Hybrid cloud Kerberos trust deployment - Say NO to Hybrid Azure AD Join!!

Ғылым және технология

Azure AD Joined devices are just as capable of accessing on-premises resources like file-shares, printers, apps, etc. as Domain Joined or Hybrid Devices.
There is no need to join your computers to your on-premises domain to allow access to on-premises resources. It's not a requirement, and it's not a good idea.
#SayNoToHAADJ
Want more? Dean's full Intune for Windows course has you covered. Here's an exclusive KZread discount: www.udemy.com/course/learn-in...
The Cloud Management Community is YOUR community for Cloud Management, Mobile Device Management and Microsoft Endpoint Manager. Join the discussion on Twitter (@the_cmcommunity) and subscribe to be notified when we go LIVE.

Пікірлер: 75

  • @theCMC
    @theCMC Жыл бұрын

    I'm a lazy admin, so all my sources are from Microsoft! Here's how to set up Azure AD Kerberos: learn.microsoft.com/en-us/azure/active-directory/authentication/howto-authentication-passwordless-security-key-on-premises#install-the-azure-ad-kerberos-powershell-module?WT.mc_id=EM-MVP-5004668 And here's how to set up Hybrid cloud Kerberos trust: learn.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/hello-hybrid-cloud-kerberos-trust?tabs=intune#deployment-steps?WT.mc_id=EM-MVP-5004668

  • @brendanwatkins8192

    @brendanwatkins8192

    Жыл бұрын

    cheers

  • @brandonpaul6186

    @brandonpaul6186

    5 ай бұрын

    This works great except for SQL Server Reporting Services. I get pop-ups only on that application. I am guessing because it does not understand modern authentication?

  • @Clay-Shooter
    @Clay-Shooter Жыл бұрын

    I have just implemented this for a client and just thought I would note a possible "Gotcha" around the creation of the Kerbros server in regard to privileged Accounts, not that its "best practise" to do that. But if you have a user who has a privileged role eg Domain Admins , Account operators, the Kerboros object wont allow the PIN to work. For this, you will either have to remove the privilege role from the user or modify the Password Replication policy on the server object. Darren

  • @NikeGess
    @NikeGess Жыл бұрын

    Brilliant, got to test this. Would get rid of alot of obstacles. Thank you.

  • @jaimemint405
    @jaimemint40511 ай бұрын

    thank you very much for your great knowledge nuggets!

  • @daniellowe6699
    @daniellowe6699 Жыл бұрын

    Great video, thankyou. I have a question about accessing on-premises file shares. I assume access to files still uses a token generated at login that is used by the SAM on the target file server to compare SIDs in the token versus those on the access control lists of the target folder? Has this process changed at all? Does the token include a new SID for the Azure AD user object and the historical SID associated with the On-Premises user object \ groups etc?

  • @nicholasvoss7129
    @nicholasvoss7129 Жыл бұрын

    What's the experience for users who are already AAD joined and setup windows hello on their computer, but now you've introduced the kerberos trust via the configurations here for both hybrid join and AAD only devices? Will their PIN/biometric now start to work this way, or do you have to do something to re-enroll them now to Hello for Business vs just a standard Windows Hello?

  • @drockqx
    @drockqx Жыл бұрын

    This seems to work. What about using RDP to on-prem servers? It prompts for pin, even though it doesn't work.

  • @webcomment8895
    @webcomment8895 Жыл бұрын

    So, you have to use a domain admin and global admin user name and password to set this up? What about passwordless with a domain admin using smartcard authentication and global admin using the authenticator app or FIDO2 key for login?

  • @OldFellaDave
    @OldFellaDave Жыл бұрын

    The average user wouldn't know how to manually get to the fileshares - which is why we've been mapping them via scripts and GPO's for them for over 30 years. They'd be calling us all day trying to find their files :)

  • @saleemps786
    @saleemps786 Жыл бұрын

    why does it require to setup cloud Kerberos trust if the intention to access on-prem file shares via Kerberos? directory synced account on a Azure joined machine will get Kerberos token anyways if it has connectivity to the domain controllers!

  • @StefanMeilink
    @StefanMeilink Жыл бұрын

    Why do you assign a device policy on All users?

