Skip to content

TechDirectArchive

Hands-on IT, Cloud, Security & DevOps Insights

  • Home
  • About
  • Advertise With US
  • Reviews
  • Contact
  • Toggle search form
Home » Windows Server » WHFB Hybrid Cloud Kerberos Trust Model is now available

WHFB Hybrid Cloud Kerberos Trust Model is now available

Posted on 17/10/202222/11/2023 Christian By Christian No Comments on WHFB Hybrid Cloud Kerberos Trust Model is now available
Windows Hello for Business: WHFB Hybrid Cloud Kerberos Trust Model

Windows Hello for Business (WHFB) is a modern two-factor authentication that replaces password authentication on devices. It uses key-based or certificate-based authentication and at least two unique factors “something the user knows (PIN) or something the user is (biometrics), combined with something they have (physical access to their device)”. WHFB offers secure, convenient single sign-on to the device and cloud services. With this being said, the WHFB key meets Azure AD multi-factor authentication (MFA) requirements and reduces the number of MFA prompts users will get when accessing resources.

Kindly refer to these related guides: The Local Administrators Account lockout is now available, Unable to install Azure AD Connect, TLS 1.2 is required: How to enable or disable TLS 1.2 on a Windows Server via the Registry and PowerShell, Repair or Uninstall Azure AD Connect: How to uninstall Azure AD Connect, and how to synchronize your on-premises AD with Azure Active Directory using the Azure AD Connect tool.

Authentication on Windows

Microsoft is committed to its vision of a world without passwords and they have acknowledged the satisfaction “the convenience PIN” has provided. Regardless, it still uses a password for authentication. Microsoft recommends that customers using Windows 10 and convenience PINs should move to Windows Hello for Business.

Microsoft will be deprecating convenience PINs in the future and will publish the date early to ensure customers have adequate lead time to deploy Windows Hello for Business.

In Windows and other operating systems, one method for authenticating a user’s identity is to use a secret passphrase or password. Microsoft recommends using secure multi-factor authentication such as Smart Card, FIDO, and Windows Hello for Business.

For the various deployment models, please see the following guide “WHFB Prerequisites: All you need to know before deploying Windows Hello for Business“, and how to enable Azure Single Sign-On: Sign-in issues, non-routable domain, invalid username, and password for SSO solved.

Why WHFB hybrid cloud Kerberos trust?

The WHFB Hybrid Cloud Kerberos Trust Model offers easier deployment compared to existing key and certificate trust models. It achieves this by eliminating the need to maintain complex public key infrastructure (PKI) and by reducing Azure Active Directory (Azure AD) Connect synchronization wait times.

Windows 11 devices comes with Windows Hello for Business. The easiest deployment is the WHFB hybrid cloud Kerberos trust model, which provides:

  • No PKI requirements
  • No Azure AD Connect synchronization dependency for writing back the public keys to Active Directory
  • No device write-back requirement (only applicable for certificate trust deployments)
  • No Active Directory Federation Services (AD FS) deployment requirement (only applicable for certificate trust deployments)

Hybrid Windows Hello for Business deployment needs an Azure Active Directory subscription. Different Azure subscriptions support different deployment configurations.

How does it work?

The WHFB Hybrid Cloud Kerberos trust uses Azure AD Kerberos to address the impediment of the key trust deployment model. Below is an architecture of this model.

Hybrid cloud Kerberos trust

Below are the steps describing how this Trust model works. This authentication consists of a new type of user credential. It is tied to a device and will utilize biometrics or PINs for authentication.

Windows Hello for Business lets the user authenticate to an Active Directory or Azure Active Directory account.

  1. The users sign in to Windows with Windows Hello for Business by authenticating with Azure AD.
  2. Azure AD checks for a Kerberos server key matching user’s on-premises AD domain. Then it generates a partial Kerberos ticket-granting ticket (TGT) for the on-premises domain. The partial TGT contains the user security identifier (SID) only and no authorization data, such as groups.
  3. The client receives the partial TGT along with the Azure AD Primary Refresh Token (PRT).
  4. The client contacts the on-premises AD domain controller and exchanges the partial TGT for a full TGT. We utilized this protocol flow earlier for Read Only Domain Controller scenarios.
  5. The client has the Azure AD PRT and a full Active Directory TGT.

