Skip to content

Commit b83778e

Browse files
committed
[AzureAD-Passwordless] Edits and revisions to new on-prem article
1 parent 13defa8 commit b83778e

File tree

1 file changed

+48
-48
lines changed

1 file changed

+48
-48
lines changed

articles/active-directory/authentication/howto-authentication-passwordless-security-key-on-premises.md

Lines changed: 48 additions & 48 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Passwordless security key sign in to on-premises resources (preview) - Azure Active Directory
3-
description: Enable passwordless security key sign-in to on-premises resources (preview)
3+
description: Learn how to enable passwordless security key sign-in to on-premises resources using Azure Active Directory (preview)
44

55
services: active-directory
66
ms.service: active-directory
@@ -15,7 +15,7 @@ ms.reviewer: librown, aakapo
1515

1616
ms.collection: M365-identity-device-management
1717
---
18-
# Enable passwordless security key sign-in to on-premises resources (preview)
18+
# Enable passwordless security key sign-in to on-premises resources with Azure Active Directory (preview)
1919

2020
This document focuses on enabling passwordless authentication to on-premises resources for environments with both **Azure AD joined** and **hybrid Azure AD joined** Windows 10 devices. This functionality provides seamless single sign-on (SSO) to on-premises resources using Microsoft-compatible security keys.
2121

@@ -26,9 +26,9 @@ This document focuses on enabling passwordless authentication to on-premises res
2626

2727
## SSO to on-premises resources using FIDO2 keys
2828

29-
Azure Active Directory (AD) can issue Kerberos Ticket Granting Tickets (TGTs) for one or more of your Active Directory domains. This functionality allows users to sign into Windows with modern credentials like FIDO2 security keys and access traditional Active Directory based resources. Kerberos Service Tickets and authorization will continue to be controlled by your on-premises Active Directory domain controllers.
29+
Azure Active Directory (AD) can issue Kerberos Ticket Granting Tickets (TGTs) for one or more of your Active Directory domains. This functionality allows users to sign into Windows with modern credentials like FIDO2 security keys and access traditional Active Directory based resources. Kerberos Service Tickets and authorization continue to be controlled by your on-premises Active Directory domain controllers.
3030

31-
An Azure AD Kerberos Server object will be created in your on-premises Active Directory and then be securely published to Azure Active Directory. The object is not associated with any physical servers. It is simply a resource that can be used by Azure Active Directory to generate Kerberos Ticket Granting Tickets (TGTs) for your Active Directory Domain.
31+
An Azure AD Kerberos Server object is created in your on-premises Active Directory and then securely published to Azure Active Directory. The object isn't associated with any physical servers. It's simply a resource that can be used by Azure Active Directory to generate Kerberos TGTs for your Active Directory Domain.
3232

3333
![Getting a TGT and PRT from Azure AD and AD DS](./media/howto-authentication-passwordless-on-premises/fido2-tgt-exchange-process.png)
3434

@@ -41,34 +41,34 @@ An Azure AD Kerberos Server object will be created in your on-premises Active Di
4141

4242
## Requirements
4343

44-
Organizations must complete the steps in the article [Enable passwordless security key sign to Windows 10 devices (preview)](howto-authentication-passwordless-security-key.md) before completing the steps in this article.
44+
Organizations must complete the steps to [Enable passwordless security key sign to Windows 10 devices (preview)](howto-authentication-passwordless-security-key.md) before completing the steps in this article.
4545

46-
Organizations must meet the following software requirements.
46+
Organizations must also meet the following software requirements.
4747

48-
- Devices must be running Windows 10 Insider Build 18945 or newer
49-
- Upgrade to the latest version of [Azure AD Connect](../hybrid/how-to-connect-install-roadmap.md#install-azure-ad-connect)
50-
- Fully patched Windows Server 2016/2019 Domain Controllers to handle the on-premises authentication request load.
48+
- Devices must be running Windows 10 Insider Build 18945 or newer.
49+
- You must have upgraded to or installed the latest version of [Azure AD Connect](../hybrid/how-to-connect-install-roadmap.md#install-azure-ad-connect).
50+
- Your Windows Server 2016/2019 Domain Controllers (DCs) must be fully patched and up-to-date to handle the on-premises authentication request load.
5151

