Checking Windows Hello Key Storage: TPM or Software?
Windows Hello for Business (WHfB) stores a cryptographic key on the device. The preferred storage location is a hardware TPM module. However, if a TPM is not available, the key may be stored in the filesystem instead. It’s surprisingly hard to determine the storage location for existing Windows Hello for Business keys. This article presents a simple solution.
Windows Hello Key Storage Provider
Windows Hello for Business keys are managed by the Microsoft Passport Key Storage Provider.
Listing a Provider’s Keys With Certutil
certutil command-line tool has the capability to list the keys for a given provider. The Microsoft Passport Key Storage Provider keys can be retrieved with the following command (must be run as the user whose keys you’re interested in):
C:\>certutil -csp "Microsoft Passport Key Storage Provider" -key
With a Microsoft account, the output looks like this:
Microsoft Passport Key Storage Provider: USER-SID/GUID/login.live.com//SOME-ID RSA
With an Azure Active Directory (AAD) account, the output format is a little different:
Microsoft Passport Key Storage Provider: USER-SID/GUID/login.windows.net/AAD-TENANT-ID/USER-PRINCIPAL-NAME RSA
Please note that I replaced my keys’ identifiers with the placeholders
NgcKeyImplType: Hardware (TPM) or Software?
In order to determine a key’s storage location, we add the
-v parameter to the
C:\>certutil -csp "Microsoft Passport Key Storage Provider" -key -v
Let’s examine the
NgcKeyImplType section of the output. A key stored in a hardware trusted platform module (TPM) generates the following:
NgcKeyImplType: 1 (0x1) NCRYPT_IMPL_HARDWARE_FLAG -- 1 (NCRYPT_IMPL_SOFTWARE_FLAG -- 2) (NCRYPT_IMPL_REMOVABLE_FLAG -- 8) (NCRYPT_IMPL_HARDWARE_RNG_FLAG -- 10 (16))
The weird formatting does not make it immediately obvious, but in the above output, the value is NCRYPT_IMPL_HARDWARE_FLAG (1).
A key stored by a software provider on disk generates the slightly different output:
NgcKeyImplType: 2 (0x2) (NCRYPT_IMPL_HARDWARE_FLAG -- 1) NCRYPT_IMPL_SOFTWARE_FLAG -- 2 (NCRYPT_IMPL_REMOVABLE_FLAG -- 8) (NCRYPT_IMPL_HARDWARE_RNG_FLAG -- 10 (16))
In this case, the value is NCRYPT_IMPL_SOFTWARE_FLAG (2).
The four possible values for
NgcKeyImplType are documented as follows:
- NCRYPT_IMPL_HARDWARE_FLAG: the provider is hardware based.
- NCRYPT_IMPL_SOFTWARE_FLAG: the provider is software based.
- NCRYPT_IMPL_REMOVABLE_FLAG: the provider is removable.
- NCRYPT_IMPL_HARDWARE_RNG_FLAG: the provider is a hardware based random number generator.
This answers the question asked in the title. The remainder of this article sheds light on additional details such as key migration from software to hardware storage.
Finding a Key’s Certificate
To find the certificate a key belongs to, we can run the following command (again, as the user, Hello puts certificates in the
C:\>certutil -user -store My
In the case of an Azure Active Directory user account, the certificate’s
Key Container properties are identical to the key name as shown above. Sample output:
================ Certificate 2 ================ Serial Number: 12345678901234567890123456789012 Issuer: CN=USER-SID/GUID/login.windows.net/AAD-TENANT-ID/USER-PRINCIPAL-NAME NotBefore: 11.10.2019 21:50 NotAfter: 11.10.2049 22:00 Subject: CN=USER-SID/GUID/login.windows.net/AAD-TENANT-ID/USER-PRINCIPAL-NAME Signature matches Public Key Root Certificate: Subject matches Issuer Cert Hash(sha1): 1234567890123456789012345678901234567890 Key Container = USER-SID/GUID/login.windows.net/AAD-TENANT-ID/USER-PRINCIPAL-NAME Provider = Microsoft Passport Key Storage Provider Private key is NOT exportable Encryption test passed
The certificate’s intended purpose is Smart Card Logon.
Migrating From Software Key Storage to TPM
certutil output we generated above shows that Windows Hello for Business keys are not exportable:
Export Policy: 0 (0x0) (NCRYPT_ALLOW_EXPORT_FLAG -- 1) (NCRYPT_ALLOW_PLAINTEXT_EXPORT_FLAG -- 2) (NCRYPT_ALLOW_ARCHIVING_FLAG -- 4) (NCRYPT_ALLOW_PLAINTEXT_ARCHIVING_FLAG -- 8)
This means there is no migration path from a software key to a key stored in a TPM. Instead, existing WHfB data needs to be deleted, followed by a re-enrollment. I’m aware of two way to delete Windows Hello for Business data.
Deleting the Hello Container With Certutil
To delete the Windows Hello for Business data container run the following command (yes, the user needs to be logged off afterwards):
certutil -DeleteHelloContainer logoff
Reset Hello by Deleting the Database on Disk
Alternatively, stop the Windows Biometric service, delete its database on disk and start it again:
net stop WbioSrvc del /f /q C:\Windows\System32\WinBioDatabase\*.* net start WbioSrvc
Note: it might be a good idea to move the files to a safe place instead, just in case.
Some interesting articles with additional details: