2018-02-01 09:55:37 -08:00

8.8 KiB
Raw Blame History

title, description, keywords, ms.prod, ms.mktglfcycl, ms.sitesec, ms.pagetype, author, ms.author, localizationpriority, ms.date
title description keywords ms.prod ms.mktglfcycl ms.sitesec ms.pagetype author ms.author localizationpriority ms.date
Hybrid Windows Hello for Business Prerequistes (Windows Hello for Business) Prerequisites for Hybrid Windows Hello for Business Deployments identity, PIN, biometric, Hello, passport, WHFB, hybrid, certificate-trust w10 deploy library security, mobile mikestephens-MS mstephen high 11/08/2017

Hybrid Windows Hello for Business Prerequisites

Applies to

  • Windows 10

This guide only applies to Hybrid deployments for Windows 10, version 1703 or higher.

Hybrid environments are distributed systems that enable organizations to use on-premises and Azure-based identities and resources. Windows Hello for Business uses the existing distributed system as a foundation on which organizations can provide two-factor authentication that provides a single sign-in like experience to modern resources.

The distributed systems on which these technologies were built involved several pieces of on-premises and cloud infrastructure. High-level pieces of the infrastructure include:

Directories

Hybrid Windows Hello for Business needs two directories: on-premises Active Directory and a cloud Azure Active Directory. The minimum required domain controller, domain functional level, and forest functional level for Windows Hello for Business deployment is Windows Server 2008 R2.

A hybrid Windows Hello for Busines deployment needs an Azure Active Directory subscription. Different deployment configurations are supported by different Azure subscriptions. The hybrid-certificate trust deployment needs an Azure Active Directory premium subscription because it uses the device write-back synchronization feature. Other deployments, such as the hybrid key-trust deployment, may not require Azure Active Directory premium subscription.

Windows Hello for Business can be deployed in any environment with Windows Server 2008 R2 or later domain controllers. Azure device registration and Windows Hello for Business require the Windows Server 2016 Active Directory schema.

Review these requirements and those from the Windows Hello for Business planning guide and worksheet. Based on your deployment decisions you may need to upgrade your on-premises Active Directory or your Azure Active Directory subscription to meet your needs.

Section Review

[!div class="checklist"]

  • Active Directory Domain Functional Level
  • Active Directory Forest Functional Level
  • Domain Controller version
  • Windows Server 2016 Schema
  • Azure Active Directory subscription
  • Correct subscription for desired features and outcomes

Public Key Infrastructure

The Windows Hello for Business deployment depends on an enterprise public key infrastructure as trust anchor for authentication. Domain controllers for hybrid deployments need a certificate in order for Windows 10 devices to trust the domain controller.

Certificate trust deployments need an enterprise public key infrastructure and a certificate registration authority to issue authentication certificates to users. When using Group Policy, hybrid certificate trust deployment use the Windows Server 2016 Active Directory Federation Server (AS FS) as a certificate registration authority.

The minimum required enterprise certificate authority that can be used with Windows Hello for Business is Windows Server 2012.

Section Review

[!div class="checklist"]

  • Windows Server 2012 Issuing Certificate Authority
  • Windows Server 2016 Active Directory Federation Services

Directory Synchronization

The two directories used in hybrid deployments must be synchronized. You need Azure Active Directory Connect to synchronize user accounts in the on-premises Active Directory with Azure Active Directory.

Organizations using older directory synchronization technology, such as DirSync or Azure AD sync need to upgrade to Azure AD Connect

Section Review

[!div class="checklist"]


Federation

Federating your on-premises Active Directory with Azure Active Directory ensures all identities have access to all resources regardless if they reside in cloud or on-premises. Windows Hello for Business hybrid certificate trust needs Windows Server 2016 Active Directory Federation Services. All nodes in the AD FS farm must run the same version of AD FS. Additionally, you need to configure your AD FS farm to support Azure registered devices.

The AD FS farm used with Windows Hello for Business must be Windows Server 2016 with minimum update of KB4034658 (14393.1593), which is automatically downloaded and installed through Windows Update. If your AD FS farm is not running the AD FS role with updates from Windows Server 2016, then read Upgrading to AD FS in Windows Server 2016

Section Review

[!div class="checklist"]


Multifactor Authentication

Windows Hello for Business is a strong, two-factor credential the helps organizations reduce their dependency on passwords. The provisioning process lets a user enroll in Windows Hello for Business using their username and password as one factor. but needs a second factor of authentication.

Hybrid Windows Hello for Business deployments can use Azures Multifactor Authentication service or they can use multifactor authentication provides by Windows Server 2016 Active Directory Federation Services, which includes an adapter model that enables third parties to integrate their multifactor authentication into AD FS.

Section Review

[!div class="checklist"]

  • Azure MFA Service
  • Windows Server 2016 AD FS and Azure
  • Windows Server 2016 AD FS and third party MFA Adapter

Device Registration

Organizations wanting to deploy hybrid certificate trust need thier domain joined devices to register to Azure Active Directory. Just as a computer has an identity in Active Directory, that same computer has an identity in the cloud. This ensures that only approved computers are used with that Azure Active Directory. Each computer registers its identity in Azure Active Directory.

Hybrid certificate trust deployments need the device write back feature. Authentication to the Windows Server 2016 Active Directory Federation Services needs both the user and the computer to authenticate. Typically the users are synchronized, but not devices. This prevents AD FS from authenticating the computer and results in Windows Hello for Business certificate enrollment failures. For this reason, Windows Hello for Business deployments need device writeback, which is an Azure Active Directory premium feature.

Section Checklist

[!div class="checklist"]

  • Azure Active Directory Device writeback
  • Azure Active Directory Premium subscription

Next Steps

Follow the Windows Hello for Business hybrid certificate trust deployment guide. For proof-of-concepts, labs, and new installations, choose the New Installation Basline.

If your environment is already federated, but does not include Azure device registration, choose Configure Azure Device Registration.

If your environment is already federated and supports Azure device registration, choose Configure Windows Hello for Business settings.

[!div class="op_single_selector"]




Follow the Windows Hello for Business hybrid certificate trust deployment guide

  1. Overview
  2. Prerequistes (You are here)
  3. New Installation Baseline
  4. Configure Azure Device Registration
  5. Configure Windows Hello for Business settings
  6. Sign-in and Provision