Jump to content

Windows Hello for Business Hybrid Cloud Kerberos Trust is now available!


Recommended Posts

Guest Sayali_Kale
Posted

We are excited to announce the general availability of hybrid cloud Kerberos trust, a new Windows Hello for Business deployment model that enables a passwordless sign-in experience. With this new model, we've made Windows Hello for Business much easier to deploy than the existing key trust and certificate trust deployment models by removing the need for maintaining complicated public key infrastructure (PKI) and Azure Active Directory (Azure AD) Connect synchronization wait times.

 

Why passwordless and Windows Hello for Business?

 

 

A password is a knowledge-based secret used to verify the identity of a user. It is one of the oldest security mechanisms in the world of the internet. Bret Arsenault, our Chief Information Security Officer (CISO) here at Microsoft, likes to say, "Hackers don't break in, they log in."" Passwords are a primary attack vector across enterprise and consumer accounts. Bad actors use social engineering, phishing, and spray attacks to compromise passwords. Hence, it is best to eliminate passwords and replace them with the stronger passwordless authentication method.

 

Windows Hello for Business is a modern, strong, two-factor authentication method that is a more secure alternative to passwords and has been a native feature of the Windows operating system since Windows 10. It uses key-based or certificate-based authentication and at least two unique factors: something the user knows (PIN) or something the user is (biometrics), combined with something they have (physical access to their device). Taken together, Windows Hello for Business offers secure, convenient single sign-on to the device and cloud services.

 

Why hybrid cloud Kerberos trust?

 

 

This trust model enables you to deploy Windows Hello for Business using the infrastructure already introduced for supporting security key sign-in on Hybrid Azure AD-joined devices and on-premises resource access on Azure AD joined devices. Hybrid cloud Kerberos trust reduces any additional deployment requirements. This deployment is for hybrid and Azure AD joined enterprises who do not want to issue end-user certificates and have deployed 2016 domain controllers in each site to support authentication. It is simpler to deploy than key trust and does not require Active Directory Certificate Services.

 

How does it work?

 

 

Hybrid cloud Kerberos trust uses Azure AD Kerberos to address the complications of the key trust deployment model. Here is how it works in a simplified manner:

 

579x442vv2.png.2467f63e6eed90b3ca3aca4402b887f6.png

 

  1. The users sign in to Windows with Windows Hello for Business by authenticating with Azure AD.
  2. Azure AD checks for a Kerberos server key matching user's on-premises AD domain and generates a partial Kerberos ticket granting ticket (TGT) for on-premises domain. The partial TGT contains the user security identifier (SID) only and no authorization data, such as groups.
  3. The partial TGT is returned to the client along with Azure AD Primary Refresh Token (PRT).
  4. Client contacts on-premises AD domain controller and exchanges the partial TGT for a full TGT. This is the same protocol flow used today for Read Only Domain Controller scenarios.
  5. Client has the Azure AD PRT and a full Active Directory TGT.

 

Essentially, we now can obtain a partial TGT from Azure AD, and subsequently exchange that for a full TGT in Active Directory. Because of this crucial piece, we no longer need to wait for Azure AD Connect to inform AD of the user's public key. Users will authenticate directly with Azure AD with instant access to on-premises resources.

 

Moving to passwordless authentication

 

 

We recommend moving your organization to a passwordless authentication model to help protect your employees from password attacks, such as phishing. Windows Hello for Business is available by default on Windows 11 devices and hybrid cloud Kerberos trust deployment is the simplest deployment model, as it offers:

 

  • No PKI requirements
  • No Azure AD Connect synchronization dependency for writing back the public keys to Active Directory
  • No device write-back requirement (only applicable for certificate trust deployments)
  • No Active Directory Federation Services (AD FS) deployment requirement (only applicable for certificate trust deployments)

 

Organizations can take advantage of this Windows Hello for Business deployment model and deploy passwordless credentials with minimal additional setup or infrastructure. Hybrid cloud Kerberos trust is the new recommended method of deployment when certificates are not needed, replacing the key trust method as the default recommendation.

 

Ready to check out this new model and deploy Windows Hello for Business in a hybrid scenario more easily? See our documentation on Hybrid cloud Kerberos trust deployment.

 

Continue reading...

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...