SC‑300 Study Portal Path 3

Unit 4: Implement an Authentication Solution Based on Windows Hello for Business

What is Windows Hello for Business

Windows Hello for Business replaces passwords with strong two-factor authentication on Windows devices.

The user’s credential:

✅ Asymmetric Key Pair

This replaces the password as the primary credential. The private key never leaves the device.

✅ Certificate-Based Option

This is common in hybrid environments with on-prem AD and PKI infrastructure.

✅ “Tied to the device”

Problems with passwords that Windows Hello solves:

How Windows Hello for Business Works – Key Points

Two-factor concept:

The private key:

Key container:

Security Groups for Windows Hello for Business

To simplify deployment, you use security groups.

🔐 Where These Groups Live

These groups are used to delegate permissions within AD—specifically, to allow Microsoft Entra Connect (or other sync tools) to write the msDS-KeyCredentialLink attribute on user objects. That attribute stores the public key portion of a Windows Hello for Business credential.

KeyCredential Admins (or KeyAdmins)

Creating KeyCredential Admins (older environments):

Windows Hello for Business Users Group

Steps:

Microsoft Pluton Security Processor

Traditional model:

Pluton architecture:

Traditional TPM Setup:

Pluton’s Approach:

✅ Think of it like moving your vault inside the CPU, instead of keeping it in a separate room connected by a hallway someone could sneak into.

Pluton is a hardware security processor built directly into the CPU, and it emulates a TPM.

✅ So when Pluton is active, it is the TPM—there’s no separate chip involved.

Feature Traditional TPM Pluton
Location Separate chip Inside CPU
Communication External bus (vulnerable) Internal (sealed)
TPM Role Dedicated chip Emulated by Pluton

Summary: Pluton removes the exposed CPU ↔ TPM bus, preventing attackers from physically tapping into it.

🧨 What Does “Physical Access” Mean?

Most attackers are remote. But physical access attacks are a real concern in high-security environments. Here's what it means:

✅ Physical Access = Attacker Has the Device

This is common in targeted attacks, espionage, or supply chain compromise scenarios.

Key points: