Introduction to M365 kerberos.microsoftonline.com
This blog post provides a technical overview of how Microsoft 365 and Microsoft Entra ID (formerly Azure Active Directory) use the special Kerberos realm kerberos.microsoftonline.com for single sign-on (SSO), cloud Kerberos trust, and enabling Entra-joined (Azure AD–joined) devices to access on-premises resources. It explains how the system works, what is contained in the primary refresh token (PRT), how the device knows which endpoint to use for requesting Kerberos tickets, and the configurations required.
Background: Kerberos at a glance
Kerberos is a widely used network authentication protocol that relies on tickets:
- A client obtains a ticket-granting ticket (TGT) from a Key Distribution Centre (KDC).
- The client uses the TGT to request service tickets for individual services.
- A service ticket allows access to the service without prompting for additional credentials.
In a traditional on-premises Active Directory (AD) environment, domain controllers act as the KDC. In the cloud, Microsoft Entra ID provides KDC-like capabilities by issuing and validating Kerberos tickets for the kerberos.microsoftonline.com realm.
Why ‘kerberos.microsoftonline.com’ as a realm?
Microsoft Entra ID is not a traditional LDAP-based domain controller, yet it includes the functionality required to issue and validate Kerberos tickets. This capability supports:
- Seamless single sign-on (SSO) for Entra-joined or hybrid-joined Windows devices
- Windows Hello for Business cloud Kerberos trust and FIDO2-based passwordless authentication
- Access to on-premises resources from cloud-joined devices without prompting for on-premises credentials
To differentiate its cloud-issued tickets from on-premises AD realms (for example, CONTOSO.COM
), Microsoft uses kerberos.microsoftonline.com as the dedicated Kerberos realm.
The primary refresh token (PRT) and Kerberos
What is the PRT?
When a user signs in to a Windows device that is Entra-joined or hybrid-joined, Microsoft Entra ID issues a primary refresh token (PRT). It is cryptographically bound to both the user and the device. The PRT:
- Grants continuous access to Microsoft 365 and other Entra ID–protected resources
- Is protected by the device’s hardware (via TPM if available)
- Contains sufficient user and device identity data for silent token and ticket acquisition
How the PRT enables cloud Kerberos
The PRT process is used to get various pieces of information, including the PRT itself, a Cloud TGT, a FIDO TGT (optional), a Realm mapping and the Entra ID tenant details.
How the device knows where to obtain the Kerberos ticket
Windows locates the Entra ID endpoints for Kerberos by querying the well-known metadata endpoints. When the device authenticates with Entra ID, it retrieves service information that includes the specific URL for Kerberos ticket requests. The endpoint references come from the OpenID Connect or common endpoints metadata document published by Microsoft Entra ID at the following address:
https://login.microsoftonline.com/
This metadata indicates how the client should request Kerberos tickets from kerberos.microsoftonline.com. In the metadata there is the kerberos_endpoint property, which is usually something like https://login.microsoftonline.com/
Cloud Kerberos trust
Overview
Cloud Kerberos trust is a Windows Hello for Business (WHfB) deployment option where Microsoft Entra ID issues Kerberos tickets in the kerberos.microsoftonline.com realm. Once the user has authenticated (for example, via PIN or biometric in WHfB), Entra ID provides a TGT for kerberos.microsoftonline.com. Windows Hello for Business then enables the user to access:
- Cloud resources (SharePoint Online, Exchange Online, etc.)
- On-premises resources (file shares, printers, and line-of-business apps), via Cloud Kerberos Trust
Prerequisites for cloud Kerberos trust
- Hybrid identity: Synchronise on-premises AD with Microsoft Entra ID (using Azure AD Connect / Microsoft Entra Connect). Password hash synchronisation (PHS) or pass-through authentication must be set up.
- Windows Hello for Business (cloud Kerberos trust): Configure your environment so on-premises domain controllers recognise Entra ID–issued Kerberos tickets.
- Device registration: Ensure Windows devices are Entra-joined or hybrid-joined so they can receive a PRT.
Accessing on-premises resources from Entra-joined devices
The challenge
A purely cloud-joined device does not automatically hold an on-premises TGT. Traditionally, domain-joined machines contact an on-premises domain controller (e.g., CONTOSO.COM
) to retrieve a TGT. To allow a user on an Entra-joined device to access on-premises resources without re-entering credentials, you must set up a trust that recognises cloud-issued Kerberos tickets.
