Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
Question
Wednesday, September 19, 2018 6:15 PM
Hello,
I have a problem with Windows Hello for business in the Hybrid Azure AD joined Certificate Trust Deployment scenario.
I've configured the product following this guide step by step: https://docs.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-trust
Environment:
- Windows 10 1803
- All Domain controllers in Windows Server 2016
- ADFS 2016
- AD CS in Windows Server 2012 R2
When i try to register WHFB on a user, nothing happens after the sign-in process.
Here are the errors in the event viewer :
- In the event log "User Device Registration"
- In the event log "Hello for Business"
Here is the result of the "dsregcmd /status" command
dsregcmd /status
++
| Device State |
++
AzureAdJoined : YES
EnterpriseJoined : NO
DeviceId : c9d2b3d6-a8f2-426d-9e4f-87e2a9f4f877
Thumbprint : 3605684CA60FF5391A1E9C1AD30235A98ECF4D50
KeyContainerId : 5cab4849-6513-4d23-a4da-5080c6488cfc
KeyProvider : Microsoft Platform Crypto Provider
TpmProtected : YES
KeySignTest: : MUST Run elevated to test.
Idp : login.windows.net
TenantId : bd6aafaf-3263-40f5-a795-6f94d617839e
TenantName : CompanyName
AuthCodeUrl : https://login.microsoftonline.com/bd6aafaf-3263-40f5-a795-6f94d617839e/oauth4/authorize
AccessTokenUrl : https://login.microsoftonline.com/bd6aafaf-3263-40f5-a795-6f94d617839e/oauth4/token
MdmUrl :
MdmTouUrl :
MdmComplianceUrl :
SettingsUrl :
JoinSrvVersion : 1.0
JoinSrvUrl : https://enterpriseregistration.windows.net/EnrollmentServer/device/
JoinSrvId : urn:ms-drs:enterpriseregistration.windows.net
KeySrvVersion : 1.0
KeySrvUrl : https://enterpriseregistration.windows.net/EnrollmentServer/key/
KeySrvId : urn:ms-drs:enterpriseregistration.windows.net
WebAuthNSrvVersion : 1.0
WebAuthNSrvUrl : https://enterpriseregistration.windows.net/webauthn/bd6aafaf-3263-40f5-a795-6f94d617839e/
WebAuthNSrvId : urn:ms-drs:enterpriseregistration.windows.net
DeviceManagementSrvVersion : 1.0
DeviceManagementSrvUrl : https://enterpriseregistration.windows.net/manage/bd6aafaf-3263-40f5-a795-6f94d617839e/
DeviceManagementSrvId : urn:ms-drs:enterpriseregistration.windows.net
DomainJoined : YES
DomainName : RES
++
| User State |
++
NgcSet : NO
WorkplaceJoined : NO
WamDefaultSet : YES
WamDefaultAuthority : organizations
WamDefaultId : https://login.microsoft.com
WamDefaultGUID : {B16898C6-A148-4967-9171-64D755DA8520} (AzureAd)
AzureAdPrt : YES
AzureAdPrtAuthority : https://login.microsoftonline.com/bd6aafaf-3263-40f5-a795-6f94d617839e
EnterprisePrt : YES
EnterprisePrtAuthority : https://sts.companyname.eu:443/adfs
++
| Ngc Prerequisite Check |
++
IsUserAzureAD : YES
PolicyEnabled : YES
PostLogonEnabled : YES
DeviceEligible : YES
SessionIsNotRemote : YES
CertEnrollment : enrollment authority
AdfsRefreshToken : YES
AdfsRaIsReady : NO
LogonCertTemplateReady : UNKNOWN ( StateReady )
AadRecoveryNeeded : NO
PreReqResult : WillNotProvision
The auto-enrolled certificate on the user is not automatically deployed. When i try to do it manually, i get the following error.
"Certificate enrollment for user failed to enroll for a WHFBAuthentication certificate with request ID N/A from N/A (Failed to enroll for an NGC cert because there is NO Enterprise SSO. 0x801c03f6 (DSREG: 1014 DSREG_E_NGC_CERT_NO_ENTSSO))."
It seems related to ADFS Registration Authority but this part has been configured as recommended by MS, and i didn't notice any errors during the configuration.
Do you have any clues or feedback about these errors ?
Thanks a lot,
Kevin JAGIELLA
All replies (6)
Friday, October 5, 2018 7:25 AM ✅Answered
Hi
FYI, i've opened a Microsoft case and they found a solution.You will find below their answer:
Resolution:
Executeing the command DSREGCMD /STATUS we can see that “AdfsRaIsReady: NO”,
That means ADFS server is not advertising as a Registration Authority.
To verify this, access the openID endpoint “.well-known/openid-configuration” using the browser, for example https://STS.contoso.com/adfs/.well-known/openid-configuration
Look for "capabilities": ["winhello_cert", "winhello_cert_kr"], If these are missing then AD FS server is not advertising as a Registration Authority
To fix this need to perform the following steps (this is a work around for now will be fixed later, No ETA)
Launch ADFS management console
Browse to “Services > Authentication Methods”
Under Multi-Factor Authentication Methods click Edit
Select One of the MFA providers (Any)
Save the settings.
Note: The above steps will not trigger MFA for any user unless MFA is enabled on the replying party. Enabling MFA on the relying party “Microsoft Office 365 Identity Platform” will break device registration and Windows Hello for Business.
Thursday, September 20, 2018 10:33 AM
Hi,
As mentioned in Microsoft documentation, the AD FS farm used with Windows Hello for Business must be Windows Server 2016 with minimum update of KB4088889 (14393.2155). Please check this.
Also, you can try the following steps to see if it helps:
Open the AAD Connect tool, choose "Refresh Schema" - pop in the various credentials it requests and then let it run a full sync.
Wait for a while to replicate, then see if the problem is solved.
Hope it could be helpful.
Please remember to mark the replies as answers if they help.
If you have feedback for TechNet Subscriber Support, contact [email protected].
Thursday, September 20, 2018 12:13 PM
Hi,
Thanks for your reply.
I forgot to mention, the KB4088889 is already installed on the ADFS farm.
I've also refreshed the schema several times but the problem is still present.
Tuesday, September 25, 2018 5:02 PM
Hi,
Any others suggestions ?
Thanks
Thursday, October 25, 2018 5:19 AM
I'm currently facing the same problem and unfortunately this solution didn't work for me. I opened a ticket with Microsoft and they confirmed this is the workaround they are currently applying for this issue, but for some reason, after enabling one of the MFA options and restarting the ADFS service, the capabilities":[]," still show up empty.
Microsoft is currently trying to figure out what's wrong on my environment but so far, they have no clue
Olivier
Thursday, November 1, 2018 6:26 PM
Even though I'm still having problems with Windows Hello, I was able to solve this specific issue.
After checking the output of Get-AdfsCertificateAuthority I noticed that the parameter WindowsHelloCertificateProxyEnabled was set to False.
I ran the command Set-AdfsCertificateAuthority once again, this time specifying the parameter -WindowsHelloCertificateProxyEnabled $true and now I can see the winhello_cert and winhello_cert_kr capabilities in the openid-configuration page:
This means that apparently, ADFS was indeed advertising as a registration authority, but it was only doing it internally and not through the proxy servers.
Olivier