Windows Hello for Business is based on the Web Authentication API (WebAuthN) APIs.
Windows Hello works with Azure, Microsoft Active Directory and Third-party Federation servers that support the necessary extensions to OAuth 2.0 and OpenID Connect 1.0.
Windows Hello also may be used with Browsers that support Web Authentication API(WebAuthN).
A future release of Windows 10, Windows Logon will support SAML identity providers -- not just identities federated to ADFS and other WS-Federation providers.
Windows Hello allows passwords to be transmitted to Domain Controller, PINs are not. They are tied to one device, and if compromised, only one device is affected. Backed by a Trusted Platform Module (TPM) chip, Microsoft Windows uses PINs to create strong Asymmetric Key pairs which causes the much-simpler Windows PINs to be resilient to brute-force attacks.
Windows Hello (Windows Hello Hardware Authenticator and Windows Hello Software Authenticator) was certified as FIDO2 Compliant in 2019.
Windows Hello, as you may know, is Microsoft’s premiere passwordless solution for devices where the user and device share one to one relationship. Each user on the device gets that one prior key that is authorized by a simple gesture, a PIN, face, or fingerprint.
Windows Hello for Business is and enhanced Windows Hello that always two factors, with one gesture being position of the private key and the other being the gesture used for Authorization.
In the Hybrid model of AD Connect for Azure the Implementation of WebAuthN with Windows Hello:
![]() |