>
|
||||||
|
<Permanent />
|
||||||
|
</Scope>
|
||||||
|
<DFTitle>Actions</DFTitle>
|
||||||
|
<DFType>
|
||||||
|
<DDFName></DDFName>
|
||||||
|
</DFType>
|
||||||
|
</DFProperties>
|
||||||
|
<Node>
|
||||||
|
<NodeName>ResetPassword</NodeName>
|
||||||
|
<DFProperties>
|
||||||
|
<AccessType>
|
||||||
|
<Exec />
|
||||||
|
</AccessType>
|
||||||
|
<Description>Use this setting to tell the CSP to immediately generate and store a new password for the managed local administrator account.</Description>
|
||||||
|
<DFFormat>
|
||||||
|
<null />
|
||||||
|
</DFFormat>
|
||||||
|
<Occurrence>
|
||||||
|
<One />
|
||||||
|
</Occurrence>
|
||||||
|
<Scope>
|
||||||
|
<Dynamic />
|
||||||
|
</Scope>
|
||||||
|
<DFType>
|
||||||
|
<MIME>text/plain</MIME>
|
||||||
|
</DFType>
|
||||||
|
<AsynchronousTracking ResourceSuccessURI="ResetPasswordStatus" ResourceSuccessValues="0" ResourceInProgressValues="10" ResourceFailureValues="20"/>
|
||||||
|
</DFProperties>
|
||||||
|
</Node>
|
||||||
|
<Node>
|
||||||
|
<NodeName>ResetPasswordStatus</NodeName>
|
||||||
|
<DFProperties>
|
||||||
|
<AccessType>
|
||||||
|
<Get />
|
||||||
|
</AccessType>
|
||||||
|
<DefaultValue>0</DefaultValue>
|
||||||
|
<Description>Use this setting to query the status of the last submitted ResetPassword execute action.</Description>
|
||||||
|
<DFFormat>
|
||||||
|
<int />
|
||||||
|
</DFFormat>
|
||||||
|
<Occurrence>
|
||||||
|
<One />
|
||||||
|
</Occurrence>
|
||||||
|
<Scope>
|
||||||
|
<Dynamic />
|
||||||
|
</Scope>
|
||||||
|
<DFTitle>ResetPasswordStatus</DFTitle>
|
||||||
|
<DFType>
|
||||||
|
<MIME>text/plain</MIME>
|
||||||
|
</DFType>
|
||||||
|
</DFProperties>
|
||||||
|
</Node>
|
||||||
|
</Node>
|
||||||
|
</Node>
|
||||||
|
</MgmtTree>
|
||||||
|
</cspDefinition>
|
||||||
|
</identity>
|
||||||
|
```
|
||||||
|
|
||||||
|
## Related articles
|
||||||
|
|
||||||
|
[LAPS configuration service provider](laps-csp.md)
|
@ -299,6 +299,11 @@ items:
|
|||||||
items:
|
items:
|
||||||
- name: HealthAttestation DDF
|
- name: HealthAttestation DDF
|
||||||
href: healthattestation-ddf.md
|
href: healthattestation-ddf.md
|
||||||
|
- name: Local Administrator Password Solution CSP
|
||||||
|
href: laps-csp.md
|
||||||
|
items:
|
||||||
|
- name: Local Administrator Password Solution DDF
|
||||||
|
href: laps-ddf-file.md
|
||||||
- name: MultiSIM CSP
|
- name: MultiSIM CSP
|
||||||
href: multisim-csp.md
|
href: multisim-csp.md
|
||||||
items:
|
items:
|
||||||
|
@ -26,12 +26,12 @@ The goal of the Windows Hello for Business cloud Kerberos trust is to bring the
|
|||||||
|
|
||||||
Windows Hello for Business cloud Kerberos trust uses Azure Active Directory (AD) Kerberos to address pain points of the key trust deployment model:
|
Windows Hello for Business cloud Kerberos trust uses Azure Active Directory (AD) Kerberos to address pain points of the key trust deployment model:
|
||||||
|
|
||||||
- Windows Hello for Business cloud Kerberos trust provides a simpler deployment experience because it doesn't require the deployment of public key infrastructure (PKI) or changes to existing PKI.
|
- Windows Hello for Business cloud Kerberos trust provides a simpler deployment experience because it doesn't require the deployment of public key infrastructure (PKI) or changes to existing PKI
|
||||||
- Cloud Kerberos trust doesn't require syncing of public keys between Azure AD and on-premises domain controllers (DCs) for users to access on-premises resources and applications. This change means there isn't a delay between the user provisioning and being able to authenticate.
|
- Cloud Kerberos trust doesn't require syncing of public keys between Azure AD and on-premises domain controllers (DCs) for users to access on-premises resources and applications. This change means there isn't a delay between the user provisioning and being able to authenticate
|
||||||
- Deploying Windows Hello for Business cloud Kerberos trust enables you to also deploy passwordless security keys with minimal extra setup.
|
- Deploying Windows Hello for Business cloud Kerberos trust enables you to also deploy passwordless security keys with minimal extra setup
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> Windows Hello for Business cloud Kerberos trust is recommended instead of key trust if you meet the prerequisites to deploy cloud Kerberos trust. cloud Kerberos trust is the preferred deployment model if you do not need to support certificate authentication scenarios.
|
> Windows Hello for Business cloud Kerberos trust is recommended instead of key trust if you meet the prerequisites to deploy cloud Kerberos trust. Cloud Kerberos trust is the preferred deployment model if you do not need to support certificate authentication scenarios.
