{"id":10031,"date":"2024-06-26T07:00:43","date_gmt":"2024-06-26T14:00:43","guid":{"rendered":"https:\/\/www.microsoft.com\/insidetrack\/blog\/?p=10031"},"modified":"2024-06-26T07:25:17","modified_gmt":"2024-06-26T14:25:17","slug":"implementing-strong-user-authentication-with-windows-hello-for-business","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/insidetrack\/blog\/implementing-strong-user-authentication-with-windows-hello-for-business\/","title":{"rendered":"Implementing strong user authentication with Windows Hello for Business"},"content":{"rendered":"

\"Microsoft
\n[Editor\u2019s note: This content was written to highlight a particular event or moment in time. Although that moment has passed, we\u2019re republishing it here so you can see what our thinking and experience was like at the time.]<\/em><\/p>\n

Deploying Windows Hello for Business internally here at Microsoft has significantly increased our security when our employees and vendors access our corporate resources. This feature offers a streamlined user sign-in experience\u2014it replaces passwords with strong two-factor authentication by combining an enrolled device with a PIN or biometric user input for sign in. Windows Hello was easy to implement within our existing identity infrastructure and is compatible for use within our remote access solution.<\/p>\n

The Windows Hello for Business feature can replace passwords with strong two-factor authentication that combines an enrolled device with a PIN or biometric (fingerprint or facial recognition) user input to sign in. We\u2014the Microsoft Digital Employee Experience team\u2014streamlined the deployment of this feature as an enterprise credential to improve our user sign-in experience and to increase the security of accessing corporate resources.<\/p>\n

Using this feature, users can authenticate to a Microsoft account, an Active Directory account, or a Microsoft Azure Active Directory (Azure AD) account.<\/p>\n

The Windows Hello for Business feature is a public key or certificate-based authentication approach that goes beyond passwords. This form of authentication relies on key pairs that can replace passwords and are resistant to breaches, thefts, and phishing.<\/p>\n

Other benefits of this feature include:<\/p>\n