  • @theCMC
    @theCMC Жыл бұрын

    Prerequisites for this to work, along with unsupported scenarios are shown at this link: learn.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/hello-hybrid-cloud-kerberos-trust?tabs=intune#prerequisites

  • @brendanwatkins8192
    @brendanwatkins8192 Жыл бұрын

    Great video, I've had problems since starting to switch clients to Azure from onprem. Can you make a list of your powershell commands available please.

  • @theCMC

    @theCMC

    Жыл бұрын

    Good point! Sure will

  • @computerlist
    @computerlist Жыл бұрын

    Does this require AD connect?

  • @ScottPappali
    @ScottPappali Жыл бұрын

    So can I clarify a couple of things? 1) Was the new machine setup done while on your corp network, or can it be on any network to perform the Azure Join, I know the Azure Join can be done from any network connection, but thought I'd still clarify. 2) After Azure Join the machine, I noticed that you were able to access your corporate DC, does the machine on the same need to be on the same network as the DC, or does the Kerberos Auth that you performed earlier acts as tunnel?

  • @rajkumarmcitp

    @rajkumarmcitp

    Жыл бұрын

    New device to be on the same network.

  • @theCMC

    @theCMC

    Жыл бұрын

    The device can be configured on any network, yes. It doesn’t need line of sight to a DC for provisioning. The device does need network access to the resource it’s trying to access; either by being in the same network location, via VPN, or the app being made available in some other way.

  • @unkownuser2320
    @unkownuser23202 ай бұрын

    intune requires any on premise access drive mapping, printer access, vpn etc how to implement requires network connection configuration from on premise network to Azure network?

  • @djh0381
    @djh0381 Жыл бұрын

    It certainly simplifies things. The only concern would be that if a user wanted to find out who had access to a share would it enumerate to users name or account guid?

  • @theCMC

    @theCMC

    Жыл бұрын

    The users are on-prem users, so it would show the username.

  • @computerlist

    @computerlist

    Жыл бұрын

    Meaning AD connect will exist in the environment?

  • @kimagran4071
    @kimagran4071 Жыл бұрын

    I cant find any info on this in the documentation, but using this setup and signing in to an AAD joined device, is it required to ALWAYS have a connection to BOTH Azure AD and On-Prem AD, to be able to get a full Kerberos ticket? Or is there some kind of cache for the partial TGT from a previous sign-in, that the device can exchange for a full TGT in case there is a connection to On-Prem, but Azure AD is down/unavailable for some reason?

  • @theCMC

    @theCMC

    Жыл бұрын

    Great question. I’m going to guess that a connection to on-prem AD is not required for the ticket granting, but AAD is vital.

  • @derrickkassen897
    @derrickkassen8972 ай бұрын

    Hi there, how do I Set the AzureADKerberosServer object in my onpremise AD if i have different AD DNS names? my AD DNS name is internal and different to my Tenant one!

  • @geroldwaefler9485
    @geroldwaefler94859 ай бұрын

    Please explain me what is Cloud Kerberos trust deployment and is this by default on my Windows 10 or was this installed with a software installer ? It have made me a bluescreen.

  • @michaelpietrzak2067
    @michaelpietrzak2067 Жыл бұрын

    I know this is an older video but I have been studying up on this technique for some time now. If you configure that policy and apply it to hybrid devices, does that negate the need to configure it also in group policy on the local AD?

  • @kennethlindgren856

    @kennethlindgren856

    Жыл бұрын

    If the devices are managed with Intune yes, if they are managed with Configuration Manager you will need to configure it there or via GPO or set Configuration Manager to allow the specific devices to be managed via Intune.

  • @michaelpietrzak2067

    @michaelpietrzak2067

    Жыл бұрын

    @@kennethlindgren856 Thanks!

  • @adityadeshwal3406
    @adityadeshwal340610 ай бұрын

    Great video👍🏻. Quick question though regarding setting up Kerberos object. What would be the domain if i am running this on a server which is part of child domain and not root domain. Also the domain credentials, do they require Domain admin only or Both Domain admin+ enterprise Admin?

  • @jjstreicher-bremer309

    @jjstreicher-bremer309

    4 ай бұрын

    The "domain" used in the set-azureadkerberosserver command is the on-prem AD domain where your user accounts live. The domain credentials need to be a domain administrator in that same domain. The system from which that command is run needs to exist in the same AD forest.