|
||||||
|
|
||||||
## Azure Active Directory Kerberos and Cloud Kerberos Trust Authentication
|
## Azure Active Directory Kerberos and Cloud Kerberos Trust Authentication
|
||||||
|
|
||||||
@ -50,7 +50,7 @@ If you're using the hybrid cloud Kerberos trust deployment model, you _must_ ens
|
|||||||
| Requirement | Notes |
|
| Requirement | Notes |
|
||||||
| --- | --- |
|
| --- | --- |
|
||||||
| Multi-factor Authentication | This requirement can be met using [Azure AD multi-factor authentication](/azure/active-directory/authentication/howto-mfa-getstarted), multi-factor authentication provided through AD FS, or a comparable solution. |
|
| Multi-factor Authentication | This requirement can be met using [Azure AD multi-factor authentication](/azure/active-directory/authentication/howto-mfa-getstarted), multi-factor authentication provided through AD FS, or a comparable solution. |
|
||||||
| Patched Windows 10 version 21H2 or patched Windows 11 and later | If you're using Windows 10 21H2, KB5010415 must be installed. If you're using Windows 11 21H2, KB5010414 must be installed. There's no Windows version support difference between Azure AD joined and Hybrid Azure AD-joined devices. |
|
| Patched Windows 10, version 21H2 or patched Windows 11 and later | If you're using Windows 10 21H2, KB5010415 must be installed. If you're using Windows 11 21H2, KB5010414 must be installed. There's no Windows version support difference between Azure AD joined and Hybrid Azure AD-joined devices. |
|
||||||
| Fully patched Windows Server 2016 or later Domain Controllers | Domain controllers should be fully patched to support updates needed for Azure AD Kerberos. If you're using Windows Server 2016, [KB3534307](https://support.microsoft.com/en-us/topic/january-23-2020-kb4534307-os-build-14393-3474-b181594e-2c6a-14ea-e75b-678efea9d27e) must be installed. If you're using Server 2019, [KB4534321](https://support.microsoft.com/en-us/topic/january-23-2020-kb4534321-os-build-17763-1012-023e84c3-f9aa-3b55-8aff-d512911c459f) must be installed. |
|
| Fully patched Windows Server 2016 or later Domain Controllers | Domain controllers should be fully patched to support updates needed for Azure AD Kerberos. If you're using Windows Server 2016, [KB3534307](https://support.microsoft.com/en-us/topic/january-23-2020-kb4534307-os-build-14393-3474-b181594e-2c6a-14ea-e75b-678efea9d27e) must be installed. If you're using Server 2019, [KB4534321](https://support.microsoft.com/en-us/topic/january-23-2020-kb4534321-os-build-17763-1012-023e84c3-f9aa-3b55-8aff-d512911c459f) must be installed. |
|
||||||
| Azure AD Kerberos PowerShell module | This module is used for enabling and managing Azure AD Kerberos. It's available through the [PowerShell Gallery](https://www.powershellgallery.com/packages/AzureADHybridAuthenticationManagement).|
|
| Azure AD Kerberos PowerShell module | This module is used for enabling and managing Azure AD Kerberos. It's available through the [PowerShell Gallery](https://www.powershellgallery.com/packages/AzureADHybridAuthenticationManagement).|
|
||||||
| Device management | Windows Hello for Business cloud Kerberos trust can be managed with group policy or through mobile device management (MDM) policy. This feature is disabled by default and must be enabled using policy. |
|
| Device management | Windows Hello for Business cloud Kerberos trust can be managed with group policy or through mobile device management (MDM) policy. This feature is disabled by default and must be enabled using policy. |
|
||||||
@ -85,9 +85,82 @@ If you haven't deployed Azure AD Kerberos, follow the instructions in the [Enabl
|
|||||||
|
|
||||||
### Configure Windows Hello for Business Policy
|
### Configure Windows Hello for Business Policy
|
||||||
|
|
||||||
After setting up the Azure AD Kerberos Object, Windows Hello for business cloud Kerberos trust must be enabled using policy. By default, cloud Kerberos trust won't be used by Hybrid Azure AD joined or Azure AD-joined devices.
|
After setting up the Azure AD Kerberos Object, Windows Hello for business cloud Kerberos trust must be enabled on your Windows devices. Follow the instructions below to configure your devices using either Microsoft Intune or group policy (GPO).
|
||||||
|
|
||||||
#### Configure Using Group Policy
|
#### [:::image type="icon" source="../../images/icons/intune.svg"::: **Intune**](#tab/intune)
|
||||||
|
|
||||||
|
Windows Hello for Business can be enabled using device enrollment or device configuration policy. Device enrollment policy is only applied at device enrollment time. Any modifications to the configuration in Intune won't apply to already enrolled devices. Device configuration policy is applied after device enrollment. Changes to this policy type in Intune are applied to already enrolled devices.
|
||||||
|
|
||||||
|
The cloud Kerberos trust policy needs to be configured using a custom template and is configured separately from enabling Windows Hello from Business.
|
||||||
|
|
||||||
|
### Create a user Group that will be targeted for Windows Hello for Business
|
||||||
|
|
||||||
|
If you have an existing group you want to target with Windows Hello for Business cloud Kerberos trust policy, you can skip this step.
