Skip to content

TechDirectArchive

Hands-on IT, Cloud, Security & DevOps Insights

  • Home
  • About
  • Advertise With US
  • Reviews
  • Contact
  • Toggle search form
Home » Windows Server » WHFB Hybrid Cloud Kerberos Trust Model is now available

WHFB Hybrid Cloud Kerberos Trust Model is now available

Posted on 17/10/202222/11/2023 Christian By Christian No Comments on WHFB Hybrid Cloud Kerberos Trust Model is now available
Windows Hello for Business: WHFB Hybrid Cloud Kerberos Trust Model

Windows Hello for Business (WHFB) is a modern two-factor authentication that replaces password authentication on devices. It uses key-based or certificate-based authentication and at least two unique factors “something the user knows (PIN) or something the user is (biometrics), combined with something they have (physical access to their device)”. WHFB offers secure, convenient single sign-on to the device and cloud services. With this being said, the WHFB key meets Azure AD multi-factor authentication (MFA) requirements and reduces the number of MFA prompts users will get when accessing resources.

Kindly refer to these related guides: The Local Administrators Account lockout is now available, Unable to install Azure AD Connect, TLS 1.2 is required: How to enable or disable TLS 1.2 on a Windows Server via the Registry and PowerShell, Repair or Uninstall Azure AD Connect: How to uninstall Azure AD Connect, and how to synchronize your on-premises AD with Azure Active Directory using the Azure AD Connect tool.

Authentication on Windows

Microsoft is committed to its vision of a world without passwords and they have acknowledged the satisfaction “the convenience PIN” has provided. Regardless, it still uses a password for authentication. Microsoft recommends that customers using Windows 10 and convenience PINs should move to Windows Hello for Business.

Microsoft will be deprecating convenience PINs in the future and will publish the date early to ensure customers have adequate lead time to deploy Windows Hello for Business.

In Windows and other operating systems, one method for authenticating a user’s identity is to use a secret passphrase or password. Microsoft recommends using secure multi-factor authentication such as Smart Card, FIDO, and Windows Hello for Business.

For the various deployment models, please see the following guide “WHFB Prerequisites: All you need to know before deploying Windows Hello for Business“, and how to enable Azure Single Sign-On: Sign-in issues, non-routable domain, invalid username, and password for SSO solved.

Why WHFB hybrid cloud Kerberos trust?

The WHFB Hybrid Cloud Kerberos Trust Model offers easier deployment compared to existing key and certificate trust models. It achieves this by eliminating the need to maintain complex public key infrastructure (PKI) and by reducing Azure Active Directory (Azure AD) Connect synchronization wait times.

Windows 11 devices comes with Windows Hello for Business. The easiest deployment is the WHFB hybrid cloud Kerberos trust model, which provides:

  • No PKI requirements
  • No Azure AD Connect synchronization dependency for writing back the public keys to Active Directory
  • No device write-back requirement (only applicable for certificate trust deployments)
  • No Active Directory Federation Services (AD FS) deployment requirement (only applicable for certificate trust deployments)

Hybrid Windows Hello for Business deployment needs an Azure Active Directory subscription. Different Azure subscriptions support different deployment configurations.

How does it work?

The WHFB Hybrid Cloud Kerberos trust uses Azure AD Kerberos to address the impediment of the key trust deployment model. Below is an architecture of this model.

Hybrid cloud Kerberos trust

Below are the steps describing how this Trust model works. This authentication consists of a new type of user credential. It is tied to a device and will utilize biometrics or PINs for authentication.

Windows Hello for Business lets the user authenticate to an Active Directory or Azure Active Directory account.

  1. The users sign in to Windows with Windows Hello for Business by authenticating with Azure AD.
  2. Azure AD checks for a Kerberos server key matching user’s on-premises AD domain. Then it generates a partial Kerberos ticket-granting ticket (TGT) for the on-premises domain. The partial TGT contains the user security identifier (SID) only and no authorization data, such as groups.
  3. The client receives the partial TGT along with the Azure AD Primary Refresh Token (PRT).
  4. The client contacts the on-premises AD domain controller and exchanges the partial TGT for a full TGT. We utilized this protocol flow earlier for Read Only Domain Controller scenarios.
  5. The client has the Azure AD PRT and a full Active Directory TGT.

