Forum Discussion

3 Replies

  • Steskalj's avatar
    Steskalj
    Steel Contributor

    Add MFA server as part of Windows Server as a service. This would fix the issue. 

  • MichaelC's avatar
    MichaelC
    Copper Contributor

    My personal recommendation is to use Windows Hello, TAP, and External Security keys attached to Entra ID accounts and then use Passwordless security key sign-in to on-premises resources - Microsoft Entra ID | Microsoft Learn in order to obtain kerberos tickets to on-premises Active Directory.

    Likewise, you should enable Credential Guard on all endpoints to guard those issued TGTs. Furthermore, for alternate accounts and such, you can leverage X.509 smart card certificates to do things like RDP sign-in as a different account.

  • MichaelC's avatar
    MichaelC
    Copper Contributor

    The request here is pretty loaded to be honest. But I might put up a blog post on it myself as to why this could be a bit more challenging than you'd think :) Not the least of which would require modifications to PKINIT to support Passkeys directly.

Resources