  • @tharagz08
    @tharagz08 Жыл бұрын

    Great video, and thank you for the resilience on hashing out these discussions with everyone. I'd like to ask your opinion on existing devices though. After seeing this video, I certainly believe that is an ideal state to put net-new devices in for environments where things such as SMB file shares are still required. For existing devices though, from what I can tell, moving an AD-only joined machine and a hybrid joined machine to a cloud-only state are nearly the same process. If that is true, would it make sense to move existing devices to a hybrid state, and new devices to a cloud-only state?

  • @smileyshowers23
    @smileyshowers23 Жыл бұрын

    Thanks for this video.. This is really good.. Can you please share the link to the other video which you made saying No to Hybrid Domain Join..!!

  • @smileyshowers23

    @smileyshowers23

    Жыл бұрын

    Got it.. Found that in comments :)

  • @isaactam1029
    @isaactam1029 Жыл бұрын

    Hi thanks for the video! I can't seemed to access my on-prem file share with a synced hybrid AAD account on a Azure AD Joined devices. My klist is empty and it shows I have no permission to access the file share(I have given permission to the on-prem synced account). Can you show me how did you configure your file share or what could be the issue? Thanks!

  • @theCMC

    @theCMC

    Жыл бұрын

    The fileshare was configured in a very simple way. I don’t think the server side will be your issue.

  • @FPVMike
    @FPVMike10 ай бұрын

    Enabling Kerberos Cloud Trust Hybrid - How does it effect an existing tenant of users/computers? If i just want to test WHFB on a few devices is this possible or are there implications once kerberos cloud trust hybrid is enabled? Cheers for any advice.

  • @jjstreicher-bremer309

    @jjstreicher-bremer309

    4 ай бұрын

    No impact to the experience of the users, but you will note that the output of "dsregcmd /status" will start showing "OnPremTGT: Yes".

  • @breakingcustombc2925
    @breakingcustombc2925 Жыл бұрын

    Was amped to finally set this up until I realized our Domain Controller's are too old. Need to upgrade.

  • @theCMC

    @theCMC

    Жыл бұрын

    Aw man! Atleast you have a good reason to upgrade now!

  • @breakingcustombc2925

    @breakingcustombc2925

    Жыл бұрын

    @@theCMC Yeah we have to upgrade all of our 2012 R2 servers this year.

  • @OldFellaDave

    @OldFellaDave

    Жыл бұрын

    @@breakingcustombc2925 you aren't the only one, I have a bunch to upgrade as well. At least the File Server Migration wizard looks pretty good now ;)

  • @breakingcustombc2925

    @breakingcustombc2925

    Жыл бұрын

    @@OldFellaDave Yeah I heard some good things about the new wizard. My biggest issue is going to be legacy shit that was installed before I came on board (Flexnet, etc).

  • @rashkaViking
    @rashkaViking Жыл бұрын

    Hi! I wonder if you are in the same network or using vpn to access shared files or did you I miss something here? Can you clarify please?

  • @theCMC

    @theCMC

    Жыл бұрын

    I was on the same network. I had line of sight to the fileshare. The trick is not about accessing remotely, it’s about accessing without a domain joined device.

  • @clivebuckwheat
    @clivebuckwheat4 ай бұрын

    Dean will this work for existing AutoPiloted devices in my environment? That do not have Hybrid cloud Kerberos trust setup yet.I have about 500 autopiloted devices who want to access on-premises resources?

  • @theCMC

    @theCMC

    4 ай бұрын

    Yep, should work. Catch me on LinkedIn if you need help. /Dean

  • @clivebuckwheat

    @clivebuckwheat

    4 ай бұрын

    @@theCMC Well I am just testing this in my test lab before I try in my environment and I have an autopiloted machine and when i do a klist i have 0 cached. Everything else is setup correctly per your video

  • @jjstreicher-bremer309

    @jjstreicher-bremer309

    4 ай бұрын

    ​@@clivebuckwheat, if this device is EntraID joined, you won't have any kerberos tickets showing until you attempt to access a kerberos resource. Check the output of "dsregcmd /status" and make sure "OnPremTGT: Yes" is showing. Then you can attempt to accesss an on-prem file resource and verify it is working there. I use the sysvol file share that exists on all AD domain controllers. Something like "dir \\onPremDomain.Name.here\sysvol" will trigger an attempted Kerberos auth.

  • @wilmomerino9604
    @wilmomerino9604 Жыл бұрын

    I set this up in my home lab and it appears to be working but when I run klist it says there are no cached tickets.

