48 KiB
title, description, keywords, ms.prod, ms.mktglfcycl, ms.sitesec, ms.pagetype, author, ms.localizationpriority, ms.author, ms.date
title | description | keywords | ms.prod | ms.mktglfcycl | ms.sitesec | ms.pagetype | author | ms.localizationpriority | ms.author | ms.date |
---|---|---|---|---|---|---|---|---|---|---|
Prepare and Deploy Windows Server 2016 Active Directory Federation Services (Windows Hello for Business) | How toPrepare and Deploy Windows Server 2016 Active Directory Federation Services for Windows Hello for Business | identity, PIN, biometric, Hello, passport | w10 | deploy | library | security, mobile | DaniHalfin | high | daniha | 09/08/2017 |
Prepare and Deploy Windows Server 2016 Active Directory Federation Services
Applies to
- Windows 10
This guide only applies to Windows 10, version 1703 or higher.
Windows Hello for Business works exclusively with the Active Directory Federation Service role included with Windows Server 2016 and requires an additional server update. The on-prem certificate trust deployment uses Active Directory Federation Services roles for key registration, device registration, and as a certificate registration authority.
The following guidance describes deploying a new instance of Active Directory Federation Services 2016 using the Windows Information Database as the configuration database, which is ideal for environments with no more than 30 federation servers and no more than 100 relying party trusts.
If your environment exceeds either of these factors or needs to provide SAML artifact resolution, token replay detection, or needs Active Directory Federation Services to operate in a federated provider role, then your deployment needs to use a SQL for your configuration database. To deploy the Active Directory Federation Services using SQL as its configuration database, please review the Deploying a Federation Server Farm checklist.
If your environment has an existing instance of Active Directory Federation Services, then you’ll need to upgrade all nodes in the farm to Windows Server 2016 along with the Windows Server 2016 update. If your environment uses Windows Internal Database (WID) for the configuration database, please read Upgrading to AD FS in Windows Server 2016 using a WID database to upgrade your environment. If your environment uses SQL for the configuration database, please read Upgrading to AD FS in Windows Server 2016 with SQL Server to upgrade your environment.
Ensure you apply the Windows Server 2016 Update to all nodes in the farm after you have successfully completed the upgrade.
A new Active Directory Federation Services farm should have a minimum of two federation servers for proper load balancing, which can be accomplished with an external networking peripherals, or with using the Network Load Balancing Role included in Windows Server.
Prepare the Active Directory Federation Services deployment by installing and updating two Windows Server 2016 Servers. Ensure the update listed below is applied to each server before continuing.
Update Windows Server 2016
Sign-in the federation server with local admin equivalent credentials.
- Ensure Windows Server 2016 is current by running Windows Update from Settings. Continue this process until no further updates are needed. If you’re not using Windows Update for updates, please advise the Windows Server 2016 update history page to make sure you have the latest updates available installed.
- Ensure the latest server updates to the federation server includes KB4034658 (14393.1593).
Important
The above referenced updates are mandatory for Windows Hello for Business all on-premises deployment and hybrid certificate trust deployments for domain joined computers.
Enroll for a TLS Server Authentication Certificate
Windows Hello for Business on-prem deployments require a federation server for device registration, key registration, and authentication certificate enrollment. Typically, a federation service is an edge facing role. However, the federation services and instance used with the on-prem deployment of Windows Hello for Business does not need Internet connectivity.
The AD FS role needs a server authentication certificate for the federation services, but you can use a certificate issued by your enterprise (internal) certificate authority. The server authentication certificate should have the following names included in the certificate if you are requesting an individual certificate for each node in the federation farm:
- Subject Name: The internal FQDN of the federation server (the name of the computer running AD FS)
- Subject Alternate Name: Your federation service name, such as fs.corp.contoso.com (or an appropriate wildcard entry such as *.corp.contoso.com)
You configure your federation service name when you configure the AD FS role. You can choose any name, but that name must be different than the name of the server or host. For example, you can name the host server adfs and the federation service fs. The FQDN of the host is adfs.corp.contoso.com and the FQDN of the federation service is fs.corp.contoso.com.
You can; however, issue one certificate for all hosts in the farm. If you chose this option, then leave the subject name blank, and include all the names in the subject alternate name when creating the certificate request. All names should include the FQDN of each host in the farm and the federation service name.
