{"id":37973,"date":"2025-05-08T00:02:37","date_gmt":"2025-05-07T22:02:37","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=37973"},"modified":"2025-05-07T18:22:05","modified_gmt":"2025-05-07T16:22:05","slug":"windows-server-issues-with-windows-hello-issue-and-kerberos-events-caused-by-april-2025-updates-confirmed","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2025\/05\/08\/windows-server-issues-with-windows-hello-issue-and-kerberos-events-caused-by-april-2025-updates-confirmed\/","title":{"rendered":"Windows Server: Issues with Windows Hello issue and Kerberos events caused by April 2025 updates confirmed"},"content":{"rendered":"<p><img decoding=\"async\" style=\"margin: 0px 10px 0px 0px; display: inline; float: left;\" title=\"Windows\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2021\/04\/Windows-klein.jpg\" alt=\"Windows\" width=\"200\" align=\"left\" \/>[<a href=\"https:\/\/www.borncity.com\/blog\/2025\/05\/08\/windows-server-april-2025-updates-windows-hello-problem-und-kerberos-ereignisse-bestaetigt\/\" target=\"_blank\" rel=\"noopener\">German<\/a>]The April 2025 security updates for Windows Server may cause problems with domain controllers so that Kerberos event IDs 45 and 21 are logged. Microsoft has confirmed this problem and writes that logging in with Windows Hello in Key Trust mode can fail. Private users are probably not affected by these problems, because they don't use Domain Controllers.<\/p>\n<p><!--more--><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vg06.met.vgwort.de\/na\/1cad1401e86742b1b0870fe17eeaf7a1\" alt=\"\" width=\"1\" height=\"1\" \/>On April 8, 2025, Microsoft rolled out security updates for Windows clients and servers that close various vulnerabilities (mentioned in <a href=\"https:\/\/borncity.com\/win\/2025\/04\/09\/microsoft-security-update-summary-april-8-2025\/\">Microsoft Security Update Summary (April 8, 2025)<\/a>). For Windows Server, the updates are listed in the article <a href=\"https:\/\/borncity.com\/win\/2025\/04\/09\/patchday-windows-server-updates-8-april-2025\/\">Patchday: Windows Server-Updates (April 8, 2025)<\/a>.<\/p>\n<h2>Hello logon problem and Kerberos events<\/h2>\n<p>As of May 6, 2025, Microsoft has published the support article <a href=\"https:\/\/learn.microsoft.com\/en-us\/windows\/release-health\/status-windows-server-2025#1596msgdesc\" target=\"_blank\" rel=\"noopener\">Logon might fail with Windows Hello in Key Trust mode and log Kerberos Events<\/a> in the Windows Release Health dashboard of Windows Server 2025 (and other server versions). There Microsoft confirms problems after installation of the monthly Windows security update from April 8, 2025 (for Windows Server 2025 this is KB5055523) or later updates.<\/p>\n<p>Active Directory Domain Controllers (DC) may experience problems when processing Kerberos logins or delegations, it is reported. These occur when the Kerberos logins or delegations use certificate-based credentials that are based on key trust via the Active Directory field <em>msds-KeyCredentialLink<\/em>.<\/p>\n<p>According to Microsoft, this can lead to authentication problems in Windows Hello for Business (WHfB) key trust environments or in environments where Device Public Key Authentication (also known as Machine PKINIT) is used. It is also possible that other products that rely on this function are also affected. Microsoft mentions smart card authentication products, third-party single sign-on (SSO) solutions and identity management systems in this context.<\/p>\n<p>Affected protocols are Kerberos Public Key Cryptography for Initial Authentication (Kerberos PKINIT) and certificate-based Service-for-User Delegation (S4U) via Kerberos Constrained Delegation (KCD or A2D2 Delegation) and Kerberos Resource-Based Constrained Delegation (RBKCD or A2DF Delegation).<\/p>\n<p>This problem is related to the protection against the vulnerability described in <a href=\"https:\/\/support.microsoft.com\/help\/5057784\" target=\"_blank\" rel=\"noopener noreferrer\" data-linktype=\"external\">KB5057784, Protections for CVE-2025-26647 (Kerberos Authentication)<\/a>, which will be closed by the security updates such as KB5057784 (for Server 2025). Subsequent updates will also cause these problems.<\/p>\n<p>The background: Starting with the Windows updates released on April 8, 2025 and later, the method used by DCs to check the certificates used for Kerberos authentication has changed. If the April 2025 update is installed, they will check if the certificates are chained to a root in the NTAuth store (described in <a href=\"https:\/\/support.microsoft.com\/help\/5057784\" target=\"_blank\" rel=\"noopener noreferrer\" data-linktype=\"external\">KB5057784<\/a>).