Forum Discussion

heinzelrumpel's avatar
heinzelrumpel
Brass Contributor
Mar 03, 2026

Cloud Kerberos Trust with 1 AD and 6 M365 Tenants?

Hi,

 

we would like to enable Cloud Kerberos Trust on hybrid joined devices ( via Entra connect sync)

 

In our local AD wie have 6 OUs and users and devices from each OU have a seperate SCP to differnt M365 Tenants. I found this Article to configure  the Cloud Kerberos Trust .

 

 

 

Set-AzureADKerberosServer

1

2

The Set-AzureADKerberosServer PowerShell cmdlet is used to configure a Microsoft Entra (formerly Azure AD) Kerberos server object. This enables seamless Single Sign-On (SSO) for on-premises resources using modern authentication methods like FIDO2 security keys or Windows Hello for Business.

 

Steps to Configure the Kerberos Server

 

1. Prerequisites

 

Ensure your environment meets the following: Devices must run Windows 10 version 2004 or later. Domain Controllers must run Windows Server 2016 or later. Install the AzureADHybridAuthenticationManagement module: [Net.ServicePointManager]::SecurityProtocol = [Net.ServicePointManager]::SecurityProtocol -bor [Net.SecurityProtocolType]::Tls12 Install-Module -Name AzureADHybridAuthenticationManagement -AllowClobber

 

2. Create the Kerberos Server Object

 

Run the following PowerShell commands to create and publish the Kerberos server object:

 

Prompt for All Credentials:

 

$domain = $env:USERDNSDOMAIN

$cloudCred = Get-Credential -Message 'Enter Azure AD Hybrid Identity Administrator credentials'

$domainCred = Get-Credential -Message 'Enter Domain Admin credentials'

 

Set-AzureADKerberosServer -Domain $domain -CloudCredential $cloudCred -DomainCredential $domainCred

 

 

 

As I understand the process, a object is created in local AD when running 

 

Set-AzureADKerberosServer

 

 

 

What happens, if I run the command multiple times, for each OU/Tenant. Does this ovveride the object, or does it create a new objects?

 

 

 

 

 

1 Reply

  • Hi,

    This is a very important question, and your scenario requires careful consideration before running the command.

    Short answer:

    Set-AzureADKerberosServer is not OU-based and not SCP-based.
    It creates a single Cloud Kerberos Trust configuration per Active Directory domain, not per tenant.

    How Cloud Kerberos Trust works

    When you run:

    Set-AzureADKerberosServer -Domain

    The cmdlet:

    – Creates (or configures) an AzureADKerberos object in the on-prem AD
    – Publishes the Entra ID tenant public key into AD
    – Establishes the trust required for Windows Hello for Business Cloud Kerberos Trust

    The object is created at the domain level, typically under:

    CN=AzureADKerberos, CN=System, DC=domain,DC=com

    It is not scoped per OU.
    It is not tied to the SCP.
    It is not multi-tenant aware.

    Critical point in your design

    You currently have:

    – One on-prem AD domain
    – Six Microsoft 365 tenants
    – Separate SCPs per OU pointing to different tenants

    Cloud Kerberos Trust is designed for a 1 AD domain → 1 Entra ID tenant model.

    It does not support multiple tenants sharing the same AD domain for Cloud Kerberos Trust.

    What happens if you run Set-AzureADKerberosServer multiple times?

    If you run it for Tenant A:

    – The AzureADKerberos object is created/configured using Tenant A’s key.

    If you then run it again for Tenant B:

    – It does not create a second object.
    – It updates (overwrites) the existing AzureADKerberos object.
    – The trust is now configured for Tenant B.

    Result:

    Only the last configured tenant will work with Cloud Kerberos Trust.
    Previously configured tenants will effectively lose Cloud Kerberos Trust functionality.

    Impact

    In a multi-tenant hybrid setup like yours:

    – You cannot have six separate Cloud Kerberos Trust configurations within the same AD domain.
    – Running the command multiple times will overwrite the configuration each time.
    – Windows Hello for Business Cloud Trust will only function for the most recently configured tenant.

    Conclusion

    Set-AzureADKerberosServer does not create multiple objects per tenant.
    It configures a single domain-level object.
    Re-running it for another tenant overwrites the previous configuration.

    Cloud Kerberos Trust is not supported in a single AD domain connected to multiple Entra ID tenants via separate SCPs.

    You would need to reconsider the architecture if Cloud Kerberos Trust is required across all tenants.