It’s recommended that you mark the private key as exportable so that the same certificate can be deployed across each federation server and web application proxy within your AD FS farm. Note that the certificate must be trusted (chain to a trusted root CA). Once you have successfully requested and enrolled the server authentication certificate on one node, you can export the certificate and private key to a PFX file using the Certificate Manager console. You can then import the certificate on the remaining nodes in the AD FS farm.
Be sure to enroll or import the certificate into the AD FS server’s computer certificate store. Also, ensure all nodes in the farm have the proper TLS server authentication certificate.
Internal Server Authentication Certificate Enrollment
Sign-in the federation server with domain admin equivalent credentials.
- Start the Local Computer Certificate Manager (certlm.msc).
- Expand the Personal node in the navigation pane.
- Right-click Personal. Select All Tasks and Request New Certificate.
- Click Next on the Before You Begin page.
- Click Next on the Select Certificate Enrollment Policy page.
- On the Request Certificates page, Select the Internal Web Server check box.
- Click the More information is required to enroll for this certificate. Click here to configure settings link
- Under Subject name, select Common Name from the Type list. Type the FQDN of the computer hosting the Active Directory Federation Services role and then click Add. Under Alternative name, select DNS from the Type list. Type the FQDN of the name you will use for your federation services (fs.corp.contoso.com). The name you use here MUST match the name you use when configuring the Active Directory Federation Services server role. Click Add. Click OK when finished.
- Click Enroll.
A server authentication certificate should appear in the computer’s Personal certificate store.
Deploy the Active Directory Federation Service Role
The Active Directory Federation Service (AD FS) role provides the following services to support Windows Hello for Business on-premises deployments.
- Device registration
- Key registration
- Certificate registration authority (certificate trust deployments)
Important
Finish the entire AD FS configuration on the first server in the farm before adding the second server to the AD FS farm. Once complete, the second server receives the configuration through the shared configuration database when it is added the AD FS farm.
Windows Hello for Business depends on proper device registration. For on-premises deployments, Windows Server 2016 AD FS handles device registration.
Sign-in the federation server with Enterprise Admin equivalent credentials.
- Start Server Manager. Click Local Server in the navigation pane.
- Click Manage and then click Add Roles and Features.
- Click Next on the Before you begin page.
- On the Select installation type page, select Role-based or feature-based installation and click Next.
- On the Select destination server page, choose Select a server from the server pool. Select the federation server from the Server Pool list. Click Next.
- On the Select server roles page, select Active Directory Federation Services. Click Next.
- Click Next on the Select features page.
- Click Next on the Active Directory Federation Service page.
- Click Install to start the role installation.
Review
Before you continue with the deployment, validate your deployment progress by reviewing the following items:
- Confirm the AD FS farm uses the correct database configuration.
- Confirm the AD FS farm has an adequate number of nodes and is properly load balanced for the anticipated load.
- Confirm all AD FS servers in the farm have the latest updates.
- Confirm all AD FS servers have a valid server authentication certificate
- The subject of the certificate is the common name (FQDN) of the host or a wildcard name.
- The alternate name of the certificate contains a wildcard or the FQDN of the federation service
Device Registration Service Account Prerequisite
The service account used for the device registration server depends on the domain controllers in the environment.
Note
Follow the procedures below based on the domain controllers deployed in your environment. If the domain controller is not listed below, then it is not supported for Windows Hello for Business.
Windows Server 2012 or later Domain Controllers
Windows Server 2012 or later domain controllers support Group Managed Service Accounts—the preferred way to deploy service accounts for services that support them. Group Managed Service Accounts, or GMSA have security advantages over normal user accounts because Windows handles password management. This means the password is long, complex, and changes periodically. The best part of GMSA is all this happens automatically. AD FS supports GMSA and should be configured using them for additional defense in depth security.
GSMA uses the Microsoft Key Distribution Service that is located on Windows Server 2012 or later domain controllers. Windows uses the Microsoft Key Distribution Service to protect secrets stored and used by the GSMA. Before you can create a GSMA, you must first create a root key for the service. You can skip this if your environment already uses GSMA.
Create KDS Root Key
Sign-in a domain controller with Enterprise Admin equivalent credentials.
- Start an elevated Windows PowerShell console.
- Type
Add-KdsRootKey -EffectiveTime (Get-Date).AddHours(-10)
Windows Server 2008 or 2008 R2 Domain Controllers
Windows Server 2008 and 2008 R2 domain controllers do not host the Microsoft Key Distribution Service, nor do they support Group Managed Service Accounts. Therefore, you must use create a normal user account as a service account where you are responsible for changing the password on a regular basis.