With the above-mentioned steps, you will be able to obtain a partial TGT from Azure AD, and subsequently, exchange that for a full TGT in Active Directory.

Because of this crucial piece, we no longer need to wait for Azure AD Connect to inform AD of the user’s public key. Users will authenticate directly with Azure AD with instant access to on-premises resources

I hope you found this blog post helpful. Please let me know in the comment session if you have any questions.

Rate this post

Thank you for reading this post. Kindly share it with others.

  • Share on X (Opens in new window) X
  • Share on Reddit (Opens in new window) Reddit
  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Facebook (Opens in new window) Facebook
  • Share on Pinterest (Opens in new window) Pinterest
  • Share on Tumblr (Opens in new window) Tumblr
  • Share on Telegram (Opens in new window) Telegram
  • Share on WhatsApp (Opens in new window) WhatsApp
  • Share on Mastodon (Opens in new window) Mastodon
  • Share on Bluesky (Opens in new window) Bluesky
  • Share on Threads (Opens in new window) Threads
  • Share on Nextdoor (Opens in new window) Nextdoor
AWS/Azure/OpenShift, Windows Server Tags:Active Directory, Active Directory Domain Services, Azure, Microsoft Windows, Windows Server 2016

Post navigation

Previous Post: Configure Local Administrators Account lockout
Next Post: An error has occurred in the script on this page: HTA applications report a Script error after upgrading to ADK for Windows 11, version 22H2

Related Posts

  • LAPS PAssword Not Showing Up
    LAPS password not showing up in GUI Windows
  • dns error
    Domain Name System Protocol: Client Registration Issue Windows Server
  • Hyper V VM creation
    How to Create a Windows Server VM on HyperV Windows Server
  • BitLocked suspended and resumed
    Query MBAM-protected Client for non-compliance [Part 2] Windows
  • s3versioning
    Hosting Static Website and Versioning on AWS S3 AWS/Azure/OpenShift
  • WAMPServer Virtual Host
    How to create Virtual Hosts in a WAMPserver Web Server

More Related Articles

LAPS PAssword Not Showing Up LAPS password not showing up in GUI Windows
dns error Domain Name System Protocol: Client Registration Issue Windows Server
Hyper V VM creation How to Create a Windows Server VM on HyperV Windows Server
BitLocked suspended and resumed Query MBAM-protected Client for non-compliance [Part 2] Windows
s3versioning Hosting Static Website and Versioning on AWS S3 AWS/Azure/OpenShift
WAMPServer Virtual Host How to create Virtual Hosts in a WAMPserver Web Server

Leave a Reply Cancel reply

You must be logged in to post a comment.

Microsoft MVP

VEEAMLEGEND

vexpert-badge-stars-5

Virtual Background

GoogleNews

Categories

veeaam100

Veeam Vanguard

  • fgbv
    Export and Import Scheduled Tasks in Windows Windows Server
  • screenshot 2020 03 14 at 10.13.38
    How to Hide the Action Center Taskbar Icon In Windows 10 Windows
  • c
    Action cannot be complete because the computer is open in Wimserv Windows Server
  • windows 10 technical preview windows 10 logo microsoft 97543 1920x1080
    How to Remove the All Apps Option from Windows Start Menu via GPO /Registry Windows
  • M365 Password Reset
    How to reset Microsoft 365 User Password AWS/Azure/OpenShift
  • Keb
    How to configure a service account for Kerberos delegation Windows Server
  • Screenshot 2020 05 14 at 19.43.13
    Repo: How to setup Chef Repository Configuration Management Tool
  • 1 pUEZd8z  1p 7ICIO1NZFA
    The package python-virtualenv has no installation candidate error Linux

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,817 other subscribers
  • RSS - Posts
  • RSS - Comments
  • About
  • Authors
  • Write for us
  • Advertise with us
  • General Terms and Conditions
  • Privacy policy
  • Feedly
  • Telegram
  • Youtube
  • Facebook
  • Instagram
  • LinkedIn
  • Tumblr
  • Pinterest
  • Twitter
  • mastodon

Tags

Active Directory Azure Bitlocker Microsoft Windows PowerShell WDS Windows 10 Windows 11 Windows Deployment Services Windows Server 2016

Copyright © 2025 TechDirectArchive

 

Loading Comments...
 

You must be logged in to post a comment.