Forum Discussion

heinzelrumpel's avatar
heinzelrumpel
Brass Contributor
Mar 03, 2026
Solved

Cloud Kerberos Trust with 1 AD and 6 M365 Tenants?

Hi,   we would like to enable Cloud Kerberos Trust on hybrid joined devices ( via Entra connect sync)   In our local AD wie have 6 OUs and users and devices from each OU have a seperate SCP to di...
  • Lucaraheller's avatar
    Mar 03, 2026

    Hi,

    This is a very important question, and your scenario requires careful consideration before running the command.

    Short answer:

    Set-AzureADKerberosServer is not OU-based and not SCP-based.
    It creates a single Cloud Kerberos Trust configuration per Active Directory domain, not per tenant.

    How Cloud Kerberos Trust works

    When you run:

    Set-AzureADKerberosServer -Domain

    The cmdlet:

    – Creates (or configures) an AzureADKerberos object in the on-prem AD
    – Publishes the Entra ID tenant public key into AD
    – Establishes the trust required for Windows Hello for Business Cloud Kerberos Trust

    The object is created at the domain level, typically under:

    CN=AzureADKerberos, CN=System, DC=domain,DC=com

    It is not scoped per OU.
    It is not tied to the SCP.
    It is not multi-tenant aware.

    Critical point in your design

    You currently have:

    – One on-prem AD domain
    – Six Microsoft 365 tenants
    – Separate SCPs per OU pointing to different tenants

    Cloud Kerberos Trust is designed for a 1 AD domain → 1 Entra ID tenant model.

    It does not support multiple tenants sharing the same AD domain for Cloud Kerberos Trust.

    What happens if you run Set-AzureADKerberosServer multiple times?

    If you run it for Tenant A:

    – The AzureADKerberos object is created/configured using Tenant A’s key.

    If you then run it again for Tenant B:

    – It does not create a second object.
    – It updates (overwrites) the existing AzureADKerberos object.
    – The trust is now configured for Tenant B.

    Result:

    Only the last configured tenant will work with Cloud Kerberos Trust.
    Previously configured tenants will effectively lose Cloud Kerberos Trust functionality.

    Impact

    In a multi-tenant hybrid setup like yours:

    – You cannot have six separate Cloud Kerberos Trust configurations within the same AD domain.
    – Running the command multiple times will overwrite the configuration each time.
    – Windows Hello for Business Cloud Trust will only function for the most recently configured tenant.

    Conclusion

    Set-AzureADKerberosServer does not create multiple objects per tenant.
    It configures a single domain-level object.
    Re-running it for another tenant overwrites the previous configuration.

    Cloud Kerberos Trust is not supported in a single AD domain connected to multiple Entra ID tenants via separate SCPs.

    You would need to reconsider the architecture if Cloud Kerberos Trust is required across all tenants.