Create an AD FS Service Account
Sign-in a domain controller or management workstation with Domain Admin equivalent credentials.
- Open Active Directory Users and Computers.
- Right-click the Users container, Click New. Click User.
- In the New Object – User window, type adfssvc in the Full name text box. Type adfssvc in the User logon name text box. Click Next.
- Enter and confirm a password for the adfssvc user. Clear the User must change password at next logon checkbox.
- Click Next and then click Finish.
Configure the Active Directory Federation Service Role
Important
Follow the procedures below based on the domain controllers deployed in your environment. If the domain controller is not listed below, then it is not supported for Windows Hello for Business.
Windows Server 2012 or later Domain Controllers
Use the following procedures to configure AD FS when your environment uses Windows Server 2012 or later Domain Controllers. If you are not using Windows Server 2012 or later Domain Controllers, follow the procedures under the Configure the Active Directory Federation Service Role (Windows Server 2008 or 2008R2 Domain Controllers) section.
Sign-in the federation server with Domain Admin equivalent credentials. These procedures assume you are configuring the first federation server in a federation server farm.
-
Start Server Manager.
-
Click the notification flag in the upper right corner. Click Configure federation services on this server.
-
On the Welcome page, click Create the first federation server farm and click Next.
-
Click Next on the Connect to Active Directory Domain Services page.
-
On the Specify Service Properties page, select the recently enrolled or imported certificate from the SSL Certificate list. The certificate is likely named after your federation service, such as fs.corp.contoso.com or fs.contoso.com.
-
Select the federation service name from the Federation Service Name list.
-
Type the Federation Service Display Name in the text box. This is the name users see when signing in. Click Next.
-
On the Specify Service Account page, select Create a Group Managed Service Account. In the Account Name box, type adfssvc.
-
On the Specify Configuration Database page, select Create a database on this server using Windows Internal Database and click Next.
-
On the Review Options page, click Next.
-
On the Pre-requisite Checks page, click Configure.
-
When the process completes, click Close.
Windows Server 2008 or 2008 R2 Domain Controllers
Use the following procedures to configure AD FS when your environment uses Windows Server 2008 or 2008 R2 Domain Controllers. If you are not using Windows Server 2008 or 2008 R2 Domain Controllers, follow the procedures under the Configure the Active Directory Federation Service Role (Windows Server 2012 or later Domain Controllers) section.
Sign-in the federation server with Domain Admin equivalent credentials. These instructions assume you are configuring the first federation server in a federation server farm.
-
Start Server Manager.
-
Click the notification flag in the upper right corner. Click Configure federation services on this server.
-
On the Welcome page, click Create the first federation server farm and click Next.
-
Click Next on the Connect to Active Directory Domain Services page.
-
On the Specify Service Properties page, select the recently enrolled or imported certificate from the SSL Certificate list. The certificate is likely named after your federation service, such as fs.corp.mstepdemo.net or fs.mstepdemo.net.
-
Select the federation service name from the Federation Service Name list.
-
Type the Federation Service Display Name in the text box. This is the name users see when signing in. Click Next.
-
On the Specify Service Account page, Select Use an existing domain user account or group Managed Service Account and click Select.
- In the Select User or Service Account dialog box, type the name of the previously created AD FS service account (example adfssvc) and click OK. Type the password for the AD FS service account and click Next.
-
On the Specify Configuration Database page, select Create a database on this server using Windows Internal Database and click Next.
-
On the Review Options page, click Next.
-
On the Pre-requisite Checks page, click Configure.
-
When the process completes, click Close.
-
Do not restart the AD FS server. You will do this later.
Add the AD FS Service account to the KeyCredential Admin group and the Windows Hello for Business Users group
The KeyCredential Admins global group provides the AD FS service with the permissions needed to perform key registration. The Windows Hello for Business group provides the AD FS service with the permissions needed to enroll a Windows Hello for Business authentication certificate on behalf of the provisioning user.
Sign-in a domain controller or management workstation with Domain Admin equivalent credentials.
- Open Active Directory Users and Computers.
- Click the Users container in the navigation pane.
- Right-click KeyCredential Admins in the details pane and click Properties.
- Click the Members tab and click Add…
- In the Enter the object names to select text box, type adfssvc. Click OK.
- Click OK to return to Active Directory Users and Computers.
- Right-click Windows Hello for Business Users group
- Click the Members tab and click Add…
- In the Enter the object names to select text box, type adfssvc. Click OK.
- Click OK to return to Active Directory Users and Computers.
- Change to server hosting the AD FS role and restart it.
