ANAVEM
Languagefr
How to Configure Windows Hello for Business Cloud Kerberos Trust in Intune

How to Configure Windows Hello for Business Cloud Kerberos Trust in Intune

Deploy Microsoft Entra Kerberos and configure Windows Hello for Business cloud Kerberos trust for passwordless hybrid authentication to on-premises resources.

Emanuel DE ALMEIDAEmanuel DE ALMEIDA
March 19, 2026 18 min 0
hardwindows-hello 10 steps 18 min

Why Deploy Windows Hello for Business Cloud Kerberos Trust?

Windows Hello for Business with cloud Kerberos trust represents the evolution of hybrid authentication, eliminating passwords while maintaining seamless access to on-premises resources. This deployment model addresses the complexity of traditional hybrid authentication by leveraging Azure AD to issue Kerberos tickets, reducing the dependency on line-of-sight to domain controllers.

What Makes Cloud Kerberos Trust Different from Certificate-Based Authentication?

Unlike certificate-based Windows Hello deployments that require complex PKI infrastructure, cloud Kerberos trust uses Azure AD as the Kerberos Key Distribution Center (KDC). This approach simplifies deployment, reduces infrastructure overhead, and provides better support for remote workers who may not have consistent VPN connectivity to domain controllers.

How Does Microsoft Intune Simplify Windows Hello for Business Management?

Microsoft Intune's Settings Catalog has replaced legacy OMA-URI configurations, providing a more reliable and user-friendly approach to policy management. The combination of Account Protection policies for user settings and Settings Catalog for device-specific configurations gives administrators granular control over the deployment while maintaining Microsoft's recommended security baselines.

This tutorial walks you through the complete implementation process, from creating the required Active Directory objects to configuring Intune policies and verifying successful passwordless authentication to on-premises resources. You'll learn the current best practices for 2026 deployments, including the updated policy naming conventions and troubleshooting techniques that ensure a smooth rollout.

Related: How to Enable Tamper Protection for Your Organization Using

Related: How to Set Up Secure Intune Conditional Access Policies

Related: How to Configure Windows Security Updates During OOBE with

Implementation Guide

Full Procedure

01

Install AzureAD Kerberos PowerShell Module

First, you need to install the Microsoft PowerShell module that creates the Kerberos server object in your on-premises Active Directory. Run this on a domain-joined machine where you have Domain Admin privileges.

# Install the required PowerShell module
Install-Module -Name AzureADHybridAuthenticationManagement -Force

# Import the module
Import-Module AzureADHybridAuthenticationManagement

Verification: Run Get-Module AzureADHybridAuthenticationManagement to confirm the module loaded successfully. You should see version information displayed.

Pro tip: Install this module on your primary domain controller to avoid any replication delays when creating the Kerberos server object.
02

Create Microsoft Entra Kerberos Server Object

Now create the Kerberos server object that enables your on-premises Active Directory to trust cloud-issued Kerberos tickets. This is the bridge between your cloud identity and on-premises resources.

# Connect to Azure AD with Global Admin credentials
Connect-AzureAD

# Create the Kerberos server object for your domain
New-AzureADKerberosServer -Domain "yourdomain.com"

# Verify the object was created
Get-AzureADKerberosServer -Domain "yourdomain.com"

Replace yourdomain.com with your actual Active Directory domain name. The command creates a computer object named AzureADKerberos in your domain's Computers container.

Verification: Check Active Directory Users and Computers for the AzureADKerberos computer object in the Computers OU. The object should show as enabled and have a recent password change date.

Warning: This command requires both Domain Admin and Global Admin privileges. Make sure you're running PowerShell as an administrator and have authenticated to both environments.
03

Enable Windows Hello for Business via Account Protection Policy

Configure the foundational Windows Hello for Business settings using Intune's Account Protection policy. This replaces the legacy tenant-wide settings and provides better control over deployment.

Navigate to the Microsoft Intune Admin Center at https://intune.microsoft.com and follow these steps:

  1. Go to Endpoint SecurityAccount Protection
  2. Click Create Policy
  3. Select Platform: Windows 10 and later
  4. Select Profile: Account protection
  5. Click Create

Configure these critical settings:

Use Windows Hello For Business (User): Enabled
Require Security Device (User): Enabled
Minimum PIN Length: 6 (or your organization's requirement)
Maximum PIN Length: 127
Lowercase Letters in PIN: Allow
Uppercase Letters in PIN: Allow
Special Characters in PIN: Allow
PIN Expiration (Days): Not Configured

Assign the policy to a security group containing your target users, then click Create.

Verification: After policy deployment, check the policy status in Endpoint SecurityAccount Protection. The policy should show as Succeeded for target devices within 15-30 minutes.

04

Create Settings Catalog Profile for Cloud Kerberos Trust

The Settings Catalog approach is the modern way to configure Windows Hello for Business cloud Kerberos trust. This replaces legacy OMA-URI configurations and provides better reliability.

In the Microsoft Intune Admin Center:

  1. Navigate to DevicesWindowsConfiguration profiles
  2. Click Create profile
  3. Select Platform: Windows 10 and later
  4. Select Profile type: Settings Catalog
  5. Click Create

Name your policy something descriptive like "Windows Hello Cloud Kerberos Trust" and click Next.

Verification: Confirm you're in the Settings Catalog creation wizard. The interface should show "Add settings" button and a search box for finding specific settings.

05

Configure Cloud Kerberos Trust Settings

Add the specific settings that enable cloud Kerberos trust for on-premises authentication. These settings tell Windows devices to request Kerberos tickets from the cloud instead of directly from domain controllers.

In the Settings Catalog policy:

  1. Click Add settings
  2. In the settings picker, search for Windows Hello for Business
  3. Expand the Windows Hello for Business category

Add and configure these essential settings:

Use Cloud Trust For On Prem Auth: Enabled
Cloud Kerberos Ticket Retrieval Enabled: Enabled
Use Certificate For On Prem Auth: Disabled

The Use Certificate For On Prem Auth setting should be disabled if you were previously using certificate-based authentication, as it can conflict with cloud Kerberos trust.

Click Next to proceed to assignments.

Verification: Ensure all three settings appear in your policy configuration with the correct values. The settings picker should show green checkmarks next to selected items.

Pro tip: If you can't find these settings, make sure you're searching in the Windows Hello for Business category, not the general authentication settings. The exact setting names are case-sensitive.
06

Assign Policies and Deploy

Proper assignment ensures your policies reach the right devices and users. Create a security group strategy that allows for phased deployment and easy troubleshooting.

For the Settings Catalog policy:

  1. Click Next on the Assignments tab
  2. Under Included groups, click Add groups
  3. Select your target device security group (e.g., "Windows Hello Pilot Devices")
  4. Click Select

Review your configuration and click Create.

For both policies, verify the assignments:

Account Protection Policy: Assigned to USER groups
Settings Catalog Policy: Assigned to DEVICE groups

This assignment strategy ensures Windows Hello settings apply to users while cloud Kerberos trust applies to devices.

Verification: Check policy assignment status in DevicesMonitorAssignment status. Both policies should show successful assignment within 15 minutes.

Warning: Don't assign both policies to the same group type. Account Protection should target users, Settings Catalog should target devices. Mixed assignments can cause policy conflicts.
07

Force Policy Sync on Target Devices

Speed up policy deployment by manually triggering a sync on your test devices. This avoids waiting for the standard 8-hour sync cycle.

On each target Windows device, open an elevated Command Prompt and run:

rem Force Intune policy sync
C:\Windows\System32\deviceenroller.exe /c /AutoEnrollMDM

rem Alternative method using PowerShell
powershell -Command "Get-ScheduledTask | Where-Object {$_.TaskName -eq 'PushLaunch'} | Start-ScheduledTask"

Or use the Company Portal app:

  1. Open Company Portal app
  2. Go to Settings
  3. Click Sync
  4. Wait for "Last sync" timestamp to update

For hybrid-joined devices, also run:

gpupdate /force

Verification: Check the sync status in Company Portal or run dsregcmd /status to confirm the device is properly joined and policies are applying.

08

Test Windows Hello for Business Enrollment

Verify that Windows Hello for Business is working correctly before testing cloud Kerberos trust. Users need to enroll in Windows Hello first.

Have a test user sign in to a target device and set up Windows Hello:

  1. Go to SettingsAccountsSign-in options
  2. Under Windows Hello PIN, click Set up
  3. Follow the enrollment wizard to create a PIN
  4. Optionally set up fingerprint or face recognition if hardware supports it

The enrollment process should complete without errors and prompt for MFA verification.

Verification commands to run on the device:

rem Check Windows Hello status
dsregcmd /status | findstr "WamDefaultSet\|AzureAdPrt"

rem Verify Hello for Business enrollment
certlm.msc

In Certificate Manager, look for certificates in PersonalCertificates with "Windows Hello for Business" in the subject name.

Verification: The user should be able to sign in using their PIN instead of their password. Event Viewer should show successful Windows Hello authentication events in Applications and Services LogsMicrosoftWindowsHelloForBusiness.

09

Test Cloud Kerberos Trust Authentication

Now test the core functionality: accessing on-premises resources using cloud-issued Kerberos tickets. This is where the magic happens.

Have your test user sign in with Windows Hello and attempt to access on-premises resources:

rem Test file share access
net use Z: \\server\share

rem Check current Kerberos tickets
klist

rem Test specific service access
klist get krbtgt

The klist command should show Kerberos tickets that were obtained from the cloud rather than directly from your domain controllers.

Test these scenarios:

  • Access file shares on domain-joined servers
  • Launch domain-joined applications
  • Access internal web applications using Integrated Windows Authentication

Verification: In Event Viewer, check Applications and Services LogsMicrosoftWindowsHelloForBusiness for events indicating cloud Kerberos trust is working. Look for Event ID 300 series events.

Additional verification using PowerShell:

# Check authentication method
Get-WinEvent -FilterHashtable @{LogName='Microsoft-Windows-HelloForBusiness/Operational'; ID=300} -MaxEvents 5
Pro tip: If on-premises access fails, check that the user's device can reach both Azure AD and your domain controllers. VPN connectivity might be required for initial ticket retrieval.
10

Monitor and Troubleshoot Deployment

Establish monitoring to track deployment success and quickly identify issues. Windows Hello for Business generates detailed logs that help with troubleshooting.

Key monitoring locations in Intune:

  1. Endpoint SecurityAccount Protection → Select your policy → Device status
  2. DevicesConfiguration profiles → Select Settings Catalog policy → Device status
  3. DevicesMonitorDevice compliance

On client devices, monitor these Event Viewer logs:

Applications and Services Logs → Microsoft → Windows → HelloForBusiness → Operational
Applications and Services Logs → Microsoft → Windows → AAD → Operational
Applications and Services Logs → Microsoft → Windows → User Device Registration → Admin

Common troubleshooting commands:

rem Check device registration status
dsregcmd /status

rem Verify TPM status
tpm.msc

rem Check Windows Hello certificate
certlm.msc

Create a troubleshooting checklist:

  • Verify TPM 2.0 is enabled and functional
  • Confirm device is Azure AD joined or hybrid joined
  • Check that both policies applied successfully
  • Verify MFA is configured for the user
  • Ensure AD Connect is synchronizing properly

Verification: Policy compliance should show 100% success rate for your pilot group within 24 hours. Any failures should be investigated using the Event Viewer logs and dsregcmd output.

Warning: If you see certificate-related errors, ensure the "Use Certificate For On Prem Auth" setting is disabled in your Settings Catalog policy. Certificate and cloud Kerberos trust cannot be used simultaneously.

Frequently Asked Questions

What are the minimum requirements for Windows Hello for Business cloud Kerberos trust?+
You need Windows 10 or Windows 11 devices with TPM 2.0, Microsoft Entra joined or hybrid joined devices, an Active Directory domain with AD Connect configured, Microsoft Entra ID with Intune licensing, and MFA enabled for users. The on-premises infrastructure requires Windows Server 2016 or later domain controllers.
How does cloud Kerberos trust differ from certificate-based Windows Hello authentication?+
Cloud Kerberos trust uses Azure AD as the Kerberos Key Distribution Center instead of requiring complex PKI infrastructure. This eliminates the need for certificate templates, certificate authorities, and certificate management while providing the same passwordless experience. It's simpler to deploy and maintain, especially for remote workers.
Can I use both certificate-based and cloud Kerberos trust authentication simultaneously?+
No, you cannot use both authentication methods simultaneously on the same device. You must choose either certificate-based authentication or cloud Kerberos trust. If migrating from certificates, ensure the 'Use Certificate For On Prem Auth' setting is disabled in your Settings Catalog policy to avoid conflicts.
What happens if a device cannot reach Azure AD when accessing on-premises resources?+
If the device cannot reach Azure AD, it cannot obtain cloud-issued Kerberos tickets for on-premises authentication. Users will need alternative authentication methods or VPN connectivity to Azure AD. This is why proper network planning and backup authentication methods are important for remote workers.
How do I troubleshoot Windows Hello for Business cloud Kerberos trust authentication failures?+
Check Event Viewer logs in Applications and Services Logs → Microsoft → Windows → HelloForBusiness → Operational for authentication events. Use 'dsregcmd /status' to verify device registration, 'klist' to check Kerberos tickets, and ensure both Account Protection and Settings Catalog policies applied successfully in Intune. Verify TPM 2.0 is functional and MFA is properly configured.
Emanuel DE ALMEIDA
Written by

Emanuel DE ALMEIDA

Microsoft MCSA-certified Cloud Architect | Fortinet-focused. I modernize cloud, hybrid & on-prem infrastructure for reliability, security, performance and cost control - sharing field-tested ops & troubleshooting.

Discussion

Share your thoughts and insights

You must be logged in to comment.

Loading comments...