Skip to content

Commit d68c72e

Browse files
authored
Merge pull request #127892 from MicrosoftDocs/master
8/31 PM Publish
2 parents 3fb5e77 + 08826fd commit d68c72e

File tree

230 files changed

+5973
-2106
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

230 files changed

+5973
-2106
lines changed

.openpublishing.redirection.json

Lines changed: 22 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -8733,6 +8733,11 @@
87338733
"redirect_url": "/azure/application-gateway/overview#whats-new",
87348734
"redirect_document_id": false
87358735
},
8736+
{
8737+
"source_path": "articles/web-application-firewall/ag/whats-new.md",
8738+
"redirect_url": "/azure/web-application-firewall/ag/ag-overview#whats-new",
8739+
"redirect_document_id": false
8740+
},
87368741
{
87378742
"source_path": "articles/application-insights/app-insights-azure-diagnostics.md",
87388743
"redirect_url": "/azure/azure-monitor/platform/diagnostics-extension-to-application-insights",
@@ -23474,7 +23479,7 @@
2347423479
"redirect_document_id": true
2347523480
},
2347623481
{
23477-
"source_path": "articles/active-directory/fundamentals/concept-continuous-access-evaluation.md",
23482+
"source_path": "articles/active-directory/fundamentals/concept-fundamentals-continuous-access-evaluation.md",
2347823483
"redirect_url": "/azure/active-directory/conditional-access/concept-continuous-access-evaluation",
2347923484
"redirect_document_id": true
2348023485
},
@@ -32453,6 +32458,11 @@
3245332458
"redirect_url": "/azure/governance/management-groups/overview",
3245432459
"redirect_document_id": false
3245532460
},
32461+
{
32462+
"source_path": "articles/governance/management-groups/create.md",
32463+
"redirect_url": "/azure/governance/management-groups/create-management-group-portal",
32464+
"redirect_document_id": false
32465+
},
3245632466
{
3245732467
"source_path": "articles/active-directory/active-directory-saas-facebook-at-work-provisioning-tutorial.md",
3245832468
"redirect_url": "/azure/active-directory/active-directory-saas-workplacebyfacebook-provisioning-tutorial",
@@ -37362,16 +37372,6 @@
3736237372
"redirect_url": "/azure/active-directory/manage-apps/access-panel-manage-self-service-access",
3736337373
"redirect_document_id": false
3736437374
},
37365-
{
37366-
"source_path": "articles/active-directory/application-access-panel-unexpected-application-appears.md",
37367-
"redirect_url": "/azure/active-directory/manage-apps/access-panel-troubleshoot-unexpected-application",
37368-
"redirect_document_id": false
37369-
},
37370-
{
37371-
"source_path": "articles/active-directory/application-access-panel-unexpected-application-not-appearing.md",
37372-
"redirect_url": "/azure/active-directory/manage-apps/access-panel-troubleshoot-application-not-appearing",
37373-
"redirect_document_id": false
37374-
},
3737537375
{
3737637376
"source_path": "articles/active-directory/application-access-panel-web-sign-in-problem.md",
3737737377
"redirect_url": "/azure/active-directory/manage-apps/application-sign-in-other-problem-access-panel",
@@ -37600,7 +37600,17 @@
3760037600
{
3760137601
"source_path": "articles/active-directory/application-sign-in-other-problem-access-panel.md",
3760237602
"redirect_url": "/azure/active-directory/manage-apps/application-sign-in-other-problem-access-panel",
37603-
"redirect_document_id": true
37603+
"redirect_document_id": false
37604+
},
37605+
{
37606+
"source_path": "articles/active-directory/manage-apps/access-panel-troubleshoot-application-not-appearing.md",
37607+
"redirect_url": "/azure/active-directory/manage-apps/application-sign-in-other-problem-access-panel",
37608+
"redirect_document_id": false
37609+
},
37610+
{
37611+
"source_path": "articles/active-directory/manage-apps/access-panel-troubleshoot-unexpected-application.md",
37612+
"redirect_url": "/azure/active-directory/manage-apps/application-sign-in-other-problem-access-panel",
37613+
"redirect_document_id": false
3760437614
},
3760537615
{
3760637616
"source_path": "articles/active-directory/application-sign-in-other-problem-deeplink.md",