Configure Permissions for Key Registration
Key Registration stores the Windows Hello for Business public key in Active Directory. In on-prem deployments, the Windows Server 2016 AD FS server registers the public key with the on-premises Active Directory.
The key-trust model needs Windows Server 2016 domain controllers, which configures the key registration permissions automatically; however, the certificate-trust model does not and requires you to add the permissions manually.
Sign-in a domain controller or management workstations with Domain Admin equivalent credentials.
- Open Active Directory Users and Computers.
- Right-click your domain name from the navigation pane and click Properties.
- Click Security (if the Security tab is missing, turn on Advanced Features from the View menu).
- Click Advanced. Click Add. Click Select a principal.
- The Select User, Computer, Service Account, or Group dialog box appears. In the Enter the object name to select text box, type KeyCredential Admins. Click OK.
- In the Applies to list box, select Descendant User objects.
- Using the scroll bar, scroll to the bottom of the page and click Clear all.
- In the Properties section, select Read msDS-KeyCredentialLink and Write msDS-KeyCrendentialLink.
- Click OK three times to complete the task.
Configure the Device Registration Service
Sign-in the federation server with Enterprise Admin equivalent credentials. These instructions assume you are configuring the first federation server in a federation server farm.
- Open the AD FS management console.
- In the navigation pane, expand Service. Click Device Registration.
- In the details pane, click Configure Device Registration.
- In the Configure Device Registration dialog, click OK.
Review
Before you continue with the deployment, validate your deployment progress by reviewing the following items:
- Confirm you followed the correct procedures based on the domain controllers used in your deployment
- Windows Server 2012 or Windows Server 2012 R2
- Windows Server 2008 or Windows Server 2008 R2
- Confirm you have the correct service account based on your domain controller version.
- Confirm you properly installed the AD FS role on your Windows Server 2016 based on the proper sizing of your federation, the number of relying parties, and database needs.
- Confirm you used a certificate with the correct names as the server authentication certificate
- Record the expiration date of the certificate and set a renewal reminder at least six weeks before it expires that includes the:
- Certificate serial number
- Certificate thumbprint
- Common name of the certificate
- Subject alternate name of the certificate
- Name of the physical host server
- The issued date
- The expiration date
- Issuing CA Vendor (if a third-party certificate)
- Record the expiration date of the certificate and set a renewal reminder at least six weeks before it expires that includes the:
- Confirm you granted the AD FS service allow read and write permissions to the ms-DSKeyCredentialLink Active Directory attribute.
- Confirm you enabled the Device Registration service.
Prepare and Deploy AD FS Registration Authority
A registration authority is a trusted authority that validates certificate request. Once it validates the request, it presents the request to the certificate authority for issuance. The certificate authority issues the certificate, returns it to the registration authority, which returns the certificate to the requesting user. The Windows Hello for Business on-prem certificate-based deployment uses the Active Directory Federation Server (AD FS) as the certificate registration authority.
Configure Registration Authority template
The certificate registration authority enrolls for an enrollment agent certificate. Once the registration authority verifies the certificate request, it signs the certificate request using its enrollment agent certificate and sends it to the certificate authority. The Windows Hello for Business Authentication certificate template is configured to only issue certificates to certificate requests that have been signed with an enrollment agent certificate. The certificate authority only issues a certificate for that template if the registration authority signs the certificate request.
The registration authority template you configure depends on the AD FS service configuration, which depends on the domain controllers the environment uses for authentication.
Important
Follow the procedures below based on the domain controllers deployed in your environment. If the domain controller is not listed below, then it is not supported for Windows Hello for Business.
Windows 2012 or later domain controllers
Sign-in a certificate authority or management workstations with Domain Admin equivalent credentials.
-
Open the Certificate Authority Management console.
-
Right-click Certificate Templates and click Manage.
-
In the Certificate Template Console, right click on the Exchange Enrollment Agent (Offline request) template details pane and click Duplicate Template.
-
On the Compatibility tab, clear the Show resulting changes check box. Select Windows Server 2012 or Windows Server 2012 R2 from the Certification Authority list. Select Windows Server 2012 or Windows Server 2012 R2 from the Certification Recipient list.
-
On the General tab, type WHFB Enrollment Agent in Template display name. Adjust the validity and renewal period to meet your enterprise’s needs.
-
On the Subject tab, select the Supply in the request button if it is not already selected.
