How to authenticate with Windows Hello for Business or FIDO security key in RDP session ?

This little guide will show how you can authenticate with Windows Hello for Business and FIDO2 security key in a RDP session. Let’s get rid of those passwords !

Content

Demo Video of Authentication with WHfB and FIDO in RDP session

Setup is based on Azure VM (AD hybrid-joined Windows Server 2022), which I’m accessing from my home computer (Windows 11, Entra ID-Joined) using RDP session. I’m using Windows Hello for Business Kerberos Trust and FIDO2 security key in the demo to sign-in.

Demo #1 shows a Windows Hello for Business with Facial Recognition login in the RDP session. Demo #2 shows a Security Key (FIDO2 key) login in the RDP session. Hardware from my local computer is accessible in the RDP session using Web Authentication.

Windows Client with FIDO passkey (picture)

RDP Session can use Windows Hello for Business and FIDO2 coming from my local computer in the RDP session. In this example, I’m using a Feitian K40 FIDO2 passkey in my home computer.

Supported Platforms

Support / PlatformWindows ClientsWindows Servers
SupportedWindows 11 22H2 and higher
Windows 10 22H2 and higher
Windows 2025
Windows 2022
UnsupportedWindows 2019
Windows 2016
Windows 2012 R2

How to enable feature with Remote Desktop Connection (MSTSC) or similar remote connection tool

You just have to enable Web Authentication in both the RDP Session Host (Windows Server/Client acting as host/target) and Client (guest, which you are connecting with/source).

Below are 2 methods shown; AD Group Policy and Intune.

AD Group Policy

If you don’t see all below policies, download Windows 11 24H2 Administrative Templates and copy the ADMx/ADMl files into PolicyDefinition using this guide.

Windows Client Policy via Microsoft Intune

How to enable on AVD / Windows 365 / Microsoft Dev Box

How to enable on Azure Virtual Desktop – AVD (Microsoft Learn article)

How to enable on Windows 365 (Microsoft Learn article)

How to enable on Microsoft Dev Box (Microsoft Learn article)

7 thoughts on “How to authenticate with Windows Hello for Business or FIDO security key in RDP session ?”

  1. Are you a local admin in the windows server when signing in using web auth? Or just a user in the ‘remote desktop group’.

    Reply
  2. Hi Morten,
    Sorry but am I blind? I cannot see where you do the RDP session to a server using either WHfB or FIDO2. What I do see is, you logging on to a Microsoft website using MFA.
    Am I overlooking something?
    Thanks,
    Jørgen

    Reply
  3. Fair enough, I didn’t show that on the demo but you can signin with it as well. Traditionally whfb/fido hasn’t worked in a rdp session and that was the core of this demo

    Reply
    • OK. Understood. But bummer! 🙁
      Because that is what I really hoped to see. And I figured that, since the post was very recent, some new, previously unknown features would be shown! It’s interesting for me, because we are struggling with a requirement that ALL logins must happen with MFA, and we don’t yet have a PAM implementation in place to cover servers and other privileged accesses.

      Reply
  4. Hi you can now use FIDO or any other auth method configured in Entra ID when signing in to an RDP session. That is doable, did it this week with Windows 11 client and Windows Server 2025 🙂 you just need to enable web sign in on the advanced tab of the mstsc client and make sure the account you use to sign in is seen in the cloud (synced) and by the server (which must also be hybrid joined) and has some mfa methods configured to test it

    Reply
  5. Hi Morten, do you know if there is documentation from Microsoft on this? The only WHfB model I’ve read that supports RDP is Cert Trust. Sounds like this all works because of WebAuth option for rdp, but would like to find documentation on this. Thanks.

    Reply

Leave a Reply