mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-04 08:37:23 +00:00
42 lines
2.8 KiB
Markdown
42 lines
2.8 KiB
Markdown
---
|
||
title: Validate and Deploy MFA for Windows Hello for Business with key trust
|
||
description: How to Validate and Deploy Multifactor Authentication (MFA) Services for Windows Hello for Business with key trust
|
||
keywords: identity, PIN, biometric, Hello, passport
|
||
ms.prod: w10
|
||
ms.mktglfcycl: deploy
|
||
ms.sitesec: library
|
||
ms.pagetype: security, mobile
|
||
audience: ITPro
|
||
author: mapalko
|
||
ms.author: mapalko
|
||
manager: dansimp
|
||
ms.collection: M365-identity-device-management
|
||
ms.topic: article
|
||
localizationpriority: medium
|
||
ms.date: 08/19/2018
|
||
ms.reviewer:
|
||
---
|
||
# Validate and Deploy Multi-factor Authentication (MFA)
|
||
|
||
> [!IMPORTANT]
|
||
> As of July 1, 2019, Microsoft will no longer offer MFA Server for new deployments. New customers who would like to require multi-factor authentication from their users should use cloud-based Azure Multi-Factor Authentication. Existing customers who have activated MFA Server prior to July 1 will be able to download the latest version, future updates and generate activation credentials as usual.
|
||
|
||
**Applies to**
|
||
|
||
- Windows 10, version 1703 or later
|
||
- On-premises deployment
|
||
- Key trust
|
||
|
||
Windows Hello for Business requires all users perform multi-factor authentication prior to creating and registering a Windows Hello for Business credential. On-premises deployments can use certificates, third-party authentication providers for AD FS, or a custom authentication provider for AD FS as an on-premises MFA option.
|
||
|
||
For information on available third-party authentication methods see [Configure Additional Authentication Methods for AD FS](https://docs.microsoft.com/windows-server/identity/ad-fs/operations/configure-additional-authentication-methods-for-ad-fs). For creating a custom authentication method see [Build a Custom Authentication Method for AD FS in Windows Server](https://docs.microsoft.com/windows-server/identity/ad-fs/development/ad-fs-build-custom-auth-method)
|
||
|
||
Follow the integration and deployment guide for the authentication provider you select to integrate and deploy it to AD FS. Make sure that the authentication provider is selected as a multi-factor authentication option in the AD FS authentication policy. For information on configuring AD FS authentication policies see [Configure Authentication Policies](https://docs.microsoft.com/windows-server/identity/ad-fs/operations/configure-authentication-policies).
|
||
|
||
## Follow the Windows Hello for Business on premises certificate trust deployment guide
|
||
1. [Validate Active Directory prerequisites](hello-key-trust-validate-ad-prereq.md)
|
||
2. [Validate and Configure Public Key Infrastructure](hello-key-trust-validate-pki.md)
|
||
3. [Prepare and Deploy Windows Server 2016 Active Directory Federation Services](hello-key-trust-adfs.md)
|
||
4. Validate and Deploy Multifactor Authentication Services (MFA) (*You are here*)
|
||
5. [Configure Windows Hello for Business Policy settings](hello-key-trust-policy-settings.md)
|