Note: The preceding step is very important. Group Managed Service Accounts (GMSA) do not support the Build from this Active Directory information option and will result in the AD FS server failing to enroll the enrollment agent certificate. You must configure the certificate template with Supply in the request to ensure that AD FS servers can perform the automatic enrollment and renewal of the enrollment agent certificate. -
On the Cryptography tab, select Key Storage Provider from the Provider Category list. Select RSA from the Algorithm name list. Type 2048 in the Minimum key size text box. Select SHA256 from the Request hash list.
-
On the Security tab, click Add.
-
Click Object Types. Select the Service Accounts check box and click OK.
-
Type adfssvc in the Enter the object names to select text box and click OK.
-
Click the adfssvc from the Group or users names list. In the Permissions for adfssvc section, In the Permissions for adfssvc section, select the Allow check box for the Enroll permission. Excluding the adfssvc user, clear the Allow check box for the Enroll and Autoenroll permissions for all other items in the Group or users names list if the check boxes are not already cleared. Click OK.
-
Close the console.
Windows 2008 or 2008R2 domain controllers
Sign-in a certificate authority or management workstations with Domain Admin equivalent credentials.
- Open the Certificate Authority management console.
- Right-click Certificate Templates and click Manage.
- In the Certificate Template console, right-click the Exchange Enrollment Agent template in the details pane and click Duplicate Template.
- On the Compatibility tab, clear the Show resulting changes check box. Select Windows Server 2012 or Windows Server 2012 R2 from the Certification Authority list. Select Windows Server 2012 or Windows Server 2012 R2 from the Certification Recipient list.
- On the General tab, type WHFB Enrollment Agent in Template display name. Adjust the validity and renewal period to meet your enterprise’s needs.
- On the Subject tab, select the Build from this Active Directory information button if it is not already selected. Select Fully distinguished name from the Subject name format list if Fully distinguished name is not already selected. Select the User Principal Name (UPN) check box under Include this information in alternative subject name.
- On the Cryptography tab, select Key Storage Provider from the Provider Category list. Select RSA from the Algorithm name list. Type 2048 in the Minimum key size text box. Select SHA256 from the Request hash list.
- On the Security tab, click Add. Type adfssvc in the Enter the object names to select text box and click OK.
- Click the adfssvc from the Group or users names list. In the Permissions for adfssvc section, select the Allow check box for the Enroll permission. Excluding the adfssvc user, clear the Allow check boxes for the Enroll and Autoenroll permissions for all other items in the Group or users names list if the check boxes are not already cleared. Click OK.
- Close the console.
Configure the Windows Hello for Business Authentication Certificate template
During Windows Hello for Business provisioning, the Windows 10, version 1703 client requests an authentication certificate from the Active Directory Federation Service, which requests the authentication certificate on behalf of the user. This task configures the Windows Hello for Business authentication certificate template. You use the name of the certificate template when configuring.
Sign-in a certificate authority or management workstations with Domain Admin equivalent credentials.
- Open the Certificate Authority management console.
- Right-click Certificate Templates and click Manage.
- Right-click the Smartcard Logon template and choose Duplicate Template.
- On the Compatibility tab, clear the Show resulting changes check box. Select Windows Server 2012 or Windows Server 2012 R2 from the Certification Authority list. Select Windows Server 2012 or Windows Server 2012 R2 from the Certification Recipient list.
- On the General tab, type WHFB Authentication in Template display name. Adjust the validity and renewal period to meet your enterprise’s needs.
Note: If you use different template names, you’ll need to remember and substitute these names in different portions of the deployment. - On the Cryptography tab, select Key Storage Provider from the Provider Category list. Select RSA from the Algorithm name list. Type 2048 in the Minimum key size text box. Select SHA256 from the Request hash list.
- On the Extensions tab, verify the Application Policies extension includes Smart Card Logon.
- On the Issuance Requirements tab, select the This number of authorized signatures check box. Type 1 in the text box.
- Select Application policy from the Policy type required in signature. Select Certificate Request Agent from in the Application policy list. Select the Valid existing certificate option.
- On the Subject tab, select the Build from this Active Directory information button if it is not already selected. Select Fully distinguished name from the Subject name format list if Fully distinguished name is not already selected. Select the User Principal Name (UPN) check box under Include this information in alternative subject name.
- On the Request Handling tab, select the Renew with same key check box.
- On the Security tab, click Add. Type Window Hello for Business Users in the Enter the object names to select text box and click OK.