5252
### Supported scenarios
5353

54-
- The scenario supports single sign-on (SSO) to both:
55-
- Cloud resources like Office 365 and other SAML enabled applications.
56-
- On-premises resources, and Windows-Integrated authentication to web sites, including web sites and SharePoint sites that require IIS Authentication, and/or resources that use NTLM authentication.
54+
The scenario supports single sign-on (SSO) in both of the following scenarios:
55+
56+
- For cloud resources like Office 365 and other SAML enabled applications.
57+
- For on-premises resources, and Windows-Integrated authentication to web sites. The resources can include web sites and SharePoint sites that require IIS Authentication, and / or resources that use NTLM authentication.
5758

5859
### Unsupported scenarios
5960

60-
The following scenarios are not supported:
61+
The following scenarios aren't supported:
6162

62-
- Windows Server Active Directory Domain Services (AD DS) domain joined (on-premises only devices) deployment **not supported**.
63-
- RDP, VDI, and Citrix scenarios are **not supported** using security key.
64-
- S/MIME is **not supported** using security key.
65-
- "Run as" is **not supported** using security key.
66-
- Log in to a server using security key is **not supported**.
63+
- Windows Server Active Directory Domain Services (AD DS) domain joined (on-premises only devices) deployment.
64+
- RDP, VDI, and Citrix scenarios using a security key.
65+
- S/MIME using a security key.
66+
- "Run as" using a security key.
67+
- Log in to a server using security key.
6768

6869
## Create Kerberos server object
6970

70-
Administrators will use PowerShell tools from their Azure AD Connect server to create an Azure AD Kerberos Server object in their on-premises directory.
71-
You will need to run these steps in each domain and forest in your organization that contain Azure AD users.
71+
Administrators use PowerShell tools from their Azure AD Connect server to create an Azure AD Kerberos Server object in their on-premises directory. Run the following steps in each domain and forest in your organization that contain Azure AD users:
7272