|
||||||
|
|
||||||
|
1. Sign in to the [Microsoft Endpoint Manager admin center](https://endpoint.microsoft.com/)
|
||||||
|
1. Browse to **Groups** and select **New group**
|
||||||
|
1. Configure the following group settings:
|
||||||
|
1. Group type: **Security**
|
||||||
|
1. Group name: *WHFB cloud Kerberos trust users* or a group name of your choosing
|
||||||
|
1. Membership type: **Assigned**
|
||||||
|
1. Select **Members** and add users that you want to target with Windows Hello for Business cloud Kerberos trust
|
||||||
|
|
||||||
|
You can also create a group through the Azure portal instead of using the Microsoft Endpoint Manager admin center
|
||||||
|
|
||||||
|
### Enable Windows Hello for Business
|
||||||
|
|
||||||
|
If you already enabled Windows Hello for Business for a target set of users or devices, you can skip below to configuring the cloud Kerberos trust policy. Otherwise, follow the instructions at [Integrate Windows Hello for Business with Microsoft Intune](/mem/intune/protect/windows-hello) to create a Windows Hello for Business device enrollment policy.
|
||||||
|
|
||||||
|
You can also follow these steps to create a device configuration policy instead of a device enrollment policy:
|
||||||
|
|
||||||
|
1. Sign in to the [Microsoft Endpoint Manager admin center](https://endpoint.microsoft.com/).
|
||||||
|
1. Browse to Devices > Windows > Configuration Profiles > Create profile.
|
||||||
|
1. For Platform, select Windows 10 and later.
|
||||||
|
1. For Profile Type, select **Templates** and select the **Identity Protection** Template.
|
||||||
|
1. Name the profile with a familiar name. For example, "Windows Hello for Business".
|
||||||
|
1. In **Configurations settings**, set the **Configure Windows Hello for Business** option to **Enable**.
|
||||||
|
1. After setting Configure Windows Hello for Business to Enable, multiple policy options become available. These policies are optional to configure. More information on these policies is available in our documentation on managing [Windows Hello for Business in your organization](hello-manage-in-organization.md#mdm-policy-settings-for-windows-hello-for-business). We recommend setting **Use a Trusted Platform Module (TPM)** to **Enable**.
|
||||||
|
|
||||||
|
[](./images/hello-intune-enable-large.png#lightbox)
|
||||||
|
|
||||||
|
1. Select Next to move to **Assignments**.
|
||||||
|
1. Under Included groups, select **Add groups**.
|
||||||
|
1. Select the user group you would like to use Windows Hello for Business cloud Kerberos trust. This group may be *WHFB cloud Kerberos trust users* or a group of your choosing.
|
||||||
|
1. Select Next to move to the Applicability Rules.
|
||||||
|
1. Select Next again to move to the **Review + create** tab and select the option to create the policy.
|
||||||
|
|
||||||
|
Windows Hello for Business settings are also available in the settings catalog. For more information, see [Use the settings catalog to configure settings on Windows and macOS devices - preview](/mem/intune/configuration/settings-catalog).
|
||||||
|
|
||||||
|
### Configure Cloud Kerberos Trust policy
|
||||||
|
|
||||||
|
To configure the cloud Kerberos trust policy, follow the steps below:
|
||||||
|
|
||||||
|
1. Sign in to the [Microsoft Endpoint Manager admin center](https://endpoint.microsoft.com/).
|
||||||
|
1. Browse to Devices > Windows > Configuration Profiles > Create profile.
|
||||||
|
1. For Platform, select Windows 10 and later.
|
||||||
|
1. For Profile Type, select **Templates** and select the **Custom** Template.
|
||||||
|
1. Name the profile with a familiar name. For example, "Windows Hello for Business cloud Kerberos trust".
|
||||||
|
1. In Configuration Settings, add a new configuration with the following settings:
|
||||||
|
|
||||||
|
| Setting |
|
||||||
|
|--------|
|
||||||
|
| <ul><li>Name: **Windows Hello for Business cloud Kerberos trust** or another familiar name</li><li>Description (optional): *Enable Windows Hello for Business cloud Kerberos trust for sign-in and on-premises SSO*</li><li>OMA-URI: **`./Device/Vendor/MSFT/PassportForWork/`*\<tenant ID>*`/Policies/UseCloudTrustForOnPremAuth`** </li><li>Data type: **Boolean** </li><li>Value: **True**</li></ul>|
|
||||||
|
|
||||||
|
>[!IMPORTANT]
|
||||||
|
>*Tenant ID* in the OMA-URI must be replaced with the tenant ID for your Azure AD tenant. See [How to find your Azure AD tenant ID](/azure/active-directory/fundamentals/active-directory-how-to-find-tenant) for instructions on looking up your tenant ID.
|
||||||
|
|
||||||
|
[](./images/hello-cloud-trust-intune-large.png#lightbox)
|
||||||
|
|
||||||
|
1. Select Next to navigate to **Assignments**.
|
||||||
|
1. Under Included groups, select **Add groups**.
|
||||||
|
1. Select the user group you would like to use Windows Hello for Business cloud Kerberos trust. This group may be *WHFB cloud Kerberos trust users* or a group of your choosing.
|
||||||
|
1. Select Next to move to the Applicability Rules.
|
||||||
|
1. Select Next again to move to the **Review + create** tab and select the option to create the policy.
|
||||||
|
|
||||||
|
> [!Important]
|
||||||
|
> If the Use certificate for on-premises authentication policy is enabled, we will enforce certificate trust instead of cloud Kerberos trust on the client. Please make sure that any machines that you want to use Windows Hello for Business cloud Kerberos trust have this policy not configured or disabled.
|
||||||
|
|
||||||
|
#### [:::image type="icon" source="../../images/icons/group-policy.svg"::: **GPO**](#tab/gpo)
|
||||||
|
|
||||||
Hybrid Azure AD joined organizations can use Windows Hello for Business Group Policy to manage the feature. Group Policy can be configured to enable users to enroll and use Windows Hello for Business.
|
Hybrid Azure AD joined organizations can use Windows Hello for Business Group Policy to manage the feature. Group Policy can be configured to enable users to enroll and use Windows Hello for Business.
|
||||||
|
|
||||||
@ -100,13 +173,13 @@ cloud Kerberos trust requires setting a dedicated policy for it to be enabled. T
|
|||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> If you deployed Windows Hello for Business configuration using both Group Policy and Microsoft Intune, Group Policy settings will take precedence and Intune settings will be ignored. For more information about deploying Windows Hello for Business configuration using Microsoft Intune, see [Windows device settings to enable Windows Hello for Business in Intune](/mem/intune/protect/identity-protection-windows-settings) and [PassportForWork CSP](/windows/client-management/mdm/passportforwork-csp). For more information about policy conflicts, see [Policy conflicts from multiple policy sources](hello-manage-in-organization.md#policy-conflicts-from-multiple-policy-sources)
|
> If you deployed Windows Hello for Business configuration using both Group Policy and Microsoft Intune, Group Policy settings will take precedence and Intune settings will be ignored. For more information about deploying Windows Hello for Business configuration using Microsoft Intune, see [Windows device settings to enable Windows Hello for Business in Intune](/mem/intune/protect/identity-protection-windows-settings) and [PassportForWork CSP](/windows/client-management/mdm/passportforwork-csp). For more information about policy conflicts, see [Policy conflicts from multiple policy sources](hello-manage-in-organization.md#policy-conflicts-from-multiple-policy-sources)
|
||||||
|
|
||||||
##### Update Group Policy Objects
|
#### Update Group Policy Objects
|
||||||
|
|
||||||
You may need to update your Group Policy definitions to be able to configure the cloud Kerberos trust policy. You can copy the ADMX and ADML files from a Windows 10 21H2 or Windows 11 device that supports cloud Kerberos trust to their respective language folder on your Group Policy management server. Windows Hello for Business settings are in the Passport.admx and Passport.adml files.
|
You may need to update your Group Policy definitions to be able to configure the cloud Kerberos trust policy. You can copy the ADMX and ADML files from a Windows 10 21H2 or Windows 11 device that supports cloud Kerberos trust to their respective language folder on your Group Policy management server. Windows Hello for Business settings are in the Passport.admx and Passport.adml files.
|
||||||
|
|
||||||
You can also create a Group Policy Central Store and copy them their respective language folder. For more information, see [How to create and manage the Central Store for Group Policy Administrative Templates in Windows](/troubleshoot/windows-client/group-policy/create-and-manage-central-store).
|
You can also create a Group Policy Central Store and copy them their respective language folder. For more information, see [How to create and manage the Central Store for Group Policy Administrative Templates in Windows](/troubleshoot/windows-client/group-policy/create-and-manage-central-store).
|
||||||
|
|
||||||
##### Create the Windows Hello for Business Group Policy object
|
#### Create the Windows Hello for Business Group Policy object
|
||||||
|
|
||||||
Sign-in a domain controller or management workstations with *Domain Admin* equivalent credentials.
|
Sign-in a domain controller or management workstations with *Domain Admin* equivalent credentials.
|
||||||
|
|
||||||
@ -126,81 +199,7 @@ This group policy should be targeted at the computer group that you've created f
|
|||||||
> [!Important]
|
> [!Important]
|
||||||
> If the Use certificate for on-premises authentication policy is enabled, we will enforce certificate trust instead of cloud Kerberos trust on the client. Please make sure that any machines that you want to use Windows Hello for Business cloud Kerberos trust have this policy not configured or disabled.
|
> If the Use certificate for on-premises authentication policy is enabled, we will enforce certificate trust instead of cloud Kerberos trust on the client. Please make sure that any machines that you want to use Windows Hello for Business cloud Kerberos trust have this policy not configured or disabled.
|
||||||
|
|
||||||
#### Configure Using Intune
|
---
|
||||||
|
|
||||||
Windows Hello for Business can be enabled using device enrollment or device configuration policy. Device enrollment policy is only applied at device enrollment time. Any modifications to the configuration in Intune won't apply to already enrolled devices. Device configuration policy is applied after device enrollment. Changes to this policy type in Intune are applied to already enrolled devices.
|
|
||||||
|
|
||||||
The cloud Kerberos trust policy needs to be configured using a custom template and is configured separately from enabling Windows Hello from Business.
|
|
||||||
|
|
||||||
##### Create a user Group that will be targeted for Windows Hello for Business
|
|
||||||
|
|
||||||
If you have an existing group you want to target with Windows Hello for Business cloud Kerberos trust policy, you can skip this step.
|
|
||||||
|
|
||||||
1. Sign in to the [Microsoft Endpoint Manager admin center](https://endpoint.microsoft.com/).
|
|
||||||
1. Browse to **Groups** and select **New group**.
|
|
||||||
1. Configure the following group settings:
|
|
||||||
1. Group type: "Security"
|
|
||||||
1. Group name: "WHFBCloudTrustUsers" or a group name of your choosing
|
|
||||||
1. Membership type: Assigned
|
|
||||||
1. Select **Members** and add users that you want to target with Windows Hello for Business cloud Kerberos trust.
|
|
||||||
|
|
||||||
You can also create a group through the Azure portal instead of using the Microsoft Endpoint Manager admin center.
|
|
||||||
|
|
||||||
##### Enable Windows Hello for Business
|
|
||||||
|
|
||||||
If you already enabled Windows Hello for Business for a target set of users or devices, you can skip below to configuring the cloud Kerberos trust policy. Otherwise, follow the instructions at [Integrate Windows Hello for Business with Microsoft Intune](/mem/intune/protect/windows-hello) to create a Windows Hello for Business device enrollment policy.