- Click the Windows Hello for Business Users from the Group or users names list. In the Permissions for Windows Hello for Business Users section, select the Allow check box for the Enroll permission. Excluding the Windows Hello for Business Users group, clear the Allow check box for the Enroll and Autoenroll permissions for all other entries in the Group or users names section if the check boxes are not already cleared. Click OK.
- If you previously issued Windows Hello for Business sign-in certificates using Configuration Manger and are switching to an AD FS registration authority, then on the Superseded Templates tab, add the previously used Windows Hello for Business Authentication template(s), so they will be superseded by this template for the users that have Enroll permission for this template.
- Click on the Apply to save changes and close the console.
Mark the template as the Windows Hello Sign-in template
Sign-in to an AD FS Windows Server 2016 computer with Enterprise Admin equivalent credentials.
- Open an elevated command prompt.
- Run
certutil –dsTemplate WHFBAuthentication msPKI-Private-Key-Flag +CTPRIVATEKEY_FLAG_HELLO_LOGON_KEY
Note
If you gave your Windows Hello for Business Authentication certificate template a different name, then replace WHFBAuthentication in the above command with the name of your certificate template. It’s important that you use the template name rather than the template display name. You can view the template name on the General tab of the certificate template using the Certificate Template management console (certtmpl.msc). Or, you can view the template name using the Get-CATemplate ADCS Administration Windows PowerShell cmdlet on our Windows Server 2012 or later certificate authority.
Publish Enrollment Agent and Windows Hello For Business Authentication templates to the Certificate Authority
Sign-in a certificate authority or management workstations with Enterprise Admin equivalent credentials.
- Open the Certificate Authority management console.
- Expand the parent node from the navigation pane.
- Click Certificate Templates in the navigation pane.
- Right-click the Certificate Templates node. Click New, and click Certificate Template to issue.
- In the Enable Certificates Templates window, select the WHFB Enrollment Agent template you created in the previous steps. Click OK to publish the selected certificate templates to the certificate authority.
- Publish the WHFB Authentication certificate template using step 5.
- Close the console.
Configure the Registration Authority
Sign-in the AD FS server with Domain Admin equivalent credentials.
-
Open a Windows PowerShell prompt.
-
Type the following command
Set-AdfsCertificateAuthority -EnrollmentAgent -EnrollmentAgentCertificateTemplate WHFBEnrollmentAgent -WindowsHelloCertificateTemplate WHFBAuthentication
The Set-AdfsCertificateAuthority
cmdlet may show the following warning:
WARNING: PS0343: Issuing Windows Hello certificates requires enabling a permitted strong authentication provider, but no usable providers are currently configured. These authentication providers are not supported for Windows Hello certificates: CertificateAuthentication,MicrosoftPassportAuthentication. Windows Hello certificates will not be issued until a permitted strong authentication provider is configured.
This warning indicates that you have not configured multi-factor authentication in AD FS and until it is configured, the AD FS server will not issue Windows Hello certificates. Windows 10, version 1703 clients check this configuration during prerequisite checks. If detected, the prerequisite check will not succeed and the user will not provision Windows Hello for Business on sign-in.
Note
If you gave your Windows Hello for Business Enrollment Agent and Windows Hello for Business Authentication certificate templates different names, then replace WHFBEnrollmentAgent and WHFBAuthentication in the above command with the name of your certificate templates. It’s important that you use the template name rather than the template display name. You can view the template name on the General tab of the certificate template using the Certificate Template management console (certtmpl.msc). Or, you can view the template name using the Get-CATemplate ADCS Administration Windows PowerShell cmdlet on a Windows Server 2012 or later certificate authority.
Enrollment Agent Certificate Enrollment
Active Directory Federation Server used for Windows Hello for Business certificate enrollment perform their own certificate lifecycle management. Once the registration authority is configured with the proper certificate template, the AD FS server attempts to enroll the certificate on the first certificate request or when the service first starts.
Approximately 60 days prior to enrollment agent certificate’s expiration, the AD FS service attempts to renew the certificate until it is successful. If the certificate fails to renew, and the certificate expires, the AD FS server will request a new enrollment agent certificate. You can view the AD FS event logs to determine the status of the enrollment agent certificate.
Additional Federation Servers
Organizations should deploy more than one federation server in their federation farm for high-availability. You should have a minimum of two federation services in your AD FS farm, however most organizations are likely to have more. This largely depends on the number of devices and users using the services provided by the AD FS farm.