  • @user-qb4qs2by1b

    @user-qb4qs2by1b

    11 ай бұрын

    You might missed configuring the Kerberos ticket server as per the guide that he posted above in the comment section :)

  • @eirikhjortdahl8944
    @eirikhjortdahl8944 Жыл бұрын

    hi, this is working great...but not for all users. They are not special in any way that I can see. Any tips on how to troubleshoot them?

  • @jjstreicher-bremer309

    @jjstreicher-bremer309

    4 ай бұрын

    It is important to define what "not working" acatually means. If we assume that these users are able to enroll in the credential and the issue is with using the credential with on-prem resoruces, the best troubleshooting tool is a network trace. Take a look at the Kerberos traffic and, specifically, the response from the domain controller.

  • @eirikhjortdahl8944

    @eirikhjortdahl8944

    4 ай бұрын

    Got this sorted out. Certificate issue. Thanks for you reply :-)@@jjstreicher-bremer309

  • @itsolution1099
    @itsolution10998 ай бұрын

    Hi Nice video, I would like to inquire about we have 2012 R2 DC along with Server 2019. Does WHFB-Cloud Kerberos Trust model compatible for Server 2012R2.

  • @jjstreicher-bremer309

    @jjstreicher-bremer309

    4 ай бұрын

    Server 2012R2 is out of support and Cloud Kerberos Trust is not compatible with that version of the OS. You must have at least one Server 2016 or newer DCs in each AD site where users will authenticate.

  • @mactastic144
    @mactastic1443 ай бұрын

    What if they're using a VPN to access their on-premise resources?

  • @theCMC

    @theCMC

    2 ай бұрын

    This will work fine, as long as the VPN is not requiring a certificate for authentication. User-based authentication will work fine.

  • @leastmachine8693
    @leastmachine8693 Жыл бұрын

    I realize it's outside the scope of the video, but how did you configure the custom branding you can see at 8:10?

  • @theCMC

    @theCMC

    Жыл бұрын

    I cover it in this video: kzread.info/dash/bejne/pmqGrtqsd6azZqQ.html

  • @MatthewJenner
    @MatthewJenner Жыл бұрын

    Best practice is to rotate the Kerberos key every 30 days. Have you been able to automate rotation through an Azure automation runbook?

  • @LitheInLitotes

    @LitheInLitotes

    7 ай бұрын

    No need

  • @abdullahX001
    @abdullahX001 Жыл бұрын

    Where is the original say no to hybrid video? I could not find it from searching...

  • @theCMC

    @theCMC

    Жыл бұрын

    I added it as a card at the top right, but it's easy to miss and might not appear on the platform you're using. My bad. here it is :-) kzread.info/dash/bejne/ZoZhzdSjobSxlqg.html

  • @abdullahX001

    @abdullahX001

    Жыл бұрын

    @@theCMC Thank you, just me being a tad blind :)

  • @networkn
    @networkn17 күн бұрын

    Do you have a video which is more designed for absoute beginners? This all feels a bit rushed and designed for people who are more familar with the products than I am? :)

  • @theCMC

    @theCMC

    17 күн бұрын

    A video about Intune, or Hybrid Cloud Kerberos Trust?

  • @networkn

    @networkn

    17 күн бұрын

    @@theCMC cloud trust and or windows hello.

  • @ofirsztejnworcel2179
    @ofirsztejnworcel2179 Жыл бұрын

    This is not true. You could only access you on-prem resources because your Azure AD joined device and your DC were on the same subnet. Try accessing your on-prem resources when your DC and AADJ on different networks.

  • @theCMC

    @theCMC

    Жыл бұрын

    Well… not necessarily in the same subnet, but accessible in the network. It’s required to actually be able to access the network location of the resources. That can be solved by either being in the same network location connected by switches, or via a VPN, or via any other method that gives network access. The point of the video wasn’t that Cloud Only devices can magically defy networking constraints.

  • @leastmachine8693

    @leastmachine8693

    Жыл бұрын

    How would you propose getting access to on-premise resources while not connected in some way to the on-premise environment?

  • @ofirsztejnworcel2179

    @ofirsztejnworcel2179

    Жыл бұрын

    @@leastmachine8693 Through AD Connect, I guess... I thought that was the whole magic 🤦🏻‍♂️

  • @livewindow6799
    @livewindow6799 Жыл бұрын

    Hello Sir , line of sight to a DC

Келесі