|
|
||||||
|
|
||||||
You can also follow these steps to create a device configuration policy instead of a device enrollment policy:
|
|
||||||
|
|
||||||
1. Sign in to the [Microsoft Endpoint Manager admin center](https://endpoint.microsoft.com/).
|
|
||||||
1. Browse to Devices > Windows > Configuration Profiles > Create profile.
|
|
||||||
1. For Platform, select Windows 10 and later.
|
|
||||||
1. For Profile Type, select **Templates** and select the **Identity Protection** Template.
|
|
||||||
1. Name the profile with a familiar name. For example, "Windows Hello for Business".
|
|
||||||
1. In **Configurations settings**, set the **Configure Windows Hello for Business** option to **Enable**.
|
|
||||||
1. After setting Configure Windows Hello for Business to Enable, multiple policy options become available. These policies are optional to configure. More information on these policies is available in our documentation on managing [Windows Hello for Business in your organization](hello-manage-in-organization.md#mdm-policy-settings-for-windows-hello-for-business). We recommend setting **Use a Trusted Platform Module (TPM)** to **Enable**.
|
|
||||||
|
|
||||||
[](./images/hello-intune-enable-large.png#lightbox)
|
|
||||||
|
|
||||||
1. Select Next to move to **Assignments**.
|
|
||||||
1. Under Included groups, select **Add groups**.
|
|
||||||
1. Select the user group you would like to use Windows Hello for Business cloud Kerberos trust. This group may be WHFBCloudTrustUsers or a group of your choosing.
|
|
||||||
1. Select Next to move to the Applicability Rules.
|
|
||||||
1. Select Next again to move to the **Review + create** tab and select the option to create the policy.
|
|
||||||
|
|
||||||
Windows Hello for Business settings are also available in the settings catalog. For more information, see [Use the settings catalog to configure settings on Windows and macOS devices - preview](/mem/intune/configuration/settings-catalog).
|
|
||||||
|
|
||||||
##### Configure Cloud Kerberos Trust policy
|
|
||||||
|
|
||||||
To configure the cloud Kerberos trust policy, follow the steps below:
|
|
||||||
|
|
||||||
1. Sign in to the [Microsoft Endpoint Manager admin center](https://endpoint.microsoft.com/).
|
|
||||||
1. Browse to Devices > Windows > Configuration Profiles > Create profile.
|
|
||||||
1. For Platform, select Windows 10 and later.
|
|
||||||
1. For Profile Type, select **Templates** and select the **Custom** Template.
|
|
||||||
1. Name the profile with a familiar name. For example, "Windows Hello for Business cloud Kerberos trust".
|
|
||||||
1. In Configuration Settings, add a new configuration with the following settings:
|
|
||||||
|
|
||||||
- Name: "Windows Hello for Business cloud Kerberos trust" or another familiar name
|
|
||||||
- Description: Enable Windows Hello for Business cloud Kerberos trust for sign-in and on-premises SSO.
|
|
||||||
- OMA-URI: ./Device/Vendor/MSFT/PassportForWork/*tenant ID*/Policies/UseCloudTrustForOnPremAuth
|
|
||||||
|
|
||||||
>[!IMPORTANT]
|
|
||||||
>*Tenant ID* in the OMA-URI must be replaced with the tenant ID for your Azure AD tenant. See [How to find your Azure AD tenant ID](/azure/active-directory/fundamentals/active-directory-how-to-find-tenant) for instructions on looking up your tenant ID.
|
|
||||||
|
|
||||||
- Data type: Boolean
|
|
||||||
- Value: True
|
|
||||||
|
|
||||||
[](./images/hello-cloud-trust-intune-large.png#lightbox)
|
|
||||||
|
|
||||||
1. Select Next to navigate to **Assignments**.
|
|
||||||
1. Under Included groups, select **Add groups**.
|
|
||||||
1. Select the user group you would like to use Windows Hello for Business cloud Kerberos trust. This group may be WHFBCloudTrustUsers or a group of your choosing.
|
|
||||||
1. Select Next to move to the Applicability Rules.
|
|
||||||
1. Select Next again to move to the **Review + create** tab and select the option to create the policy.
|
|
||||||
|
|
||||||
> [!Important]
|
|
||||||
> If the Use certificate for on-premises authentication policy is enabled, we will enforce certificate trust instead of cloud Kerberos trust on the client. Please make sure that any machines that you want to use Windows Hello for Business cloud Kerberos trust have this policy not configured or disabled.