articles/active-directory/authentication/TOC.yml

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -116,6 +116,10 @@
116116
href: howto-authentication-passwordless-security-key-windows.md
117117
- name: SSO to on-premises resources
118118
href: howto-authentication-passwordless-security-key-on-premises.md
119+
- name: Hybrid FAQs
120+
href: howto-authentication-passwordless-faqs.md
121+
- name: Troubleshoot hybrid
122+
href: howto-authentication-passwordless-troubleshoot.md
119123
- name: Passwordless phone sign-in
120124
href: howto-authentication-passwordless-phone.md
121125
- name: Windows Hello for Business
@@ -209,7 +213,7 @@
209213
href: howto-mfa-nps-extension-errors.md
210214
- name: Troubleshoot
211215
items:
212-
- name: Troubleshoot SSPR
216+
- name: SSPR
213217
href: active-directory-passwords-troubleshoot.md
214218
- name: SSPR FAQ
215219
href: active-directory-passwords-faq.md

articles/active-directory/authentication/concept-authentication-passwordless.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -112,6 +112,8 @@ A security key **MUST** implement the following features and extensions from the
112112
| 3 | hmac-secret | This extension ensures you can sign in to your device when it's off-line or in airplane mode. |
113113
| 4 | Multiple accounts per RP | This feature ensures you can use the same security key across multiple services like Microsoft Account and Azure Active Directory. |
114114

115+
### FIDO2 security key providers
116+
115117
The following providers offer FIDO2 security keys of different form factors that are known to be compatible with the passwordless experience. We encourage you to evaluate the security properties of these keys by contacting the vendor as well as FIDO Alliance.
116118

