Skip to content

TechDirectArchive

Hands-on IT, Cloud, Security & DevOps Insights

  • Home
  • About
  • Advertise With US
  • Reviews
  • Contact
  • Toggle search form
Home » Windows Server » WHFB Hybrid Cloud Kerberos Trust Model is now available
  • ddedw
    You require permission from trustedinstaller: How to delete or rename files protected by Trusted Installer Network | Monitoring
  • WindowsCoreSecurity
    How to enable Smart App Control on Windows 11 Security | Vulnerability Scans and Assessment
  • HyperV 2
    Fix no disks suitable for the cluster were found Windows Server
  • cookies9
    How to remove third-party cookies from Microsoft Edge Windows
  • PersonalHow to Create Symbolic Links in Linux
    All You Need to Know About Symbolic Links in Linux Linux
  • Azure Local New Policy fix
    How to Resolve New WDAC Policy Issues in Azure Stack Virtualization
  • VHDX resizing and veeam back
    Hyper V Disk allocation: Why Veeam reports full size after Shrinking Windows Server
  • NTUSER Files in Windows
    What Is the NTUSER.DAT File in Windows? Windows

WHFB Hybrid Cloud Kerberos Trust Model is now available

Posted on 17/10/202222/11/2023 Christian By Christian No Comments on WHFB Hybrid Cloud Kerberos Trust Model is now available
Windows Hello for Business: WHFB Hybrid Cloud Kerberos Trust Model

Windows Hello for Business (WHFB) is a modern two-factor authentication that replaces password authentication on devices. It uses key-based or certificate-based authentication and at least two unique factors “something the user knows (PIN) or something the user is (biometrics), combined with something they have (physical access to their device)”. WHFB offers secure, convenient single sign-on to the device and cloud services. With this being said, the WHFB key meets Azure AD multi-factor authentication (MFA) requirements and reduces the number of MFA prompts users will get when accessing resources.

Kindly refer to these related guides: The Local Administrators Account lockout is now available, Unable to install Azure AD Connect, TLS 1.2 is required: How to enable or disable TLS 1.2 on a Windows Server via the Registry and PowerShell, Repair or Uninstall Azure AD Connect: How to uninstall Azure AD Connect, and how to synchronize your on-premises AD with Azure Active Directory using the Azure AD Connect tool.

Authentication on Windows

Microsoft is committed to its vision of a world without passwords and they have acknowledged the satisfaction “the convenience PIN” has provided. Regardless, it still uses a password for authentication. Microsoft recommends that customers using Windows 10 and convenience PINs should move to Windows Hello for Business.

Microsoft will be deprecating convenience PINs in the future and will publish the date early to ensure customers have adequate lead time to deploy Windows Hello for Business.

In Windows and other operating systems, one method for authenticating a user’s identity is to use a secret passphrase or password. Microsoft recommends using secure multi-factor authentication such as Smart Card, FIDO, and Windows Hello for Business.

For the various deployment models, please see the following guide “WHFB Prerequisites: All you need to know before deploying Windows Hello for Business“, and how to enable Azure Single Sign-On: Sign-in issues, non-routable domain, invalid username, and password for SSO solved.

Why WHFB hybrid cloud Kerberos trust?

The WHFB Hybrid Cloud Kerberos Trust Model offers easier deployment compared to existing key and certificate trust models. It achieves this by eliminating the need to maintain complex public key infrastructure (PKI) and by reducing Azure Active Directory (Azure AD) Connect synchronization wait times.

Windows 11 devices comes with Windows Hello for Business. The easiest deployment is the WHFB hybrid cloud Kerberos trust model, which provides:

  • No PKI requirements
  • No Azure AD Connect synchronization dependency for writing back the public keys to Active Directory
  • No device write-back requirement (only applicable for certificate trust deployments)
  • No Active Directory Federation Services (AD FS) deployment requirement (only applicable for certificate trust deployments)

Hybrid Windows Hello for Business deployment needs an Azure Active Directory subscription. Different Azure subscriptions support different deployment configurations.

How does it work?

The WHFB Hybrid Cloud Kerberos trust uses Azure AD Kerberos to address the impediment of the key trust deployment model. Below is an architecture of this model.

Hybrid cloud Kerberos trust

Below are the steps describing how this Trust model works. This authentication consists of a new type of user credential. It is tied to a device and will utilize biometrics or PINs for authentication.

Windows Hello for Business lets the user authenticate to an Active Directory or Azure Active Directory account.