|
|
||||||
|
|
||||||
## Provisioning
|
## Provisioning
|
||||||
|
|
||||||
|
3
windows/security/images/icons/accessibility.svg
Normal file
@ -0,0 +1,3 @@
|
|||||||
|
<svg width="18" height="18" viewBox="0 0 18 18" fill="none" xmlns="http://www.w3.org/2000/svg">
|
||||||
|
<path d="M6.75001 3.25C6.75001 2.55964 7.30966 2 8.00001 2C8.69037 2 9.25001 2.55964 9.25001 3.25C9.25001 3.94036 8.69037 4.5 8.00001 4.5C7.30966 4.5 6.75001 3.94036 6.75001 3.25ZM8.00001 1C6.75737 1 5.75001 2.00736 5.75001 3.25C5.75001 3.42769 5.77061 3.60057 5.80955 3.76638L4.1981 3.11531C3.38523 2.78689 2.45661 3.17707 2.12226 3.98751C1.78682 4.8006 2.17658 5.72824 2.9921 6.05773L5 6.86897L5 9.25304L3.18661 12.6635C2.77397 13.4396 3.06858 14.4032 3.84463 14.8158C4.62069 15.2285 5.58431 14.9339 5.99695 14.1578L8.00028 10.3901L10.0037 14.158C10.4163 14.934 11.3799 15.2286 12.156 14.816C12.9321 14.4034 13.2267 13.4397 12.814 12.6637L11 9.252V6.86897L13.0079 6.05773C13.8234 5.72824 14.2132 4.80059 13.8777 3.98751C13.5434 3.17707 12.6148 2.78689 11.8019 3.11531L10.1905 3.76636C10.2294 3.60055 10.25 3.42768 10.25 3.25C10.25 2.00736 9.24265 1 8.00001 1ZM3.04668 4.36889C3.17149 4.06635 3.52005 3.91989 3.82349 4.04249L7.25078 5.42721C7.73138 5.62138 8.2686 5.62138 8.74921 5.42721L12.1765 4.04249C12.4799 3.91989 12.8285 4.06635 12.9533 4.36889C13.077 4.66879 12.9341 5.00902 12.6333 5.13055L10.6254 5.94179C10.2474 6.09449 10 6.46133 10 6.86897V9.252C10 9.41571 10.0402 9.57692 10.1171 9.72147L11.9311 13.1332C12.0844 13.4216 11.9749 13.7797 11.6865 13.9331C11.3981 14.0864 11.04 13.9769 10.8866 13.6885L8.88322 9.92064C8.50711 9.21327 7.49344 9.21326 7.11733 9.92064L5.114 13.6883C4.96065 13.9768 4.60252 14.0863 4.31411 13.9329C4.02569 13.7795 3.9162 13.4214 4.06955 13.133L5.88295 9.72251C5.9598 9.57796 6 9.41675 6 9.25304V6.86897C6 6.46133 5.75256 6.09449 5.3746 5.94179L3.3667 5.13055C3.06591 5.00902 2.92295 4.66879 3.04668 4.36889Z" fill="#0078D4" />
|
||||||
|
</svg>
|
After Width: | Height: | Size: 1.7 KiB |
3
windows/security/images/icons/group-policy.svg
Normal file
@ -0,0 +1,3 @@
|
|||||||
|
<svg xmlns="http://www.w3.org/2000/svg" width="18" height="18" viewBox="0 0 2048 2048">
|
||||||
|
<path d="M1792 0q53 0 99 20t82 55 55 81 20 100q0 53-20 99t-55 82-81 55-100 20h-128v1280q0 53-20 99t-55 82-81 55-100 20H256q-53 0-99-20t-82-55-55-81-20-100q0-53 20-99t55-82 81-55 100-20V256q0-53 20-99t55-82 81-55T512 0h1280zM128 1792q0 27 10 50t27 40 41 28 50 10h930q-34-60-34-128t34-128H256q-27 0-50 10t-40 27-28 41-10 50zm1280 128q27 0 50-10t40-27 28-41 10-50V256q0-68 34-128H512q-27 0-50 10t-40 27-28 41-10 50v1280h1024q26 0 45 19t19 45q0 26-19 45t-45 19q-25 0-49 9t-42 28q-18 18-27 42t-10 49q0 27 10 50t27 40 41 28 50 10zm384-1536q27 0 50-10t40-27 28-41 10-50q0-27-10-50t-27-40-41-28-50-10q-27 0-50 10t-40 27-28 41-10 50v128h128zm-1280 0h896v128H512V384zm0 256h256v128H512V640zm0 256h256v128H512V896zm0 256h256v128H512v-128zm640-512q53 0 99 20t82 55 55 81 20 100q0 17-4 33t-4 31v539l-248-124-248 124V960q0-14-4-30t-4-34q0-53 20-99t55-82 81-55 100-20zm0 128q-27 0-50 10t-40 27-28 41-10 50q0 27 10 50t27 40 41 28 50 10q27 0 50-10t40-27 28-41 10-50q0-27-10-50t-27-40-41-28-50-10zm136 549v-204q-30 20-65 29t-71 10q-36 0-71-9t-65-30v204l136-68 136 68z" fill="#0078D4" />
|
||||||
|
</svg>
|
After Width: | Height: | Size: 1.1 KiB |
24
windows/security/images/icons/intune.svg
Normal file
@ -0,0 +1,24 @@
|
|||||||
|
<svg id="a9ed4d43-c916-4b9a-b9ca-be76fbdc694c" xmlns="http://www.w3.org/2000/svg" width="18" height="18" viewBox="0 0 18 18">
|
||||||
|
<defs>
|
||||||
|
<linearGradient id="aaede26b-698f-4a65-b6db-859d207e2da6" x1="8.05" y1="11.32" x2="8.05" y2="1.26" gradientUnits="userSpaceOnUse">
|
||||||
|
<stop offset="0" stop-color="#0078d4" />
|
||||||
|
<stop offset="0.82" stop-color="#5ea0ef" />
|
||||||
|
</linearGradient>
|
||||||