117119
| Provider | Contact |
Lines changed: 246 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,246 @@
1+
---
2+
title: FAQs for hybrid FIDO2 security key deployment - Azure Active Directory
3+
description: Learn about some frequently asked questions for passwordless hybrid FIDO2 security key sign-in using Azure Active Directory (preview)
4+
5+
services: active-directory
6+
ms.service: active-directory
7+
ms.subservice: authentication
8+
ms.topic: troubleshooting
9+
ms.date: 08/19/2020
10+
11+
ms.author: iainfou
12+
author: iainfoulds
13+
manager: daveba
14+
ms.reviewer: aakapo
15+
16+
ms.collection: M365-identity-device-management
17+
---
18+
# Deployment frequently asked questions (FAQs) for hybrid FIDO2 security keys in Azure AD (preview)
19+
20+
This article covers deployment frequently asked questions (FAQs) for hybrid Azure AD joined devices and passwordless sign-in to on-prem resources. With this passwordless feature, you can enable Azure AD authentication on Windows 10 devices for hybrid Azure AD joined devices using FIDO2 security keys. Users can sign into Windows on their devices with modern credentials like FIDO2 keys and access traditional Active Directory Domain Services (AD DS) based resources with a seamless single sign-on (SSO) experience to their on-prem resources.
21+
22+
The following scenarios for users in a hybrid environment are supported:
23+
24+
* Sign in to hybrid Azure AD joined devices using FIDO2 security keys and get SSO access to on-prem resources.
25+
* Sign in to Azure AD joined devices using FIDO2 security keys and get SSO access to on-prem resources.
26+
27+
To get started with FIDO2 security keys and hybrid access to on-premises resources, see the following articles:
28+
29+
* [Passwordless FIDO2 security keys](howto-authentication-passwordless-security-key.md)
30+
* [Passwordless Windows 10](howto-authentication-passwordless-security-key-windows.md)
31+
* [Passwordless on-premises](howto-authentication-passwordless-security-key-on-premises.md)
32+
33+
> [!NOTE]
34+
> FIDO2 security keys are a public preview feature of Azure Active Directory. For more information about previews, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
35+
36+
## Security keys
37+
38+
* [My organization requires two factor authentication to access resources. What can I do to support this requirement?](#my-organization-requires-multi-factor-authentication-to-access-resources-what-can-i-do-to-support-this-requirement)
39+
* [Where can I find compliant FIDO2 security keys?](#where-can-i-find-compliant-fido2-security-keys)
40+
* [What do I do if I lose my security key?](#what-if-i-lose-my-security-key)
41+
* [How is the data protected on the FIDO2 security key?](#how-is-the-data-protected-on-the-fido2-security-key)
42+
* [How does the registering of FIDO2 security keys work?](#how-does-the-registering-of-fido2-security-keys-work)
43+
* [Is there a way for admins to provision the keys for the users directly?](#is-there-a-way-for-admins-to-provision-the-keys-for-the-users-directly)
44+
45+
### My organization requires multi-factor authentication to access resources. What can I do to support this requirement?
46+
47+
FIDO2 Security keys come in a variety of form factors. Contact the device manufacturer of interest to discuss how their devices can be enabled with a PIN or biometric as a second factor. For a list of supported providers, see [FIDO2 security keys providers](concept-authentication-passwordless.md#fido2-security-key-providers).
48+
49+
### Where can I find compliant FIDO2 security keys?
50+
51+
For a list of supported providers, see [FIDO2 security keys providers](concept-authentication-passwordless.md#fido2-security-key-providers).
52+
53+
### What if I lose my security key?
54+
55+
You can remove keys in the Azure portal by navigating to the **Security info** page and removing the FIDO2 security key.
56+
57+
### How is the data protected on the FIDO2 security key?
58+
59+
FIDO2 security keys have secure enclaves that protect the private keys stored on them. A FIDO2 security key also has anti-hammering properties built into it, like in Windows Hello, where you can't extract the private key.
60+
61+
### How does the registering of FIDO2 security keys work?
62+
63+
For more information how to register and use FIDO2 security keys, see [Enable passwordless security key sign-in](howto-authentication-passwordless-security-key.md).
64+
65+
### Is there a way for admins to provision the keys for the users directly?
66+
67+
No, not at this time.
68+
69+
## Prerequisites
70+
71+
* [Does this feature work if there's no internet connectivity?](#does-this-feature-work-if-theres-no-internet-connectivity)
72+
* [What are the specific end points that are required to be open to Azure AD?](#what-are-the-specific-end-points-that-are-required-to-be-open-to-azure-ad)
73+
* [How do I identify the domain join type (Azure AD joined or hybrid Azure AD joined) for my Windows 10 device?](#how-do-i-identify-the-domain-join-type-azure-ad-joined-or-hybrid-azure-ad-joined-for-my-windows-10-device)
74+
* [What's the recommendation on the number of DCs that should be patched?](#whats-the-recommendation-on-the-number-of-dcs-that-should-be-patched)
75+
* [Can I deploy the FIDO2 credential provider on an on-premises only device?](#can-i-deploy-the-fido2-credential-provider-on-an-on-premises-only-device)
