Skip to content

Windows Hello for Business with Mideye MFA on ADFS

This page provides an overview of how Windows Hello for Business (WHFB) can work with Mideye multi-factor authentication on ADFS. After WHFB is configured, users enrol a PIN (or biometric) during their first sign-in and are prompted for Mideye MFA as part of the enrolment flow.

ComponentVersions
Windows Server (ADFS)2019 / 2016
ADFS version4.0 (2016) / 3.0 (2012 R2)
Mideye Server4.7.2 or later
Mideye ADFS ModuleRequired on every ADFS server

WHFB with Mideye ADFS MFA works with the following deployment models:

  • On-Premises Key Trust Deployment
  • On-Premises Certificate Trust Deployment
  • Hybrid Entra ID Joined Key Trust Deployment
  • Hybrid Entra ID Joined Certificate Trust Deployment
  • Mideye Server 4.7.2 or later, reachable from the ADFS server(s) on UDP port 1812.
  • Mideye ADFS Module installed on every ADFS server — see the ADFS Mideye Module installation guide.
  • Each ADFS server must be defined as a RADIUS client in Mideye Server.
  • If a firewall exists between ADFS and Mideye Server, allow two-way UDP traffic on port 1812.
  • ADFS 2.0 is not supported.

Once the WHFB Group Policy is applied and the Mideye ADFS Module is installed, the following enrolment flow is presented to the user:

Windows sign-in screen prompting for username and password — first login after WHFB GPO is applied

On the first sign-in after the GPO is applied, the user enters their username and password as usual.

Windows Hello for Business enrolment prompt — user clicks Set up PIN

The WHFB enrolment process begins. The user clicks Set up PIN.

Authentication method selection — user chooses Strong authentication (Mideye MFA)

If multiple authentication methods are configured, the user selects Strong authentication (Mideye MFA).

Mideye MFA challenge screen — user enters OTP or accepts Touch notification

The user’s credentials are forwarded to the ADFS federation server. Mideye presents a challenge — the user enters the OTP, or if using Touch Accept, simply accepts the push notification.

Windows Hello PIN creation screen — user sets a PIN for future logins

After successful MFA, the user creates a PIN. On subsequent logins, this PIN (or biometric) replaces the username and password.


SymptomCheck
WHFB enrolment does not startVerify the Group Policy is applied to the user or computer.
”Set up PIN” does not appearConfirm ADFS is configured as the identity provider and the WHFB policy is linked.
MFA challenge not presentedVerify the Mideye ADFS Module is installed and enabled on all ADFS servers.
OTP / Touch Accept failsCheck that the ADFS server is defined as a RADIUS client in Mideye Server and that UDP 1812 is open.
”Strong authentication” option missingConfirm the Mideye MFA provider is registered in ADFS authentication policies.