You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/howto-authentication-passwordless-security-key-on-premises.md
+29Lines changed: 29 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -98,6 +98,7 @@ Run the following steps in each domain and forest in your organization that cont
98
98
1. Open a PowerShell prompt using the Run as administrator option.
99
99
1. Run the following PowerShell commands to create a new Azure AD Kerberos Server object both in your on-premises Active Directory domain and in your Azure Active Directory tenant.
100
100
101
+
### Example 1 prompt for all credentials
101
102
> [!NOTE]
102
103
> Replace `contoso.corp.com` in the following example with your on-premises Active Directory domain name.
103
104
@@ -117,6 +118,7 @@ Run the following steps in each domain and forest in your organization that cont
> If you're working on a domain-joined machine with an account that has domain administrator privileges, you can skip the "-DomainCredential" parameter. If the "-DomainCredential" parameter isn't provided, the current Windows login credential is used to access your on-premises Active Directory Domain Controller.
122
124
@@ -134,6 +136,7 @@ Run the following steps in each domain and forest in your organization that cont
### Example 3 prompt for all credentials using modern authentication
137
140
> [!NOTE]
138
141
> If your organization protects password-based sign-in and enforces modern authentication methods such as multifactor authentication, FIDO2, or smart card technology, you must use the `-UserPrincipalName` parameter with the User Principal Name (UPN) of a global administrator.
139
142
> - Replace `contoso.corp.com` in the following example with your on-premises Active Directory domain name.
@@ -156,6 +159,26 @@ Run the following steps in each domain and forest in your organization that cont
### Example 4 prompt for cloud credentials using modern authentication
163
+
> [!NOTE]
164
+
> If you are working on a domain-joined machine with an account that has domain administrator privileges and your organization protects password-based sign-in and enforces modern authentication methods such as multifactor authentication, FIDO2, or smart card technology, you must use the `-UserPrincipalName` parameter with the User Principal Name (UPN) of a global administrator. And you can skip the "-DomainCredential" parameter.
165
+
> - Replace `contoso.corp.com` in the following example with your on-premises Active Directory domain name.
166
+
> - Replace `[email protected]` in the following example with the UPN of a global administrator.
167
+
168
+
```powershell
169
+
# Specify the on-premises Active Directory domain. A new Azure AD
170
+
# Kerberos Server object will be created in this Active Directory domain.
171
+
$domain = "contoso.corp.com"
172
+
173
+
# Enter a UPN of an Azure Active Directory global administrator
You can view and verify the newly created Azure AD Kerberos Server by using the following command:
@@ -263,6 +286,12 @@ Make sure that enough DCs are patched to respond in time to service your resourc
263
286
> [!NOTE]
264
287
> The `/keylist` switch in the `nltest` command is available in client Windows 10 v2004 and later.
265
288
289
+
### What if I have a CloudTGT but it never gets exchange for a OnPremTGT when I am using Windows Hello for Business Cloud Trust?
290
+
291
+
Make sure that the user you are signed in as, is a member of the groups of users that can use FIDO2 as an authentication method, or enable it for all users.
292
+
293
+
> [!NOTE]
294
+
> Even if you are not explicitly using a security key to sign-in to your device, the underlying technology is dependent on the FIDO2 infrastructure requirements.
266
295
267
296
### Do FIDO2 security keys work in a Windows login with RODC present in the hybrid environment?
0 commit comments