With the above-mentioned steps, you will be able to obtain a partial TGT from Azure AD, and subsequently, exchange that for a full TGT in Active Directory.

Because of this crucial piece, we no longer need to wait for Azure AD Connect to inform AD of the user’s public key. Users will authenticate directly with Azure AD with instant access to on-premises resources

I hope you found this blog post helpful. Please let me know in the comment session if you have any questions.

Rate this post

Thank you for reading this post. Kindly share it with others.

  • Share on X (Opens in new window) X
  • Share on Reddit (Opens in new window) Reddit
  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Facebook (Opens in new window) Facebook
  • Share on Pinterest (Opens in new window) Pinterest
  • Share on Tumblr (Opens in new window) Tumblr
  • Share on Telegram (Opens in new window) Telegram
  • Share on WhatsApp (Opens in new window) WhatsApp
  • Share on Mastodon (Opens in new window) Mastodon
  • Share on Bluesky (Opens in new window) Bluesky
  • Share on Threads (Opens in new window) Threads
  • Share on Nextdoor (Opens in new window) Nextdoor
AWS/Azure/OpenShift, Windows Server Tags:Active Directory, Active Directory Domain Services, Azure, Microsoft Windows, Windows Server 2016

Post navigation

Previous Post: Configure Local Administrators Account lockout
Next Post: An error has occurred in the script on this page: HTA applications report a Script error after upgrading to ADK for Windows 11, version 22H2

Related Posts

  • GitLab runner update and upgrade
    How to update Gitlab-runners on Windows Windows
  • WDS server unable to start with Error Information 0xFFFFFDF0
    WDS server unable to start with Error Information 0xFFFFFDF0 Windows Server
  • ETWindows
    An Overview of Event Tracing for Windows Windows
  • TamperProtection
    Protect Microsoft Defender Settings with Tamper Protection Security | Vulnerability Scans and Assessment
  • AWS Principals
    MFA on Root Account: Create a User on AWS and Register MFA AWS/Azure/OpenShift
  • reboot computer
    Determine the last boot time of a Windows Server Windows Server

More Related Articles

GitLab runner update and upgrade How to update Gitlab-runners on Windows Windows
WDS server unable to start with Error Information 0xFFFFFDF0 WDS server unable to start with Error Information 0xFFFFFDF0 Windows Server
ETWindows An Overview of Event Tracing for Windows Windows
TamperProtection Protect Microsoft Defender Settings with Tamper Protection Security | Vulnerability Scans and Assessment
AWS Principals MFA on Root Account: Create a User on AWS and Register MFA AWS/Azure/OpenShift
reboot computer Determine the last boot time of a Windows Server Windows Server

Leave a Reply Cancel reply

You must be logged in to post a comment.

Microsoft MVP

VEEAMLEGEND

vexpert-badge-stars-5

Virtual Background

GoogleNews

Categories

veeaam100

sysadmin top30a

  • Slide2 1
    How to deploy WordPress on Azure App Service AWS/Azure/OpenShift
  • Feature image .msixbundle
     How to Bundle MSIX Packages Windows
  • browser
    How to configure a new tab page URL in Microsoft Edge Windows
  • DockerEn
    How to Install and Upgrade Docker Engine From Binaries Containers
  • HyperV copy
    How to convert a VHDX file to a VHD Virtualization
  • How to stay protected on Windows 10 and11 device with Windows Security
    Stay protected on Windows device with Windows Security Security | Vulnerability Scans and Assessment
  • bannerr
    How to Disable Driver Signature Enforcement in Windows 11 Windows
  • image 36
    Keepalive Settings: Understanding keepalive configuration Linux

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,824 other subscribers
  • RSS - Posts
  • RSS - Comments
  • About
  • Authors
  • Write for us
  • Advertise with us
  • General Terms and Conditions
  • Privacy policy
  • Feedly
  • Telegram
  • Youtube
  • Facebook
  • Instagram
  • LinkedIn
  • Tumblr
  • Pinterest
  • Twitter
  • mastodon

Tags

Active Directory AWS Azure Bitlocker Microsoft Windows PowerShell WDS Windows 10 Windows 11 Windows Server 2016

Copyright © 2025 TechDirectArchive

 

Loading Comments...
 

You must be logged in to post a comment.