Server Authentication Certificate
Each server you add to the AD FS farm must have a proper server authentication certificate. Refer to the Enroll for a TLS Server Authentication Certificate section of this document to determine the requirements for your server authentication certificate. As previously stated, AD FS servers used exclusively for on-premises deployments of Windows Hello for Business can use enterprise server authentication certificates rather than server authentication certificates issued by public certificate authorities.
Install Additional Servers
Adding federation servers to the existing AD FS farm begins with ensuring the server are fully patched, to include Windows Server 2016 Update needed to support Windows Hello for Business deployments (https://aka.ms/whfbadfs1703). Next, install the Active Directory Federation Service role on the additional servers and then configure the server as an additional server in an existing farm.
Load Balance AD FS Federation Servers
Many environments load balance using hardware devices. Environments without hardware load-balancing capabilities can take advantage the network load-balancing feature included in Windows Server to load balance the AD FS servers in the federation farm. Install the Windows Network Load Balancing feature on all nodes participating in the AD FS farm that should be load balanced.
Install Network Load Balancing Feature on AD FS Servers
Sign-in the federation server with Enterprise Admin equivalent credentials.
- Start Server Manager. Click Local Server in the navigation pane.
- Click Manage and then click Add Roles and Features.
- Click Next On the Before you begin page.
- On the Select installation type page, select Role-based or feature-based installation and click Next.
- On the Select destination server page, chosoe Select a server from the server pool. Select the federation server from the Server Pool list. Click Next.
- On the Select server roles page, click Next.
- Select Network Load Balancing on the Select features page.
- Click Install to start the feature installation
Configure Network Load Balancing for AD FS
Before you can load balance all the nodes in the AD FS farm, you must first create a new load balance cluster. Once you have created the cluster, then you can add new nodes to that cluster.
Sign-in a node of the federation farm with Admin equivalent credentials.
- Open Network Load Balancing Manager from Administrative Tools.
- Right-click Network Load Balancing Clusters, and then click New Cluster.
- To connect to the host that is to be a part of the new cluster, in the Host text box, type the name of the host, and then click Connect.
- Select the interface that you want to use with the cluster, and then click Next. (The interface hosts the virtual IP address and receives the client traffic to load balance.)
- In Host Parameters, select a value in Priority (Unique host identifier). This parameter specifies a unique ID for each host. The host with the lowest numerical priority among the current members of the cluster handles all of the cluster's network traffic that is not covered by a port rule. Click Next.
- In Cluster IP Addresses, click Add and type the cluster IP address that is shared by every host in the cluster. NLB adds this IP address to the TCP/IP stack on the selected interface of all hosts that are chosen to be part of the cluster. Click Next.
- In Cluster Parameters, select values in IP Address and Subnet mask (for IPv6 addresses, a subnet mask value is not needed). Type the full Internet name that users will use to access this NLB cluster.
- In Cluster operation mode, click Unicast to specify that a unicast media access control (MAC) address should be used for cluster operations. In unicast mode, the MAC address of the cluster is assigned to the network adapter of the computer, and the built-in MAC address of the network adapter is not used. We recommend that you accept the unicast default settings. Click Next.
- In Port Rules, click Edit to modify the default port rules to use port 443.
Additional AD FS Servers
- To add more hosts to the cluster, right-click the new cluster, and then click Add Host to Cluster.
- Configure the host parameters (including host priority, dedicated IP addresses, and load weight) for the additional hosts by following the same instructions that you used to configure the initial host. Because you are adding hosts to an already configured cluster, all the cluster-wide parameters remain the same.
Configure DNS for Device Registration
Sign-in the domain controller or administrative workstation with Domain Admin equivalent credentials. You’ll need the Federation service name to complete this task. You can view the federation service name by clicking Edit Federation Service Properties from the Action pan of the AD FS management console, or by using (Get-AdfsProperties).Hostname.
(PowerShell) on the AD FS server.
- Open the DNS Management console.
- In the navigation pane, expand the domain controller name node and Forward Lookup Zones.
- In the navigation pane, select the node that has the name of your internal Active Directory domain name.
- In the navigation pane, right-click the domain name node and click New Host (A or AAAA).
- In the name box, type the name of the federation service. In the IP address box, type the IP address of your federation server. Click Add Host.
- Close the DNS Management console
Configure the Intranet Zone to include the federation service
The Windows Hello provisioning presents web pages from the federation service. Configuring the intranet zone to include the federation service enables the user to authenticate to the federation service using integrated authentication. Without this setting, the connection to the federation service during Windows Hello provisioning prompts the user for authentication.