7373
1. Upgrade to the latest version of Azure AD Connect. The instructions assume you have already configured Azure AD Connect to support your hybrid environment.
7474
1. On the Azure AD Connect Server, open an elevated PowerShell prompt, and navigate to `C:\Program Files\Microsoft Azure Active Directory Connect\AzureADKerberos\`
@@ -103,25 +103,25 @@ You can view and verify the newly created Azure AD Kerberos Server using the fol
103103
Get-AzureADKerberosServer -Domain $domain -CloudCredential $cloudCred -DomainCredential $domainCred
104104
```
105105

106-
This command will output the properties of the Azure AD Kerberos Server. You can review the properties to verify that everything is in good order.
106+
This command outputs the properties of the Azure AD Kerberos Server. You can review the properties to verify that everything is in good order.
107107

108108
| Property | Description |
109109
| --- | --- |
110-
| ID | The unique ID of the AD Domain Controller object. This ID is sometimes referred to as it’s "slot" or it’s "branch ID". |
110+
| ID | The unique ID of the AD DS DC object. This ID is sometimes referred to as it’s "slot" or it’s "branch ID". |
111111
| DomainDnsName | The DNS domain name of the Active Directory Domain. |
112-
| ComputerAccount | The computer account object of the Azure AD Kerberos Server object (The DC). |
113-
| UserAccount | The disabled user account object that holds the Azure AD Kerberos Server TGT encryption key. The DN of this account will be: <br> `CN=krbtgt_AzureAD,CN=Users,<Domain-DN>` |
114-
| KeyVersion | The key version of the Azure AD Kerberos Server TGT encryption key. The version is assigned when the key is created. The version is then incremented every time the key is rotated. The increments are based on replication meta-data and will likely be greater than one. For example, the initial KeyVersion could be *192272*. The first time the key is rotated, the version could advance to *212621*. The important thing to verify is that the KeyVersion for the on-premises object and the CloudKeyVersion for the cloud object are the same. |
115-
| KeyUpdatedOn | The date and time that the Azure AD Kerberos Server TGT encryption key was updated/created. |
116-
| KeyUpdatedFrom | The Domain Controller where the Azure AD Kerberos Server TGT encryption key was last updated. |
112+
| ComputerAccount | The computer account object of the Azure AD Kerberos Server object (the DC). |
113+
| UserAccount | The disabled user account object that holds the Azure AD Kerberos Server TGT encryption key. The DN of this account is `CN=krbtgt_AzureAD,CN=Users,<Domain-DN>` |
114+
| KeyVersion | The key version of the Azure AD Kerberos Server TGT encryption key. The version is assigned when the key is created. The version is then incremented every time the key is rotated. The increments are based on replication meta-data and likely greater than one. For example, the initial *KeyVersion* could be *192272*. The first time the key is rotated, the version could advance to *212621*. The important thing to verify is that the *KeyVersion* for the on-premises object and the *CloudKeyVersion* for the cloud object are the same. |
115+
| KeyUpdatedOn | The date and time that the Azure AD Kerberos Server TGT encryption key was updated or created. |
116+
| KeyUpdatedFrom | The DC where the Azure AD Kerberos Server TGT encryption key was last updated. |
117117
| CloudId | The ID from the Azure AD Object. Must match the ID above. |
118-
| CloudDomainDnsName | The DomainDnsName from the Azure AD Object. Must match the DomainDnsName above. |
119-
| CloudKeyVersion | The KeyVersion from the Azure AD Object. Must match the KeyVersion above. |
120-
| CloudKeyUpdatedOn | The KeyUpdatedOn from the Azure AD Object. Must match the KeyUpdatedOn above. |
118+
| CloudDomainDnsName | The *DomainDnsName* from the Azure AD Object. Must match the *DomainDnsName* above. |
119+
| CloudKeyVersion | The *KeyVersion* from the Azure AD Object. Must match the *KeyVersion* above. |
120+
| CloudKeyUpdatedOn | The *KeyUpdatedOn* from the Azure AD Object. Must match the *KeyUpdatedOn* above. |
121121

122122
### Rotating the Azure AD Kerberos Server key
123123

124-
The Azure AD Kerberos Server encryption krbtgt keys should be rotated on a regular basis. It’s recommended you follow the same schedule you use to rotate all other Active Directory Domain Controller krbtgt keys.
124+
The Azure AD Kerberos Server encryption krbtgt keys should be rotated on a regular basis. It’s recommended that you follow the same schedule you use to rotate all other Active Directory Domain Controller krbtgt keys.
125125

126126
> [!WARNING]
127127
> There are other tools that could rotate the krbtgt keys, however, you must use the tools mentioned in this document to rotate the krbtgt keys of your Azure AD Kerberos Server. This ensures the keys are updated in both on-premises AD and Azure AD.
@@ -132,7 +132,7 @@ Set-AzureADKerberosServer -Domain $domain -CloudCredential $cloudCred -DomainCre
132132

133133
### Removing the Azure AD Kerberos Server
134134

135-
If you would like to revert the scenario and remove the Azure AD Kerberos Server from both on-premises Active Directory and Azure Active Directory, run the following command.
135+
If you'd like to revert the scenario and remove the Azure AD Kerberos Server from both on-premises Active Directory and Azure Active Directory, run the following command:
136136

137137
```powerShell
138138
Remove-AzureADKerberosServer -Domain $domain -CloudCredential $cloudCred -DomainCredential $domainCred
@@ -142,31 +142,31 @@ Remove-AzureADKerberosServer -Domain $domain -CloudCredential $cloudCred -Domain
142142

143143
The Azure AD Kerberos server object is represented in Azure AD as a *KerberosDomain* object. Each on-premises Active Directory domain is represented as a single *KerberosDomain* object in Azure AD.
144144

145-
For example, your organization has an Active Directory forest with two domains, `contoso.com` and `fabrikam.com`. If you choose to allow Azure AD to issue Kerberos Ticket Granting Tickets (TGT) for the entire forest, there will be two *KerberosDomain* objects in Azure AD. One *KerberosDomain* object for `contoso.com` and one for `fabrikam.com`. If you have multiple Active Directory forests, you will have one *KerberosDomain* object for each domain in each forest.
145+
For example, your organization has an Active Directory forest with two domains, `contoso.com` and `fabrikam.com`. If you choose to allow Azure AD to issue Kerberos TGTs for the entire forest, there are two *KerberosDomain* objects in Azure AD. One *KerberosDomain* object for `contoso.com`, and one for `fabrikam.com`. If you have multiple Active Directory forests, there is one *KerberosDomain* object for each domain in each forest.
146146

