Close Menu
Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    Facebook X (Twitter) Instagram
    Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    • Home
    • Intune
    • Windows
      • Modern Workplace
    • macOS
    • Android
    • iOS
    • Automation
      • Logic Apps
      • Intune Monitoring
      • GitHub
    • Security
      • Passwordless
      • Security
    • Speaking
    • About me
    Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    Home»Intune»Enable passwordless security key sign-in in Hybrid Azure Active Directory environments
    Intune

    Enable passwordless security key sign-in in Hybrid Azure Active Directory environments

    Peter KlapwijkBy Peter KlapwijkFebruary 25, 2020Updated:February 27, 202046 Mins Read

    This week Microsofts Alex Simons announced the Public preview of Azure AD support for FIDO2 security keys in hybrid environments! This means we can now enable our Hybrid Azure Active Directory environments for FIDO2 security key authentication. When this is enabled, users are able to sign-in to their Hybrid AAD joined Windows 10 devices using a security key and get seamless sign-in to their on-premises and cloud resources.

    In this blog post I describe the configuration for enabling our Hybrid Azure Active Directory environment for security key sign-in.

    Environment requirements

    For this preview there are some requirements to the (on-premises) environment:

    • Domain Controllers running Server 2016/ 2019 (at least CU January 2020)
    • Windows Insider Builds 18945 or later for PCs (hybrid AAD joined)
    • Version 1.4.32.0 or later of Azure AD Connect

    Besides these requirements your users need to be enabled for Multi-factor Authentication and combined security information registration needs to be enabled. And of course you need compatible FIDO2 security keys.

    I assume you have already expanded your local Active Directory (AD) to Azure Active Directory (AAD). Security key sign-in is not available in an AD which is not connected to AAD.

    My lab environment consists of a Domain Controller running Server 2019 (with the 2020-02 CU). On that DC runs Azure AD Connect version 1.4.38.0.
    My Windows 10 client runs Windows Insider (slow ring) version 10.0.19041.84.
    I tested FIDO2 keys from Feitian and Yubico, which I tested.

    Configuration steps

    The setup for Hybrid Azure AD environments is almost the same as for Azure AD environments as previously described. Only the step to enable security key sign-in for the on-premises resources is an extra step:

    • Enable security keys for Windows sign-in
    • Enable combined security information registration
    • Enable FIDO2 security keys as Authentication methode
    • Enable passwordless security key sign-in to on-premises resources with Azure Active Directory

    Enable security keys for Windows sign-in

    We need to enable the the security keys as a sign-in option for our Windows 10 devices in Microsoft Intune. In Intune this can be done by enabling this as part of a tenant wide Windows Hello for Business (WHfB) setting or by deploying an Identity Protection configuration policy.

    In this example I used the Identity Protection configuration policy. The advantage of using a configuration policy is you can assign it to a group of users instead of all users.

    Open a browser to sign-in to the Microsoft Endpoint Manager admin center.

    • Sign-in to the Endpoint Manager Portal
    • Browse to Devices – Windows – Configuration profiles
    • Click Create profile
    • Give the policy a Name
    • Enter a Description (optional)
    • Choose Windows 10 and later as Platform
    • Choose Identity protection as Profile type
    • On the Settings tab set Use security keys for sign-in to Enable
    • Click OK
    • Click Create
    • Assign the policy to the security group of choice

    Image title

    Your subtitle here

    Enable combined security information registration

    The next step is to enable combined security information registration, which is at the moment of writing, in preview.
    The feature needs to be enabled from the Azure (AD) Portal.

    • Sign-in to the Azure AD portal
    • Browse to Azure Active Directory – User settings
    • Click Manage user feature preview settings

    Image title

    Your subtitle here

    • Select All to switch on the feature for all users
    • Click Save

    Enable FIDO2 security keys as Authentication methode

    The next step is to enable FIDO2 security keys as Authentication method in Azure Active Directory.

    • Still in the Azure AD Portal browse to Azure Active Directory
    • Browse to Security – Authentication methods
    • Click FIDO2 Security Keys
    • Set Enable to Yes
    • Leave Target set to All or switch to Select users and select a security group
    • Click Save

    Enable passwordless security key sign-in to on-premises resources with Azure Active Directory

    The next steps need to be executed on the server where Azure AD Connect is running in your on-premises environment. As described in the Microsoft documentation, we need to create an Azure AD Kerberos Server object in the on-premises Active Directory.

    Azure Active Directory (AD) can issue Kerberos Ticket Granting Tickets (TGTs) for one or more of your Active Directory domains. This functionality allows users to sign into Windows with modern credentials like FIDO2 security keys and access traditional Active Directory based resources. Kerberos Service Tickets and authorization continue to be controlled by your on-premises Active Directory domain controllers.

