Home

On-prem access from an aad joined device with Windows Hello for Business

%3CLINGO-SUB%20id%3D%22lingo-sub-179232%22%20slang%3D%22en-US%22%3EOn-prem%20access%20from%20an%20aad%20joined%20device%20with%20Windows%20Hello%20for%20Business%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-179232%22%20slang%3D%22en-US%22%3E%3CP%3ERecently%20one%20of%20my%20clients%20asked%20me%20to%20setup%20Windows%20Hello%20for%20Business%20as%20part%20of%20our%20Modern%20IT%20Management%20PoC.%20So%20currently%20they%20are%20using%20convenience%20pin%20and%20the%20use%20case%20was%20that%20on%20their%20Modern%20IT%20managed%20AAD%20joined%20devices%20the%20users%20should%20be%20able%20leverage%20Windows%20Hello%20for%20Business%20being%20able%20to%20also%20access%20on-prem%20resources%20when%20on%20corpnet.%3C%2FP%3E%0A%3CP%3EAs%20the%20client%20wants%20to%20benefit%20from%20Azure%20Identity%20Protection%20feature%20to%20detect%20leaked%20credentials%20and%20automatically%20take%20action%20on%20it%20(force%20pw%20change%20and%20MFA)%20he%E2%80%99s%20using%20AAD%20Connect%20with%20Password%20hash%20sync%20enabled.%20So%20he%E2%80%99s%20not%20using%20ADFS%20and%20already%20had%20some%20Server%202016%20DCs%20inplace.%20Based%20on%20this%20great%20Decision%20Matrix%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20684px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F31525i2900742DAC173BD0%2Fimage-dimensions%2F684x334%3Fv%3D1.0%22%20width%3D%22684%22%20height%3D%22334%22%20alt%3D%22decisionmatrix.jpg%22%20title%3D%22decisionmatrix.jpg%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3Ewe%20decided%20to%20go%20for%20Windows%20Hello%20for%20Business%20Hybrid%20Key%20Trust.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ESo%20there%20are%20already%20a%20couple%20of%20great%20guides%20on%20how%20to%20set%20that%20up%20here%20so%20I%20won%E2%80%99t%20to%20that%20again%3A%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fblogs.technet.microsoft.com%2Fchadcox%2F2018%2F03%2F19%2Fmy-notes-on-setting-up-a-poc-windows-hello-for-business-lab-using-hybrid-key-trust%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fblogs.technet.microsoft.com%2Fchadcox%2F2018%2F03%2F19%2Fmy-notes-on-setting-up-a-poc-windows-hello-for-business-lab-using-hybrid-key-trust%2F%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fblogs.technet.microsoft.com%2Fmicroscott%2Fsetting-up-windows-hello-for-business-with-intune%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fblogs.technet.microsoft.com%2Fmicroscott%2Fsetting-up-windows-hello-for-business-with-intune%2F%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fgallery.technet.microsoft.com%2FWindows-Server-2016-Active-165e88d1%2Ffile%2F182710%2F1%2FW2K16%2520Active%2520Directory%2520Certificate%2520Services%2520Lab%2520Build.pdf%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fgallery.technet.microsoft.com%2FWindows-Server-2016-Active-165e88d1%2Ffile%2F182710%2F1%2FW2K16%2520Active%2520Directory%2520Certificate%2520Services%2520Lab%2520Build.pdf%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EMy%20client%20however%20was%20a%20little%20bit%20scared%20as%20Michael%20Niehaus%20wrote%20on%20his%20blog%20the%20following%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F31529iAE14BF25751322F8%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%22niehaus.jpg%22%20title%3D%22niehaus.jpg%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