<\/p>\n<p>This behavior can be prevented by the registry value AllowNtAuthPolicyBypass in the key:<\/p>\n<pre>HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Kdc<\/pre>\n<p>If <em>AllowNtAuthPolicyBypass<\/em> is not present, the DC behaves as if the value was configured to \"1\". If the problem occurs, two symptoms can be observed:<\/p>\n<ul>\n<li>If the registry value <em>AllowNtAuthPolicyBypass<\/em> is set to \"1\" on the authenticating DC, the Kerberos Key Distribution Center event ID 45 is repeatedly recorded in the DC system event log. The event is logged with the text \"The Key Distribution Center (KDC) encountered a client certificate that was valid but did not chain to a root in the NTAuth store\" or similar. Even if numerous events with this ID are logged, the associated logon processes should otherwise be successful and no other problems outside of these event logs can be observed.<\/li>\n<li>If the registry value <em>AllowNtAuthPolicyBypass<\/em> is set to \"2\" on the authenticating DC, user logins will fail. Then a Kerberos key distribution center event ID 21 is entered in the DC system event log with a text such as: \"The client certificate for the user is not valid and resulted in a failed smartcard logon.\" or similar. There is a workaround, because the effects on the user only occur if the registry key <em>AllowNtAuthPolicyBypass<\/em> is set to a value of \"2\". To prevent the resulting logon errors, administrators should temporarily reset <em>AllowNtAuthPolicyBypass<\/em> from \"2\" to \"1\" (see section Registry settings in <a href=\"https:\/\/support.microsoft.com\/help\/5057784\" target=\"_blank\" rel=\"noopener noreferrer\" data-linktype=\"external\">KB5057784<\/a>).<\/li>\n<\/ul>\n<p>Microsoft writes that it is aware of this problem. Windows Server 2025; Windows Server 2022; Windows Server 2019; and Windows Server 2016 are affected. Redmond emphasizes that it is important to them that companies can closely monitor and test compliance with security measures using the registry values available after the Windows updates of April 8, 2025. Microsoft's developers are working on a solution and will provide an update as soon as possible. (<a href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/microsoft-april-updates-cause-windows-server-auth-issues\/\" target=\"_blank\" rel=\"noopener\">via<\/a>)<\/p>\n<p><strong>Similar articles:<\/strong><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2025\/04\/09\/microsoft-security-update-summary-april-8-2025\/\">Microsoft Security Update Summary (April 8, 2025)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2025\/04\/09\/patchday-windows-10-11-updates-april-8-2025\/\">Patchday: Windows 10\/11 Updates (April 8, 2025)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2025\/04\/09\/patchday-windows-server-updates-8-april-2025\/\">Patchday: Windows Server-Updates (April 8, 2025)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2025\/04\/10\/patchday-microsoft-office-updates-april-8-2025\/\">Patchday: Microsoft Office Updates (April 8, 2025)<\/a><\/p>\n<p><a href=\"https:\/\/borncity.com\/win\/2025\/04\/09\/word-excel-2016-crashing-after-april-2025-update-kb5002700\/\">Word\/Excel 2016 crashing after April 2025 update KB5002700<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2025\/04\/09\/outlook-2016-calendar-access-blocked-after-april-2025-update-kb5002700\/\" rel=\"bookmark\">Outlook 2016: Calendar access blocked after April 2025 update KB5002700<\/a><\/p>\n<p><a href=\"https:\/\/borncity.com\/win\/2025\/02\/22\/windows-10-11-and-server-hardening-timeline-for-2025-and-beyond\/\" rel=\"bookmark\">Windows 10\/11 and Server hardening: Timeline for 2025 and beyond<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2025\/04\/11\/windows-kerberos-pac-validation-protocol-in-enforcement-mode-since-april-8-2025\/\" rel=\"bookmark\">Windows: Kerberos PAC Validation Protocol in enforcement mode since April 8, 2025<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]The April 2025 security updates for Windows Server may cause problems with domain controllers so that Kerberos event IDs 45 and 21 are logged. Microsoft has confirmed this problem and writes that logging in with Windows Hello in Key Trust &hellip; <a href=\"https:\/\/borncity.com\/win\/2025\/05\/08\/windows-server-issues-with-windows-hello-issue-and-kerberos-events-caused-by-april-2025-updates-confirmed\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[463,580,22,2],"tags":[47,2906,69,195,159],"class_list":["post-37973","post","type-post","status-publish","format-standard","hentry","category-issue","category-security","category-update","category-windows","tag-issue","tag-patchday-4-2025","tag-security","tag-update","tag-windows-server"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/37973","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=37973"}],"version-history":[{"count":6,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/37973\/revisions"}],"predecessor-version":[{"id":37979,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/37973\/revisions\/37979"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=37973"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=37973"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=37973"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}