    An Azure AD Kerberos Server object is created in your on-premises Active Directory and then securely published to Azure Active Directory. The object isn’t associated with any physical servers. It’s simply a resource that can be used by Azure Active Directory to generate Kerberos TGTs for your Active Directory Domain.

    • Sign-in to the Azure AD Connect Server
    • Open PowerShell as admin and browse to C:\Program Files\Microsoft Azure Active Directory Connect\AzureADKerberos\
    • Execute these command lines:
      Import-Module “.\AzureAdKerberos.psd1”
      $domain = “peterklapwijk.com”
      $cloudCred = Get-Credential
    • Enter an Azure Active Directory global administrator username and password

    Don`t forget to replace peterklapwijk.com with your own AD domain.

    • Execute the command:
      $domainCred = Get-Credential
    • Enter a domain administrator username and password
    • Execute the command:
      Set-AzureADKerberosServer -Domain $domain -CloudCredential $cloudCred -DomainCredential $domainCred

    If this is executed successful, in Active Directory User and Computers, in the Domain Controllers OU a Computer object created is “AzureADKerberos”.

    And in the Users OU an User object is created “krbtgt_AzureAD”.

    Your setup is finished. Your users are now able to sign-in to their Windows 10 device using a FIDO2 security key!

    End-user experience

    The end-user experience for Hybrid Azure AD joined device is about the same as for Azure AD joined devices.
    The user first needs to register a FIDO2 security key via https://myprofile.microsoft.com, as I described in this previous post.

    When that is finished it`s time to use the key to sign-in to a Hybrid Azure AD joined Windows 10 device.

    If you have not put in the security key in a USB port, you can click Sign-in options to se the sign-in options which are available on the device.

    On this Hybrid AAD joined device two sign-in options are available:
    Password (the key icon on the left)
    USB Security key (the USB icon on the right).
    Click the USB icon.

    When you click on the security key icon, you are asked to insert the key.

    When you insert your FIDO2 security key, you are prompted to enter your PIN code.
    After entering your PIN, you are asked to touch your key. After you have touched your key, you are signed-in to Windows without entering your password!

    If you used a Bio version FIDO2 key, you only have to touch the key to sign-in.

    To sign-in to a Windows 10 device it isn`t necessary to choose the security key sign-in option. As soon as you insert the security key, the key is recognized as sign-in option and you are directly asked for the security key PIN.

    That`s it for enabling FIDO2 security key sign-in in a Hybrid Azure AD environment. Users are able to sign-in to a Windows 10 device, access on-premises resources, like file shares, and are able to authenticate to Azure AD connected SaaS apps like Office 365.

    Thank you for ready and happy testing!

    Azure AD Browser EMS Feitian FIDO2 Identity Management Intune MEM Microsoft 365 Microsoft Endpoint Manager Passwordless Security Windows10
    Share. Facebook Twitter LinkedIn Email WhatsApp
    Peter Klapwijk
    • Website
    • X (Twitter)
    • LinkedIn

    Peter is a Security (Intune) MVP since 2020 and is working as Modern Workplace Engineer at Wortell in The Netherlands. He has more than 15 years of experience in IT, with a strong focus on Microsoft technologies like Microsoft Intune, Windows, and (low-code) automation.

    Related Posts

    Automatically wipe a Windows 10 device after a number of authentication failures

    November 14, 2019

    Manage Google Chrome settings with Microsoft Intune

    October 17, 2019

    Intune Mobile Application Management

    September 13, 2016
    View 4 Comments

    4 Comments

    1. Saidul Islam on October 20, 2022 14:07

      Hi,
      I am facing the following issue after implementing this technology:
      The Kerberos client could not locate a domain controller for domain OurDomainName: 0xC000005E. Kerberos authentication requires communicating with a domain controller.

      The service principal name (SPN) krbtgt/NT Authority@OurDomainName is not registered, which caused Kerberos authentication to fail: 0x7. Use the setspn command-line tool to register the SPN.

      Here is the log from WebAuthN:

      WebAuthN Ctap GetAssertion completed.

      TransactionId: {6f203a33-07a5-4d7a-ba04-ffd8075118eb}
      Error: 0x8007052E. The user name or password is incorrect.

      Even though the ID and Password are correct.

      When connected to vpn, I can lock the PC and then can unlock the PC with Key. After couple of hours the same issue can’t login with the following error “Sorry, try that again. There was an issue with the server.”

      Reply
      • Sunny on November 20, 2022 05:25

        I also have the same issue, for first time windows configuration should the laptop needs line of sight to the ad or azure ad? I get the same error Sorry, try that again. There was an issue with the server.”
        Where do I check the logs of what happenned?

        Reply
        • DIon on September 3, 2024 10:12

          I’m having the same issue. Dod you resolved yours?