fblogs.technet.microsoft.com%2Fmniehaus%2F2018%2F02%2F21%2Fafraid-of-windows-10-with-azure-ad-join-try-it-out-part-2%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3EAfraid%20of%20Windows%2010%20with%20Azure%20AD%20join%3F%20Try%20it%20out%20(part%202)%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EOk%20so%20we%20decided%20to%20do%20a%20quick%20lab%20repro%20to%20check%20if%20we%20also%20experience%20any%20issues%20regarding%20the%20CRL%20and%20guess%20what%E2%80%A6sure%20we%20did%20%E2%80%93%20so%20let%E2%80%99s%20have%20a%20look%20if%20we%20can%20beat%20Michael%20working%20on%20it%20for%20several%20days%20%F0%9F%98%89%3C%2FP%3E%0A%3CP%3EIf%20the%20user%20was%20logging%20in%20on%20his%20aad%20joined%20with%20his%20%E2%80%9Clegacy%20credentials%E2%80%9D%20(username%2Fpw)%20he%20could%20access%20on-prem%20resources%20and%20everything%20was%20ok%2C%20if%20he%20was%20logging%20in%20with%20Windows%20Hello%20for%20Business%20then%20the%20user%20was%20not%20able%20to%20connect%20to%20the%20on-prem%20share%20and%20the%20following%20error%20message%20appeared%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20535px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F31526i380CF623EF9B440D%2Fimage-dimensions%2F535x134%3Fv%3D1.0%22%20width%3D%22535%22%20height%3D%22134%22%20alt%3D%22nodomain.jpg%22%20title%3D%22nodomain.jpg%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ESo%20looking%20at%20the%20CAPI2%20log%20in%20the%20eventviewer%20we%20saw%20that%20the%20client%20was%20not%20able%20to%20do%20the%20revocation%20check%20as%20the%20CRL%20was%20not%20reachable.%20Hmm%20strange%20as%20the%20CRL%20was%20published%20already%20externally%20via%20Azure%20Application%20Proxy%20(you%20can%20find%20a%20cool%20step%20by%20step%20guide%20over%20here%20%3CA%20href%3D%22https%3A%2F%2Fblogs.technet.microsoft.com%2Fmicroscott%2Fhow-to-set-up-azure-ad-certificate-based-authentication-for-office-apps-on-mobile-devices-ios-and-android-part-1%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fblogs.technet.microsoft.com%2Fmicroscott%2Fhow-to-set-up-azure-ad-certificate-based-authentication-for-office-apps-on-mobile-devices-ios-and-android-part-1%2F%3C%2FA%3E%20).%3C%2FP%3E%0A%3CP%3EAt%20this%20point%20I%20was%20involving%20my%20PKI%20colleague%20Dagmar%20Heidecker%20who%20is%20an%20PKI%20expert%20as%20I%20didn%E2%80%99t%20want%20to%20spend%20several%20days%20%F0%9F%98%8A%3C%2FP%3E%0A%3CP%3EWe%20added%20the%20CRL%20via%20certutil%20directly%20to%20the%20client%20but%20somehow%20the%20client%20still%20always%20tried%20to%20access%20LDAP%20and%20internal%20web%20server%20and%20ran%20in%20a%20timeout.%3C%2FP%3E%0A%3CP%3ESo%20we%20changed%20the%20CDP%2FAIP%20extension%20on%20the%20root%20and%20sub%20ca%20and%20removed%20the%20LDAP%20path.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20313px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F31527i788C10426BA88D8C%2Fimage-dimensions%2F313x374%3Fv%3D1.0%22%20width%3D%22313%22%20height%3D%22374%22%20alt%3D%22rootca.jpg%22%20title%3D%22rootca.jpg%22%20%2F%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20280px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F31528iA406BC105F57B6EE%2Fimage-dimensions%2F280x363%3Fv%3D1.0%22%20width%3D%22280%22%20height%3D%22363%22%20alt%3D%22subca.jpg%22%20title%3D%22subca.jpg%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ENext%20step%20was%20to%20request%20and%20install%20a%20new%20subca%20certificate%20and%20publish%20the%20crls.