Forum Discussion
Steve Whitcher
Jul 24, 2018Bronze Contributor
Logging on to Remote Desktop using Windows Hello for Business & Biometrics
In the release notes for build 17713, support was announced for logging into remote desktop sessions using biometrics via windows hello. I have a few questions I'm hoping someone can answer: The...
- Oct 03, 2018
Although late, we have published information around WHfB with RDP :
Clint Lechner
Jun 04, 2019Iron Contributor
Though an irritation, the 30 minute sync would be a blessing if RDP worked. I can't put into words how absolutely irrate I was when we saw that RDP would not work with key trust, especially given that it's the preferred model.
It just cripples us.
It just cripples us.
jurajt
Jun 12, 2019Brass Contributor
has this been resolved? is it possible to use WhfB PIN (not certs!) to RDP login into a windows server joined to Azure AD Domain Services?
- Clint LechnerJun 12, 2019Iron Contributor
jurajt Nope, not as far as I know. If it was resolved, and key-trust worked with RDP, I would be chugging margaritas and dancing on tables.
- Christoph BerthoudJun 12, 2019Copper Contributor
Sadly it still hasn't been fixed, and there is still little information available. I'm engaging Microsoft under our Unified Support to better understand what's happening in this space.
- Clint LechnerJun 13, 2019Iron ContributorAs of a few weeks ago there wasn't any action and we were speaking with senior engineers. The documentation that states that ADFS is an absolute requirement with key trust is because of our case unfortunately.
Previously there was some gray area where it was thought that AD Connect would be sufficient. Our original thought was that we would go passwordless with Windows hello for business combined with phone sign in for Office 365 Authentication, on the back of multi-factor Authentication width required biometric login.
We actually rolled it out with incredibly positive user feedback. We were heroes. And then RDP bit us in the arse.