  1. The users sign in to Windows with Windows Hello for Business by authenticating with Azure AD.
  2. Azure AD checks for a Kerberos server key matching user’s on-premises AD domain. Then it generates a partial Kerberos ticket-granting ticket (TGT) for the on-premises domain. The partial TGT contains the user security identifier (SID) only and no authorization data, such as groups.
  3. The client receives the partial TGT along with the Azure AD Primary Refresh Token (PRT).
  4. The client contacts the on-premises AD domain controller and exchanges the partial TGT for a full TGT. We utilized this protocol flow earlier for Read Only Domain Controller scenarios.
  5. The client has the Azure AD PRT and a full Active Directory TGT.

With the above-mentioned steps, you will be able to obtain a partial TGT from Azure AD, and subsequently, exchange that for a full TGT in Active Directory.

Because of this crucial piece, we no longer need to wait for Azure AD Connect to inform AD of the user’s public key. Users will authenticate directly with Azure AD with instant access to on-premises resources

I hope you found this blog post helpful. Please let me know in the comment session if you have any questions.

Rate this post

Thank you for reading this post. Kindly share it with others.

  • Share on X (Opens in new window) X
  • Share on Reddit (Opens in new window) Reddit
  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Facebook (Opens in new window) Facebook
  • Share on Pinterest (Opens in new window) Pinterest
  • Share on Tumblr (Opens in new window) Tumblr
  • Share on Telegram (Opens in new window) Telegram
  • Share on WhatsApp (Opens in new window) WhatsApp
  • Share on Pocket (Opens in new window) Pocket
  • Share on Mastodon (Opens in new window) Mastodon
  • Share on Bluesky (Opens in new window) Bluesky
  • Share on Threads (Opens in new window) Threads
  • Share on Nextdoor (Opens in new window) Nextdoor
AWS/Azure/OpenShift, Windows Server Tags:Active Directory, Active Directory Domain Services, Azure, Microsoft Windows, Windows Server 2016

Post navigation

Previous Post: Configure Local Administrators Account lockout
Next Post: An error has occurred in the script on this page: HTA applications report a Script error after upgrading to ADK for Windows 11, version 22H2

Related Posts

  • BitLocker removal on Windows Server
    How to correctly disable BitLocker on Windows Server Windows Server
  • domain14 1
    How To Configure a Domain Password Policy Windows
  • Update Wampserver
    How to update WampServer to Latest Version Web Server
  • windows 10 creators update wallpaper 1
    How to locate and edit the host file on Windows Windows Server
  • fghj
    MDT deployment failed and Stuck at Command Prompt: Windows installation does not proceed via PXE boot Windows Server
  • defdfd
    The password has expired, update your password and try again AWS/Azure/OpenShift

More Related Articles

BitLocker removal on Windows Server How to correctly disable BitLocker on Windows Server Windows Server
domain14 1 How To Configure a Domain Password Policy Windows
Update Wampserver How to update WampServer to Latest Version Web Server
windows 10 creators update wallpaper 1 How to locate and edit the host file on Windows Windows Server
fghj MDT deployment failed and Stuck at Command Prompt: Windows installation does not proceed via PXE boot Windows Server
defdfd The password has expired, update your password and try again AWS/Azure/OpenShift

Leave a Reply Cancel reply

You must be logged in to post a comment.

Microsoft MVP

VEEAMLEGEND

vexpert-badge-stars-5

Virtual Background

GoogleNews

Categories

veeaam100

sysadmin top30a

  • ddedw
    You require permission from trustedinstaller: How to delete or rename files protected by Trusted Installer Network | Monitoring
  • WindowsCoreSecurity
    How to enable Smart App Control on Windows 11 Security | Vulnerability Scans and Assessment
  • HyperV 2
    Fix no disks suitable for the cluster were found Windows Server
  • cookies9
    How to remove third-party cookies from Microsoft Edge Windows
  • PersonalHow to Create Symbolic Links in Linux
    All You Need to Know About Symbolic Links in Linux Linux
  • Azure Local New Policy fix
    How to Resolve New WDAC Policy Issues in Azure Stack Virtualization
  • VHDX resizing and veeam back
    Hyper V Disk allocation: Why Veeam reports full size after Shrinking Windows Server
  • NTUSER Files in Windows
    What Is the NTUSER.DAT File in Windows? Windows

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,832 other subscribers
  • RSS - Posts
  • RSS - Comments
  • About
  • Authors
  • Write for us
  • Advertise with us
  • General Terms and Conditions
  • Privacy policy
  • Feedly
  • Telegram
  • Youtube
  • Facebook
  • Instagram
  • LinkedIn
  • Tumblr
  • Pinterest
  • Twitter
  • mastodon

Tags

AWS Azure Bitlocker Microsoft Windows PowerShell WDS Windows 10 Windows 11 Windows Deployment Services Windows Server 2016

Copyright © 2025 TechDirectArchive

 

Loading Comments...
 

You must be logged in to post a comment.