%3C%2FP%3E%0A%3CP%3EAfter%20that%20I%20checked%20that%20the%20DC%20already%20had%20the%20new%20certificate%20without%20the%20CDP%20pointing%20to%20LDAP.%20Then%20I%20restarted%20the%20KDC%20service%20on%20the%20DC%2C%20cleared%20the%20cryptocache%20(C%3A%5CWindows%5CSystem32%5Cconfig%5Csystemprofile%5CAppData%5CLocalLow%5CMicrosoft%5CCryptnetUrlCache%5CContent%20and%20Metadata)%20on%20the%20client%20and%E2%80%A6..whoohoo.%3C%2FP%3E%0A%3CP%3EOn-prem%20access%20was%20working%20successfully%20when%20signed%20in%20via%20Windows%20Hello%20for%20Business!%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EKudos%20to%20my%20colleague%20Dagmar%20Heidecker!%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-179232%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAAD%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EAzure%20AD%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EEMS%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EIntune%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EWindows%20Hello%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-360913%22%20slang%3D%22en-US%22%3ERe%3A%20On-prem%20access%20from%20an%20aad%20joined%20device%20with%20Windows%20Hello%20for%20Business%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-360913%22%20slang%3D%22en-US%22%3E%3CP%3EGreat%20discussion!%20One%20thing%20to%20point%20out%20that%20is%20not%20clearly%20mentioned%20for%20the%20Key%20Trust%20model%20is%20that%20you%20need%20to%20deploy%20a%20new%20certificate%20template%20to%20your%20domain%20controllers%3A%20the%26nbsp%3B%3CSTRONG%3EKerberos%20Authentication%26nbsp%3B%3C%2FSTRONG%3Etemplate%20instead%20of%20the%20default%26nbsp%3B%3CSTRONG%3EDomain%20Controller%20Authentication%3C%2FSTRONG%3E%20template.%20It's%20not%20enough%20to%20add%20KDC%20Authentication%20in%20Intended%20Purposes%20on%20the%20old%20default%20template%20since%20this%20template%20does%20not%20have%20the%20FQDN%20of%20the%20domain%20in%20the%20certificate.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-302044%22%20slang%3D%22en-US%22%3ERe%3A%20On-prem%20access%20from%20an%20aad%20joined%20device%20with%20Windows%20Hello%20for%20Business%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-302044%22%20slang%3D%22en-US%22%3EDo%20you%20happen%20to%20know%20if%20renewing%20and%20rekeying%20ath%20Domain%20controller%20certificate%20as%20one%20of%20those%20steps%20adding%20the%20new%20CDP%20etc.%20will%20have%20any%20effects%20on%20current%20client%20machines%20etc%3F%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-302043%22%20slang%3D%22en-US%22%3ERe%3A%20On-prem%20access%20from%20an%20aad%20joined%20device%20with%20Windows%20Hello%20for%20Business%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-302043%22%20slang%3D%22en-US%22%3EYeah%20I%20got%20everything%20setup%20and%20working%2C%20it's%20the%20same%20issue%20with%20PIN%20not%20working%2C%20but%20I%20finally%20found%20a%20good%20explination%20and%20how%20to%20fix%20it%20in%20the%20same%20guide%20here%3A%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fidentity-protection%2Fhello-for-business%2Fhello-hybrid-aadj-sso-base%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fidentity-protection%2Fhello-for-business%2Fhello-hybrid-aadj-sso-base%3C%2FA%3E%3CBR%20%2F%3E%3CBR%20%2F%3EBasically%20with%20like%20you%20said%20the%20CRL%20which%20I%20was%20confused%20by%20publishing%20to%20internet%20in%20your%20original%20statement%2C%20but%20it%20makes%20sense%20now%20that%20you%20can't%20get%20the%20default%20CRL%20because%20you%20cannot%20query%20active%20directory%20because%20your%20not%20authenticated%20yet%20and%20it%20requires%20that%20CRL%20so%20you%20publish%20it%20to%20internal%20http%20endpoint%20so%20it%20can%20pass%20that%20check.