147-
You will need to run the steps in [Create Kerberos server object](#create-kerberos-server-object) in each domain and forest in your organization that contain Azure AD users.
147+
You need to run the steps to [Create Kerberos server object](#create-kerberos-server-object) in each domain and forest in your organization that contain Azure AD users.
148148

149149
## Known behavior
150150

151-
Logon with FIDO will be blocked if your password has expired. The expectation is for user to reset their password before being able to log in using FIDO.
151+
Sign in with FIDO is blocked if your password has expired. The expectation is for user to reset their password before being able to log in using FIDO.
152152

153153
## Troubleshooting and feedback
154154

155-
If you would like to share feedback or encounter issues while previewing this feature, please share via the Windows Feedback Hub app.
155+
If you'd like to share feedback or encounter issues while previewing this feature, share via the Windows Feedback Hub app using the following steps:
156156

157157
1. Launch **Feedback Hub** and make sure you're signed in.
158158
1. Submit feedback under the following categorization:
159-
1. Category: Security and Privacy
160-
1. Subcategory: FIDO
161-
1. To capture logs, use the option: **Recreate my Problem**
159+
- Category: Security and Privacy
160+
- Subcategory: FIDO
161+
1. To capture logs, use the option to **Recreate my Problem**
162162

163163
## Frequently asked questions
164164

165165
### Does this work in my on-premises environment?
166166

167-
This feature does not work for a pure on-premises Active Directory Domain Services (AD DS) environment.
167+
This feature doesn't work for a pure on-premises Active Directory Domain Services (AD DS) environment.
168168

169-
### My organization requires two factor authentication to access resources, what can I do to support this requirement?
169+
### My organization requires two factor authentication to access resources. What can I do to support this requirement?
170170

171171
Security keys come in a variety of form factors. Contact the device manufacturer of interest to discuss how their devices can be enabled with a PIN or biometric as a second factor.
172172

@@ -178,20 +178,20 @@ We are working on this capability for general availability (GA) of this feature.
178178

179179
[FIDO2 security keys](concept-authentication-passwordless.md#fido2-security-keys)
180180

181-
### What do I do if I lose my Security Key?
181+
### What do I do if I lose my security key?
182182

183-
You can remove keys from the Azure portal, by navigating to the security info page and removing the security key.
183+
You can remove keys from the Azure portal by navigating to the **Security info** page and removing the security key.
184184

185-
### Im not able to use FIDO immediately after I create a hybrid Azure AD joined machine
185+
### I'm not able to use FIDO immediately after I create a hybrid Azure AD joined machine
186186

187-
If clean installing a hybrid Azure AD joined machine, post domain join and restart you must sign in with a password and wait for policy to sync before being able to use FIDO to sign in.
187+
If clean installing a hybrid Azure AD joined machine, after the domain join and restart process you must sign in with a password and wait for policy to sync before being able to use FIDO to sign in.
188188

189189
- Check your current status by typing `dsregcmd /status` into a command window and check that both *AzureAdJoined* and *DomainJoined* are showing *YES*.
190-
- This delay is a known limitation for domain joined devices and not FIDO specific.
190+
- This delay is a known limitation for domain joined devices and isn't FIDO-specific.
191191

192-
### Im unable to get SSO to my NTLM network resource after signing in with FIDO and get a credential prompt
192+
### I'm unable to get SSO to my NTLM network resource after signing in with FIDO and get a credential prompt
193193

194-
Make sure enough domain controllers are patched to respond in time to service your resource request. To check if you can see a domain controller that is running the feature, check the output of `nltest /dsgetdc:contoso /keylist /kdc`.
194+
Make sure enough domain controllers are patched to respond in time to service your resource request. To check if you can see a domain controller that is running the feature, review the output of `nltest /dsgetdc:contoso /keylist /kdc`.
195195

196196
## Next steps
197197

0 commit comments

Comments
 (0)