|
<linearGradient id="bc54987f-34ba-4701-8ce4-6eca10aff9e9" x1="8.05" y1="15.21" x2="8.05" y2="11.32" gradientUnits="userSpaceOnUse">
|
||||||
|
<stop offset="0" stop-color="#1490df" />
|
||||||
|
<stop offset="0.98" stop-color="#1f56a3" />
|
||||||
|
</linearGradient>
|
||||||
|
<linearGradient id="a5434fd8-c18c-472c-be91-f2aa070858b7" x1="8.05" y1="7.87" x2="8.05" y2="4.94" gradientUnits="userSpaceOnUse">
|
||||||
|
<stop offset="0" stop-color="#d2ebff" />
|
||||||
|
<stop offset="1" stop-color="#f0fffd" />
|
||||||
|
</linearGradient>
|
||||||
|
</defs>
|
||||||
|
<title>Icon-intune-329</title>
|
||||||
|
<rect x="0.5" y="1.26" width="15.1" height="10.06" rx="0.5" fill="url(#aaede26b-698f-4a65-b6db-859d207e2da6)" />
|
||||||
|
<rect x="1.34" y="2.1" width="13.42" height="8.39" rx="0.28" fill="#fff" />
|
||||||
|
<path d="M11.08,14.37c-1.5-.23-1.56-1.31-1.55-3h-3c0,1.74-.06,2.82-1.55,3a.87.87,0,0,0-.74.84h7.54A.88.88,0,0,0,11.08,14.37Z" fill="url(#bc54987f-34ba-4701-8ce4-6eca10aff9e9)" />
|
||||||
|
<path d="M17.17,5.91H10.29a2.31,2.31,0,1,0,0,.92H11v9.58a.33.33,0,0,0,.33.33h5.83a.33.33,0,0,0,.33-.33V6.24A.33.33,0,0,0,17.17,5.91Z" fill="#32bedd" />
|
||||||
|
<rect x="11.62" y="6.82" width="5.27" height="8.7" rx="0.12" fill="#fff" />
|
||||||
|
<circle cx="8.05" cy="6.41" r="1.46" opacity="0.9" fill="url(#a5434fd8-c18c-472c-be91-f2aa070858b7)" />
|
||||||
|
<path d="M14.88,10.82,13.76,9.7a.06.06,0,0,0-.1.05v.68a.06.06,0,0,1-.06.06H11v.83H13.6a.06.06,0,0,1,.06.06v.69a.06.06,0,0,0,.1,0L14.88,11A.12.12,0,0,0,14.88,10.82Z" fill="#0078d4" />
|
||||||
|
</svg>
|
After Width: | Height: | Size: 1.8 KiB |
20
windows/security/images/icons/powershell.svg
Normal file
@ -0,0 +1,20 @@
|
|||||||
|
<svg xmlns="http://www.w3.org/2000/svg" width="18" height="18" viewBox="0 0 18 18">
|
||||||
|
<defs>
|
||||||
|
<linearGradient id="a24f9983-911f-4df7-920f-f964c8c10f82" x1="9" y1="15.834" x2="9" y2="5.788" gradientUnits="userSpaceOnUse">
|
||||||
|
<stop offset="0" stop-color="#32bedd" />
|
||||||
|
<stop offset="0.175" stop-color="#32caea" />
|
||||||
|
<stop offset="0.41" stop-color="#32d2f2" />
|
||||||
|
<stop offset="0.775" stop-color="#32d4f5" />
|
||||||
|
</linearGradient>
|
||||||
|
</defs>
|
||||||
|
<title>MsPortalFx.base.images-10</title>
|
||||||
|
<g id="a7ef0482-71f2-4b7e-b916-b1c754245bf1">
|
||||||
|
<g>
|
||||||
|
<path d="M.5,5.788h17a0,0,0,0,1,0,0v9.478a.568.568,0,0,1-.568.568H1.068A.568.568,0,0,1,.5,15.266V5.788A0,0,0,0,1,.5,5.788Z" fill="url(#a24f9983-911f-4df7-920f-f964c8c10f82)" />
|
||||||
|
<path d="M1.071,2.166H16.929a.568.568,0,0,1,.568.568V5.788a0,0,0,0,1,0,0H.5a0,0,0,0,1,0,0V2.734A.568.568,0,0,1,1.071,2.166Z" fill="#0078d4" />
|
||||||
|
<path d="M4.292,7.153h.523a.167.167,0,0,1,.167.167v3.858a.335.335,0,0,1-.335.335H4.125a0,0,0,0,1,0,0V7.321a.167.167,0,0,1,.167-.167Z" transform="translate(-5.271 5.967) rotate(-45.081)" fill="#f2f2f2" />
|
||||||
|
<path d="M4.32,9.647h.523a.167.167,0,0,1,.167.167v4.131a0,0,0,0,1,0,0H4.488a.335.335,0,0,1-.335-.335v-3.8a.167.167,0,0,1,.167-.167Z" transform="translate(-0.504 23.385) rotate(-135.081)" fill="#e6e6e6" />
|
||||||
|
<rect x="7.221" y="12.64" width="4.771" height="1.011" rx="0.291" fill="#f2f2f2" />
|
||||||
|
</g>
|
||||||
|
</g>
|
||||||
|
</svg>
|
After Width: | Height: | Size: 1.4 KiB |
3
windows/security/images/icons/provisioning-package.svg
Normal file
@ -0,0 +1,3 @@
|
|||||||
|
<svg xmlns="http://www.w3.org/2000/svg" width="18" height="18" viewBox="0 0 2048 2048">
|
||||||
|