%20At%20least%20that's%20what%20it%20looks%20like%2C%20I'm%20working%20on%20setting%20that%20up%20now.%20Then%20hopefully%20PIN%20will%20work!%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-302039%22%20slang%3D%22en-US%22%3ERe%3A%20On-prem%20access%20from%20an%20aad%20joined%20device%20with%20Windows%20Hello%20for%20Business%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-302039%22%20slang%3D%22en-US%22%3E%3CP%3EThe%20goal%20of%20this%20solution%20is%20to%20have%20your%20AAD%20joined%20devices%20accessing%20On-prem%20resources%20when%20in%20corp%20lan%20and%20using%20WHfB%20Pin%2FBiometrics.%20So%20I%20just%20wanted%20to%20outline%20some%20of%20the%20pitfalls%20I%20came%20across%20to%20get%20that%20working%20because%20at%20my%20first%20attempt%20I%20was%20able%20to%20access%20On-prem%20resources%20with%20username%2Fpw%20but%20not%20with%20using%20PIN.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-302038%22%20slang%3D%22en-US%22%3ERe%3A%20On-prem%20access%20from%20an%20aad%20joined%20device%20with%20Windows%20Hello%20for%20Business%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-302038%22%20slang%3D%22en-US%22%3E%3CP%3EYour%20devices%20don't%20have%20to%20be%20hybrid%20joined%2C%20AAD%20joined%20only%20works%20fine%20if%20everything%20is%20setup%20correctly.%20See%20requirements%20for%20each%20scenario%20in%20the%20following%20link%26nbsp%3B%3CFONT%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fidentity-protection%2Fhello-for-business%2Fhello-identity-verification%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fidentity-protection%2Fhello-for-business%2Fhello-identity-verification%3C%2FA%3E%3C%2FFONT%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-302021%22%20slang%3D%22en-US%22%3ERe%3A%20On-prem%20access%20from%20an%20aad%20joined%20device%20with%20Windows%20Hello%20for%20Business%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-302021%22%20slang%3D%22en-US%22%3Ecurious%20myself%2C%20I%20don't%20plan%20on%20doing%20Hybrid%20Join%2C%20can%20using%20PIN%20in%20Azure%20AD%20Joined%20devices%20only%20work%20with%20access%20onprem%20File%20shares%3F%20Thanks!%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-239827%22%20slang%3D%22en-US%22%3ERe%3A%20On-prem%20access%20from%20an%20aad%20joined%20device%20with%20Windows%20Hello%20for%20Business%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-239827%22%20slang%3D%22en-US%22%3E%3CP%3EHi%20Stefan%2C%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ECan%20you%20explain%20a%20bit%20what%20you%20did%20on%20the%20hybrid%20key%20trust%20part%3F%26nbsp%3B%3C%2FP%3E%3CP%3EThe%20documentation%20follows%20a%20Hybrid%20Azure%20AD%20joined%20deployment%2C%20while%20you%20(and%20I)%20are%20Azure%20AD%20joined%20only%2C%20if%20I%20understood%20your%20post%20correctly.%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EOr%20is%20the%20solution%20to%20actually%20enable%20Hybrid%20Azure%20AD%20Join%3F%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E
Highlighted
Stefan Ringler
Occasional Contributor