Create an Intranet Zone Group Policy
Sign-in the domain controller or administrative workstation with Domain Admin equivalent credentials
- Start the Group Policy Management Console (gpmc.msc)
- Expand the domain and select the Group Policy Object node in the navigation pane.
- Right-click Group Policy object and select New
- Type Intranet Zone Settings in the name box and click OK.
- In the content pane, right-click the Intranet Zone Settings Group Policy object and click Edit.
- In the navigation pane, expand Policies under Computer Configuration.
- Expand Administrative Templates > Windows Component > Internet Explorer > Internet Control Panel, and select Security Page.
- In the content pane, double-click Site to Zone Assignment List. Click Enable.
- Click Show. In the Value Name column, type the url of the federation service beginning with https. In the Value column, type the number 1. Click OK twice, then close the Group Policy Management Editor.
Deploy the Intranet Zone Group Policy object
- Start the Group Policy Management Console (gpmc.msc)
- In the navigation pane, expand the domain and right-click the node that has your Active Directory domain name and click Link an existing GPO…
- In the Select GPO dialog box, select Intranet Zone Settings or the name of the Windows Hello for Business Group Policy object you previously created and click OK.
Review
Before you continue with the deployment, validate your deployment progress by reviewing the following items:
- Confirm you configured the correct enrollment agent certificate template based on the type of AD FS service account.
- Confirm only the AD FS service account has the allow enroll permission for the enrollment agent certificate template.
- Consider using an HSM to protect the enrollment agent certificate; however, understand the frequency and quantity of signature operations the enrollment agent server makes and understand the impact it has on overall performance.
- Confirm you properly configured the Windows Hello for Business authentication certificate template—to include:
- Issuance requirements of an authorized signature from a certificate request agent.
- The certificate template was properly marked as a Windows Hello for Business certificate template using certutil.exe
- The Windows Hello for Business Users group, or equivalent has the allow enroll and allow auto enroll permissions
- Confirm all certificate templates were properly published to the appropriate issuing certificate authorities.
- Confirm the AD FS service account has the allow enroll permission for the Windows Hello Business authentication certificate template.
- Confirm the AD FS certificate registration authority is properly configured using the
Get-AdfsCertificateAuthority
Windows PowerShell cmdlet. - Confirm you restarted the AD FS service.
- Confirm you properly configured load-balancing (hardware or software).
- Confirm you created a DNS A Record for the federation service and the IP address used is the load-balanced IP address
- Confirm you created and deployed the Intranet Zone settings to prevent double authentication to the federation server.
Validating your work
You need to verify the AD FS service has properly enrolled for an enrollment agent certificate template. You can verify this is a variety ways, depending on if your service account is a normal user account or if the service account is a group managed service account.
Event Logs
Use the event logs on the AD FS service to confirm the service account enrolled for an enrollment agent certificate. First, look for the AD FS event ID 443 that confirms certificate enrollment cycle has finished. Once confirmed the AD FS certificate enrollment cycle completed review the CertificateLifecycle-User event log. In this event log, look for event ID 1006, which indicates a new certificate was installed. Details of the event log should show
- The account name under which the certificate was enrolled.
- The action, which should read enroll.
- The thumbprint of the certificate
- The certificate template used to issue the certificate.
Normal Service Account
When using a normal service account, use the Microsoft Management Console (mmc.exe) and load the Certificate Manager snap-in for the service account and verify.
Group Managed Service Account
You cannot use the Certificate Manager to view enrolled certificates for group managed service accounts. Use the event log information to confirm the AD FS service account enrolled a certificate. Use certutil.exe to view the details of the certificate now shown in the event log.
Group managed service accounts use user profiles to store user information, which included enrolled certificates. On the AD FS server, use a command prompt and navigate to %systemdrive%\users\<adfsGMSA_name>\appdata\roaming\Microsoft\systemcertificates\my\certificates
.
Each file in this folder represents a certificate in the service account’s Personal store (You may need to use DIR /A to view the files in the folder). Match the thumbprint of the certificate from the event log to one of the files in this folder. That file is the certificate. Use the Certutil -q <certificateThumbprintFileName>
to view the basic information about the certificate.
For detailed information about the certificate, use Certutil -q -v <certificateThumbprintFileName>
.
Follow the Windows Hello for Business on premises certificate trust deployment guide
- Validate Active Directory prerequisites
- Validate and Configure Public Key Infrastructure
- Prepare and Deploy Windows Server 2016 Active Directory Federation Services (You are here)
- Validate and Deploy Multifactor Authentication Services (MFA)
- Configure Windows Hello for Business Policy settings