2.3 KiB
title, description, ms.date, appliesto, ms.topic
title | description | ms.date | appliesto | ms.topic | ||
---|---|---|---|---|---|---|
Validate and Deploy MFA for Windows Hello for Business with key trust | Validate and deploy multi-factor authentication (MFA) for Windows Hello for Business in an on-premises key trust model. | 12/12/2022 |
|
tutorial |
Validate and deploy multi-factor authentication - on-premises key trust
[!INCLUDE hello-on-premises-key-trust]
Windows Hello for Business requires users perform multi-factor authentication (MFA) prior to enroll in the service. On-premises deployments can use, as MFA option:
- certificates
- third-party authentication providers for AD FS
- custom authentication provider for AD FS
Important
As of July 1, 2019, Microsoft will no longer offer MFA Server for new deployments. New customers who would like to require multi-factor authentication from their users should use cloud-based Azure AD Multi-Factor Authentication. Existing customers who have activated MFA Server prior to July 1 will be able to download the latest version, future updates and generate activation credentials as usual.
For information on available third-party authentication methods see Configure Additional Authentication Methods for AD FS. For creating a custom authentication method see Build a Custom Authentication Method for AD FS in Windows Server
Follow the integration and deployment guide for the authentication provider you select to integrate and deploy it to AD FS. Make sure that the authentication provider is selected as a multi-factor authentication option in the AD FS authentication policy. For information on configuring AD FS authentication policies see Configure Authentication Policies.
[!div class="nextstepaction"] Next: configure Windows Hello for Business Policy settings