Recently one of my clients asked me to setup Windows Hello for Business as part of our Modern IT Management PoC. So currently they are using convenience pin and the use case was that on their Modern IT managed AAD joined devices the users should be able leverage Windows Hello for Business being able to also access on-prem resources when on corpnet.

As the client wants to benefit from Azure Identity Protection feature to detect leaked credentials and automatically take action on it (force pw change and MFA) he’s using AAD Connect with Password hash sync enabled. So he’s not using ADFS and already had some Server 2016 DCs inplace. Based on this great Decision Matrix:

 

decisionmatrix.jpg

we decided to go for Windows Hello for Business Hybrid Key Trust.

 

So there are already a couple of great guides on how to set that up here so I won’t to that again:

https://blogs.technet.microsoft.com/chadcox/2018/03/19/my-notes-on-setting-up-a-poc-windows-hello-fo...

https://blogs.technet.microsoft.com/microscott/setting-up-windows-hello-for-business-with-intune/

https://gallery.technet.microsoft.com/Windows-Server-2016-Active-165e88d1/file/182710/1/W2K16%20Acti...

 

My client however was a little bit scared as Michael Niehaus wrote on his blog the following:

 

niehaus.jpg

Afraid of Windows 10 with Azure AD join? Try it out (part 2)

 

Ok so we decided to do a quick lab repro to check if we also experience any issues regarding the CRL and guess what…sure we did – so let’s have a look if we can beat Michael working on it for several days 😉

If the user was logging in on his aad joined with his “legacy credentials” (username/pw) he could access on-prem resources and everything was ok, if he was logging in with Windows Hello for Business then the user was not able to connect to the on-prem share and the following error message appeared:

 

nodomain.jpg

 

So looking at the CAPI2 log in the eventviewer we saw that the client was not able to do the revocation check as the CRL was not reachable. Hmm strange as the CRL was published already externally via Azure Application Proxy (you can find a cool step by step guide over here https://blogs.technet.microsoft.com/microscott/how-to-set-up-azure-ad-certificate-based-authenticati... ).

At this point I was involving my PKI colleague Dagmar Heidecker who is an PKI expert as I didn’t want to spend several days 😊

We added the CRL via certutil directly to the client but somehow the client still always tried to access LDAP and internal web server and ran in a timeout.

So we changed the CDP/AIP extension on the root and sub ca and removed the LDAP path.

 

rootca.jpgsubca.jpg

 

Next step was to request and install a new subca certificate and publish the crls.

After that I checked that the DC already had the new certificate without the CDP pointing to LDAP. Then I restarted the KDC service on the DC, cleared the cryptocache (C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content and Metadata) on the client and…..whoohoo.

On-prem access was working successfully when signed in via Windows Hello for Business!

 

Kudos to my colleague Dagmar Heidecker!

 

 

 

 

 

7 Replies

Hi Stefan,

 

Can you explain a bit what you did on the hybrid key trust part? 

The documentation follows a Hybrid Azure AD joined deployment, while you (and I) are Azure AD joined only, if I understood your post correctly. 

 

Or is the solution to actually enable Hybrid Azure AD Join? 

curious myself, I don't plan on doing Hybrid Join, can using PIN in Azure AD Joined devices only work with access onprem File shares? Thanks!

Your devices don't have to be hybrid joined, AAD joined only works fine if everything is setup correctly. See requirements for each scenario in the following link https://docs.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/hello-ident... 

 

The goal of this solution is to have your AAD joined devices accessing On-prem resources when in corp lan and using WHfB Pin/Biometrics. So I just wanted to outline some of the pitfalls I came across to get that working because at my first attempt I was able to access On-prem resources with username/pw but not with using PIN.

Yeah I got everything setup and working, it's the same issue with PIN not working, but I finally found a good explination and how to fix it in the same guide here: https://docs.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/hello-hybri...

Basically with like you said the CRL which I was confused by publishing to internet in your original statement, but it makes sense now that you can't get the default CRL because you cannot query active directory because your not authenticated yet and it requires that CRL so you publish it to internal http endpoint so it can pass that check. At least that's what it looks like, I'm working on setting that up now. Then hopefully PIN will work!
Do you happen to know if renewing and rekeying ath Domain controller certificate as one of those steps adding the new CDP etc. will have any effects on current client machines etc?

Great discussion! One thing to point out that is not clearly mentioned for the Key Trust model is that you need to deploy a new certificate template to your domain controllers: the Kerberos Authentication template instead of the default Domain Controller Authentication template. It's not enough to add KDC Authentication in Intended Purposes on the old default template since this template does not have the FQDN of the domain in the certificate.

Related Conversations
Save As / Export Email (msg file) in OWA
Michael T. DePouw Spottedmahn in Outlook on
4 Replies
Office365 Migration
office3651740 in Office 365 on
6 Replies
One Drive On Demand
Paul Rosenberg in OneDrive for Business on
8 Replies
office 365- email address policy
Wesley Baeyens in Office 365 on
2 Replies