76+
* [FIDO2 security key sign-in isn't working for my Domain Admin or other high privilege accounts. Why?](#fido2-security-key-sign-in-isnt-working-for-my-domain-admin-or-other-high-privilege-accounts-why)
77+
78+
### Does this feature work if there's no internet connectivity?
79+
80+
Internet connectivity is a pre-requisite to enable this feature. The first time a user signs in using FIDO2 security keys, they must have internet connectivity. For subsequent sign-in events, cached sign-in should work and let the user authenticate without internet connectivity.
81+
82+
For a consistent experience, make sure that devices have internet access and line of sight to DCs.
83+
84+
### What are the specific end points that are required to be open to Azure AD?
85+
86+
The following endpoints are needed for registration and authentication:
87+
88+
* **.microsoftonline.com*
89+
* **.microsoftonline-p.com*
90+
* **.msauth.net*
91+
* **.msauthimages.net*
92+
* **.msecnd.net*
93+
* **.msftauth.net*
94+
* **.msftauthimages.net*
95+
* **.phonefactor.net*
96+
* *enterpriseregistration.windows.net*
97+
* *management.azure.com*
98+
* *policykeyservice.dc.ad.msft.net*
99+
* *secure.aadcdn.microsoftonline-p.com*
100+
101+
For a full list of endpoints needed to use Microsoft online products, see [Office 365 URLs and IP address ranges](/microsoft-365/enterprise/urls-and-ip-address-ranges).
102+
103+
### How do I identify the domain join type (Azure AD joined or hybrid Azure AD joined) for my Windows 10 device?
104+
105+
To check if the Windows 10 client device has the right domain join type, use the following command:
106+
107+
```console
108+
Dsregcmd/status
109+
```
110+
111+
The following sample output shows that the device is Azure AD joined as *AzureADJoined* is set to *YES*:
112+
113+
```output
114+
+---------------------+
115+
| Device State |
116+
+---------------------+
117+
118+
AzureADJoined: YES
119+
EnterpriseJoined: NO
120+
DomainedJoined: NO
121+
```
122+
123+
The following sample output shows that the device is hybrid Azure AD joined as *DomainedJoined* is also set to *YES*. The *DomainName* is also shown:
124+
125+
```output
126+
+---------------------+
127+
| Device State |
128+
+---------------------+
129+
130+
AzureADJoined: YES
131+
EnterpriseJoined: NO
132+
DomainedJoined: YES
133+
DomainName: CONTOSO
134+
```
135+
136+
On a Windows Server 2016 or 2019 domain controller, check that the following patches are applied. If needed, run Windows Update to install them:
137+
138+
* Windows Server 2016 - [KB4534307](https://support.microsoft.com/help/4534307/windows-10-update-kb4534307)
139+
* Windows Server 2019 - [KB4534321](https://support.microsoft.com/help/4534321/windows-10-update-kb4534321)
140+
141+
From a client device, run the following command to verify connectivity to an appropriate domain controller with the patches installed:
142+
143+
```console
144+
nltest /dsgetdc:<domain> /keylist /kdc
145+
```
146+
147+
### What's the recommendation on the number of DCs that should be patched?
148+
149+
We recommend patching a majority of your Windows Server 2016 or 2019 domain controllers with the patch to ensure they can handle the authentication request load of your organization.
150+
151+
On a Windows Server 2016 or 2019 domain controller, check that the following patches are applied. If needed, run Windows Update to install them:
152+
153+
* Windows Server 2016 - [KB4534307](https://support.microsoft.com/help/4534307/windows-10-update-kb4534307)
154+
* Windows Server 2019 - [KB4534321](https://support.microsoft.com/help/4534321/windows-10-update-kb4534321)
155+
156+
### Can I deploy the FIDO2 credential provider on an on-premises only device?
157+
158+
No, this feature isn't supported for on-premise only device. The FIDO2 credential provider wouldn't show up.
159+
160+
### FIDO2 security key sign-in isn't working for my Domain Admin or other high privilege accounts. Why?
161+
162+
The default security policy doesn't grant Azure AD permission to sign high privilege accounts on to on-premises resources.
163+
164+
To unblock the accounts, use **Active Directory Users and Computers** to modify the *msDS-NeverRevealGroup* property of the *Azure AD Kerberos Computer object (CN=AzureADKerberos,OU=Domain Controllers,\<domain-DN>)*.
165+
166+
## Under the hood
167+
168+
* [How is Azure AD Kerberos linked to my on-premises Active Directory Domain Services environment?](#how-is-azure-ad-kerberos-linked-to-my-on-premises-active-directory-domain-services-environment)
169+
* [Where can I view these Kerberos server objects that are created in AD and published in Azure AD?](#where-can-i-view-these-kerberos-server-objects-that-are-created-in-ad-ds-and-published-in-azure-ad)
170+
* [Why can't we have the public key registered to on-premises AD DS so there is no dependency on the internet?](#why-cant-we-have-the-public-key-registered-to-on-premises-ad-ds-so-there-is-no-dependency-on-the-internet)
171+
* [How are the keys rotated on the Kerberos server object?](#how-are-the-keys-rotated-on-the-kerberos-server-object)
172+
* [Why do we need Azure AD Connect? Does it write any info back to AD DS from Azure AD?](#why-do-we-need-azure-ad-connect-does-it-write-any-info-back-to-ad-ds-from-azure-ad)
173+
* [What does the HTTP request/response look like when requesting PRT+ partial TGT?](#what-does-the-http-requestresponse-look-like-when-requesting-prt-partial-tgt)