<path d="M1544 128q75 0 143 30t120 82 82 120 31 144v328q0 26-19 45t-45 19q-26 0-45-19t-19-45V507q0-50-20-95t-55-80-80-55-96-21H346q16 15 27 28t11 36q0 26-19 45t-45 19q-26 0-45-19L147 237q-19-19-19-45t19-45L275 19q19-19 45-19t45 19 19 45q0 23-11 36t-27 28h1198zm-57 896q0 24 22 43t50 39 50 46 23 63q0 21-12 51t-30 61-37 59-33 44q-31 37-79 37-20 0-42-8t-44-17-41-17-35-8q-15 0-24 6t-14 15-8 20-5 24l-17 91q-6 34-25 52t-45 27-55 10-57 2h-5q-27 0-58-1t-58-11-47-28-26-53l-20-116q-2-14-14-26t-28-12q-20 0-40 7t-42 17-43 17-43 8q-50 0-80-37-14-16-32-43t-35-59-29-61-12-52q0-39 22-64t50-45 49-38 23-43q0-25-22-43t-50-39-50-45-23-64q0-22 12-52t30-60 37-58 33-45q31-37 79-37 20 0 42 7t43 17 40 17 36 8q21 0 32-11t16-30 8-41 7-46 11-45 24-38q12-12 29-19t37-10 40-5 39-1h15q27 0 57 1t58 11 46 28 26 53l20 116q3 18 16 27t31 10q17 0 37-7t41-17 42-17 42-8q23 0 44 10t36 28q14 17 32 44t36 58 29 61 12 52q0 39-22 64t-50 45-49 38-23 43zm-128 0q0-37 12-64t31-50 45-42 52-42q-13-30-29-58t-36-54q-36 13-76 29t-80 16q-24 0-44-6t-42-18q-33-19-51-42t-27-51-13-59-11-67q-16-2-32-3t-33-1q-17 0-33 1t-32 3q-7 35-11 66t-14 58-28 52-51 43q-21 13-41 18t-45 6q-40 0-79-16t-76-30q-38 51-66 112 26 22 51 42t45 42 32 50 12 65q0 37-12 64t-31 50-45 42-52 42q13 30 29 58t36 54q35-13 74-29t79-16q32 0 61 10t52 30 39 46 22 58l17 99q17 2 32 3t33 1q17 0 33-1t33-3q5-30 9-59t13-57 24-52 43-43q23-15 48-23t53-9q18 0 38 5t40 12 39 15 37 14q38-51 66-112-26-22-51-42t-45-42-32-50-12-65zm-207 0q0 27-10 50t-27 40-41 28-50 10q-27 0-50-10t-41-27-27-40-10-51q0-27 10-50t27-40 41-28 50-10q26 0 49 10t41 27 28 41 10 50zm768 832q0 26-19 45l-128 128q-19 19-45 19t-45-19-19-45q0-23 11-36t27-28H504q-75 0-143-30t-120-82-82-120-31-144v-328q0-26 19-45t45-19q26 0 45 19t19 45v325q0 50 20 95t55 80 80 55 96 21h1195q-14-14-26-28t-12-36q0-26 19-45t45-19q26 0 45 19l128 128q19 19 19 45z" fill="#0078D4" />
|
||||||
|
</svg>
|
After Width: | Height: | Size: 1.9 KiB |
22
windows/security/images/icons/registry.svg
Normal file
@ -0,0 +1,22 @@
|
|||||||
|
<svg id="b9b1f1bd-1131-4ac5-b607-ad500ee51398" data-name="fluent_icons" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" width="18" height="18" viewBox="0 0 18 18">
|
||||||
|
<defs>
|
||||||
|
<linearGradient id="b0b22e7a-bfc7-4dec-91e9-5f981ed97407" x1="8.55" y1="0.41" x2="8.48" y2="18.62" gradientUnits="userSpaceOnUse">
|
||||||
|
<stop offset="0" stop-color="#76bc2d" />
|
||||||
|
<stop offset="0.32" stop-color="#73b82c" />
|
||||||
|
<stop offset="0.65" stop-color="#6cab29" />
|
||||||
|
<stop offset="0.99" stop-color="#5e9724" />
|
||||||
|
<stop offset="1" stop-color="#5e9624" />
|
||||||
|
</linearGradient>
|
||||||
|
<linearGradient id="e827adc5-7c19-488a-9b2c-abb70d46ae5e" x1="14.75" y1="5.9" x2="14.75" y2="1.1" gradientTransform="translate(18.1 -11.21) rotate(90)" gradientUnits="userSpaceOnUse">
|
||||||
|
<stop offset="0" stop-color="#0078d4" />
|
||||||
|
<stop offset="0.17" stop-color="#1c84dc" />
|
||||||
|
<stop offset="0.38" stop-color="#3990e4" />
|
||||||
|
<stop offset="0.59" stop-color="#4d99ea" />
|
||||||
|
<stop offset="0.8" stop-color="#5a9eee" />
|
||||||
|
<stop offset="1" stop-color="#5ea0ef" />
|
||||||
|
</linearGradient>
|
||||||
|
</defs>
|
||||||
|
<title>Icon-general-18</title>
|
||||||
|
<path d="M6.27,13.29h4.49v4.49H6.27ZM1,3.43V7.3h4.5V2.81H1.65A.63.63,0,0,0,1,3.43ZM1,17.16a.63.63,0,0,0,.63.62H5.52V13.29H1Zm0-4.62h4.5V8.05H1Zm10.49,5.24h3.87a.62.62,0,0,0,.62-.62V13.29H11.51ZM6.27,12.54h4.49V8.05H6.27Zm5.24-4.49v4.49H16V8.05ZM6.27,7.3h4.49V2.81H6.27Z" fill="url(#b0b22e7a-bfc7-4dec-91e9-5f981ed97407)" />
|
||||||
|
<rect x="12.2" y="1.14" width="4.8" height="4.8" rx="0.25" transform="translate(5.14 15.21) rotate(-64.59)" fill="url(#e827adc5-7c19-488a-9b2c-abb70d46ae5e)" />
|
||||||
|
</svg>
|
After Width: | Height: | Size: 1.6 KiB |
3
windows/security/images/icons/windows-os.svg
Normal file
@ -0,0 +1,3 @@
|
|||||||
|
<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 2048 2048" width="18" height="18" >
|
||||||
|
<path d="M0 0h961v961H0V0zm1087 0h961v961h-961V0zM0 1087h961v961H0v-961zm1087 0h961v961h-961v-961z" fill="#0078D4" />
|
||||||
|
</svg>
|
After Width: | Height: | Size: 215 B |