          Reply
    2. Ingo D. on July 20, 2023 05:01

      Great article, thank you!
      One comment: If you’re using MFA for the cloud credentials, the command is slightly different.
      $userPrincipalName = “admin@yourdomain.com”
      Set-AzureADKerberosServer -Domain $domain -UserPrincipalName $userPrincipalName -DomainCredential $domainCred

      Reply
    Leave A Reply Cancel Reply

    Peter Klapwijk

    Hi! Welcome to my blog post.
    I hope you enjoy reading my articles.

    Hit the About Me button to get in contact with me or leave a comment.

    Awards
    Sponsor
    Latest Posts

    Intune connector for Active Directory configuration error

    August 29, 2025

    Deploy Microsoft Defender updates in deployment rings

    July 4, 2025

    Create deployment ring groups for Microsoft Intune

    June 27, 2025

    Update Windows Defender during Windows Autopilot enrollments

    May 16, 2025
    follow me
    • Twitter 4.8K
    • LinkedIn 6.1K
    • YouTube
    • Bluesky 1.5K
    Tags
    Administrative Templates Android Automation Autopilot Azure Azure AD Browser Conditional Access Edge EMS Exchange Online Feitian FIDO2 Flow Google Chrome Graph Graph API Identity Management Intune Intune Monitoring iOS KIOSK Logic Apps macOS MEM MEMMonitoring Microsoft 365 Microsoft Defender Microsoft Edge Microsoft Endpoint Manager Modern Workplace Office 365 OneDrive for Business Outlook Passwordless PowerApps Power Automate Security SharePoint Online Windows Windows 10 Windows10 Windows 11 Windows Autopilot Windows Update
    Awards
    Sponsor
    Follow me on Twitter
    Tweets by inthecloud_247
    Tags
    Administrative Templates Android Automation Autopilot Azure Azure AD Browser Conditional Access Edge EMS Exchange Online Feitian FIDO2 Flow Google Chrome Graph Graph API Identity Management Intune Intune Monitoring iOS KIOSK Logic Apps macOS MEM MEMMonitoring Microsoft 365 Microsoft Defender Microsoft Edge Microsoft Endpoint Manager Modern Workplace Office 365 OneDrive for Business Outlook Passwordless PowerApps Power Automate Security SharePoint Online Windows Windows 10 Windows10 Windows 11 Windows Autopilot Windows Update
    Archives
    Peter Klapwijk

    Hi! Welcome to my blog post.
    I hope you enjoy reading my articles.

    Hit the About Me button to get in contact with me or leave a comment.

    Copy right

    This information is provided “AS IS” with no warranties, confers no rights and is not supported by the authors, or In The Cloud 24-7.

     

    Copyright © 2025 by In The Cloud 24-7/ Peter Klapwijk. All rights reserved, No part of the information on this web site may be reproduced or posted in any form or by any means without the prior written permission of the publisher.

    Shorthand; Don’t pass off my work as yours, it’s not nice.

    Recent Comments
    • Peter Klapwijk on Deploy Microsoft Defender updates in deployment rings
    • Magnus on Deploy Microsoft Defender updates in deployment rings
    • Gertjan Jongeneel on Add an Azure AD group to the local administrators group with Microsoft Intune
    • Peter Klapwijk on Add a certificate to the Trusted Publishers with Intune without reporting errors
    • Ram hIRANI on Add a certificate to the Trusted Publishers with Intune without reporting errors
    most popular

    Application installation issues; Download pending

    October 1, 2024

    How to change the Windows 11 language with Intune

    November 11, 2022

    Restrict which users can logon into a Windows 10 device with Microsoft Intune

    April 11, 2020

    Update Microsoft Edge during Windows Autopilot enrollments

    July 9, 2024
    Recent Comments
    • Peter Klapwijk on Deploy Microsoft Defender updates in deployment rings
    • Magnus on Deploy Microsoft Defender updates in deployment rings
    • Gertjan Jongeneel on Add an Azure AD group to the local administrators group with Microsoft Intune
    • Peter Klapwijk on Add a certificate to the Trusted Publishers with Intune without reporting errors
    • Ram hIRANI on Add a certificate to the Trusted Publishers with Intune without reporting errors
    Copy right

    This information is provided “AS IS” with no warranties, confers no rights and is not supported by the authors, or In The Cloud 24-7.

    Copyright © 2023 by In The Cloud 24-7/ Peter Klapwijk. All rights reserved. No part of the information on this web site may be reproduced or posted in any form or by any means without the prior written permission of the publisher.

    Shorthand: Don’t pass off my work as yours, it’s not nice.

    Peter Klapwijk – In The Cloud 24-7
    X (Twitter) LinkedIn YouTube RSS Bluesky
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.

    Manage Cookie Consent
    To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
    View preferences
    {title} {title} {title}