174+
175+
### How is Azure AD Kerberos linked to my on-premises Active Directory Domain Services environment?
176+
177+
There are two parts - the on-premises AD DS environment, and the Azure AD tenant.
178+
179+
**Active Directory Domain Services (AD DS)**
180+
181+
The Azure AD Kerberos server is represented in an on-premises AD DS environment as a domain controller (DC) object. This DC object is made up of multiple objects:
182+
183+
* *CN=AzureADKerberos,OU=Domain Controllers,\<domain-DN>*
184+
185+
A *Computer* object that represents a Read-Only Domain Controller (RODC) in AD DS. There's no computer associated with this object. Instead, it's a logical representation of a DC.
186+
187+
* *CN=krbtgt_AzureAD,CN=Users,\<domain-DN>*
188+
189+
A *User* object that represents a RODC Kerberos Ticket Granting Ticket (TGT) encryption key.
190+
191+
* *CN=900274c4-b7d2-43c8-90ee-00a9f650e335,CN=AzureAD,CN=System,\<domain-DN>*
192+
193+
A *ServiceConnectionPoint* object that stores metadata about the Azure AD Kerberos Server objects. The administrative tools use this object to identify and locate the Azure AD Kerberos Server objects.
194+
195+
**Azure Active Directory**
196+
197+
The Azure AD Kerberos Server is represented in Azure AD as a *KerberosDomain* object. Each on-premises AD DS environment is represented as a single *KerberosDomain* object in the Azure AD tenant.
198+
199+
For example, you may have an AD DS forest with two domains such as *contoso.com* and *fabrikam.com*. If you allow Azure AD to issue Kerberos Ticket Granting Tickets (TGTs) for the entire forest, there are two *KerberosDomain* objects in Azure AD - one object for *contoso.com* and one for *fabrikam.com*.
200+
201+
If you have multiple AD DS forests, you have one *KerberosDomain* object for each domain in each forest.
202+
203+
### Where can I view these Kerberos server objects that are created in AD DS and published in Azure AD?
204+
205+
To view all objects, use the Azure AD Kerberos Server PowerShell cmdlets included with the latest version of Azure AD Connect.
206+
207+
For more information, including instructions on how to view the objects, see [create Kerberos server Objects](howto-authentication-passwordless-security-key-on-premises.md#create-kerberos-server-object).
208+
209+
### Why can't we have the public key registered to on-premises AD DS so there is no dependency on the internet?
210+
211+
We received feedback around the complexity of deployment model for Windows Hello for Business, so wanted to simplify the deployment model without having to use certificates and PKI (FIDO2 doesn't use certificates).
212+
213+
### How are the keys rotated on the Kerberos server object?
214+
215+
Like any other DC, the Azure AD Kerberos Server encryption *krbtgt* keys should be rotated on a regular basis. It's recommended to follow the same schedule as you use to rotate all other AD DS *krbtgt* keys.
216+
217+
> [!NOTE]
218+
> Although there are other tools to rotate the *krbtgt* keys, you must [use the PowerShell cmdlets to rotate the *krbtgt* keys](howto-authentication-passwordless-security-key-on-premises.md#rotating-the-azure-ad-kerberos-server-key) of your Azure AD Kerberos Server. This method makes sure that the keys are updated in both the on-premises AD DS environment and in Azure AD.
219+
220+
### Why do we need Azure AD Connect? Does it write any info back to AD DS from Azure AD?
221+
222+
Azure AD Connect doesn't write info back from Azure AD to AD DS. The utility includes the PowerShell module to create the Kerberos Server Object in AD DS and publish it in Azure AD.
223+
224+
### What does the HTTP request/response look like when requesting PRT+ partial TGT?
225+
226+
The HTTP request is a standard Primary Refresh Token (PRT) request. This PRT request includes a claim indicating a Kerberos Ticket Granting Ticket (TGT) is needed.
227+
228+
| Claim | Value | Description |
229+
|-------|-------|-----------------------------------------|
230+
| tgt | true | Claim indicates the client needs a TGT. |
231+
232+
Azure AD combines the encrypted client key and message buffer into the PRT response as additional properties. The payload is encrypted using the Azure AD Device session key.
233+
234+
| Field | Type | Description |
235+
|--------------------|--------|--------------|
236+
| tgt_client_key | string | Base64 encoded client key (secret). This key is the client secret used to protect the TGT. In this passwordless scenario, the client secret is generated by the server as part of each TGT request and then returned to the client in the response. |
237+
| tgt_key_type | int | The on-premises AD DS key type used for both the client key and the Kerberos session key included in the KERB_MESSAGE_BUFFER. |
238+
| tgt_message_buffer | string | Base64 encoded KERB_MESSAGE_BUFFER. |
239+
240+
## Next steps
241+
242+
To get started with FIDO2 security keys and hybrid access to on-premises resources, see the following articles:
243+
244+
* [Passwordless FIDO2 security keys](howto-authentication-passwordless-security-key.md)
245+
* [Passwordless Windows 10](howto-authentication-passwordless-security-key-windows.md)
246+
* [Passwordless on-premises](howto-authentication-passwordless-security-key-on-premises.md)

0 commit comments

Comments
 (0)