The bridge: Entra ID Kerberos trust
Microsoft Entra ID issues a kerberos.microsoftonline.com TGT after validating the user’s PRT. Entra ID then uses a Kerberos trust arrangement with on-premises AD so domain controllers accept tickets that Entra ID signs. This arrangement involves:
- A Kerberos service account krbtgt_AzureAD in on-premises AD
- A Read Only Domain Controller object (often named AzureADKerberos) in on-premises AD that controls what can use the trust (e.g. by default protected users cannot leverage this trust)
- Shared cryptographic secrets that let on-premises AD verify tickets issued by Entra ID
Windows uses its TGT from kerberos.microsoftonline.com to request service tickets for on-premises services. On-premises domain controllers validate these tickets if the trust is configured properly.
End-to-end flow: SSO with Kerberos in Microsoft Entra ID
-
User sign-in
The user signs in on a Windows device that is Entra-joined or hybrid-joined. The device acquires a PRT that is cryptographically bound to the user and device. -
Obtain a cloud TGT
The CloudAP plug-in consults the Entra ID metadata to locate the Kerberos endpoint for kerberos.microsoftonline.com. It presents the PRT to prove the user’s identity. Entra ID issues a TGT in that realm. - Use the TGT
- For cloud resources, the client may use Kerberos tickets or OAuth tokens, depending on the service.
- For on-premises resources, if cloud Kerberos trust is enabled, the cloud TGT can be passed to an on premises Domain Controller to get a TGT and can then be used to request service tickets as normal.
- No separate credential prompt
The user enjoys seamless single sign-on, including to on-premises file shares, printers, and apps, because on-premises AD trusts the initial ticket that Entra ID has issued.
Required configuration
Directory synchronisation
- Azure AD Connect / Microsoft Entra Connect synchronises on-premises AD data into Entra ID.
- Password hash synchronisation (PHS) or pass-through authentication allows Entra ID to validate user credentials without contacting the domain controller on every sign-in.
Windows Hello for Business (cloud Kerberos trust)
- Enable Windows Hello for Business with cloud Kerberos trust so that Microsoft Entra ID can serve as a trusted Kerberos authority.
- This provides passwordless sign-in and ensures that on-premises AD validates the Entra ID–issued TGT.
Kerberos service account in on-premises AD
- A Read Only Domain Controller object (often named AzureADKerberos) is created in your on-premises AD.
- A Kerberos service account krbtgt_AzureAD in on-premises AD
- Microsoft Entra ID leverages the key material of this account to sign Kerberos tickets that on-premises DCs recognise.
Device registration and PRT issuance
- Windows devices must be Entra-joined or hybrid-joined so they can receive a PRT.
- The PRT process is crucial for silent ticket acquisition from the kerberos.microsoftonline.com realm.
Troubleshooting tips
-
Check for a TGT
Runklist tickets
in Command Prompt or PowerShell to verify that a TGT for krbtgt/kerberos.microsoftonline.com is present. Runklist cloud_debug
to check the overall cloud TGT process. - Examine event logs
- In Event Viewer, open Applications and Services Logs → Microsoft → Windows → AAD to see CloudAP logs.
- Check on-premises domain controller logs for evidence of validating cloud-issued Kerberos tickets.
- Verify Azure AD Connect
Confirm that password synchronisation or pass-through authentication is working. Ensure user UPNs, SIDs, and domain data are correctly synchronised.
Conclusion
Microsoft Entra ID (formerly Azure AD) acts as a cloud KDC by issuing Kerberos tickets in the kerberos.microsoftonline.com realm. The PRT Process on a Windows device enables automatic TGT acquisition whenever Kerberos authentication is required. Cloud Kerberos trust ensures on-premises domain controllers accept these tickets, delivering seamless SSO to both cloud and on-premises resources.
Key points:
- kerberos.microsoftonline.com is the realm used by Entra ID to issue cloud Kerberos tickets.
- The PRT process collects the information the device needs to request a Kerberos TGT from Entra ID.
- The device discovers the Kerberos endpoint from well-known OpenID Connect metadata.
- Azure AD Connect synchronises on-premises identity data, enabling Entra ID to create valid service tickets for those on-premises domains.
- Cloud Kerberos trust allows on-premises AD to validate and accept the Cloud TGT from Entra ID, providing true single sign-on without additional prompts.
Comments