Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

To set up Passwordless Authentication in Computer Logon using Certificate, follow the steps below

Table of Contents

Install AD Certificate Service

...

Install Active Directory Certificate Service in the Domain Controller.


Image Modified


After installation, configure the Certificate Authority accordingly.

Create a CA Certificate in DualShield

Create or import a CA certificate in the DualShield Certificate Authorities, and bind to the target domain, ie. deepnetpb.com


Image Added

Import CA Certificate into Domain Controller

Export this CA certificate, and then import it into the Trusted Root Certification Authorities on the Domain Controller

Image Added

Configure Enterprise PKI

NowAfter completing the configuration, open the Microsoft Management Console (MMC) and add the 'Enterprise PKI' snap-in. 


Image Modified

 Launch the Enterprise PKI snap-in console and right-click on EnterprisePKI and select Manage AD Containers...

Image Added

Add the new CA that was created.

Image Added

Click Ok and then click on the CA entry that appears under Enterprise PKI...

Image Modified


If you see the "CA Certificate" in the listall of the following 4 certificates and their status is OK, then your domain is ready for DualShield Computer Logon Passwordless Authentication.

  • CA Certificate
  • AIA Location #1
  • CDP Location
  • DeltaCRL Location #1

Configure Policy Options in DualShield

...

  • Enable the option "Enable Passwordless Login".
  • Set the "Passwordless Certificate Lifetime".
  • Set the option "Renew Passwordless Certificate N days before it expires"
  • Leave the option "Certificate Revocation List (CRL) URL" empty. 

Image Modified

Note: if you have implemented the Device Certificate authentication method, then you must follow the instructions below to set up a new Certificate Revocation List (CRL) URL 

Expand

Include Page
Publish CRL service in an alternative port number
Publish CRL service in an alternative port number

By default, when 'Client Authentication: Device Cert' is enabled, this feature doesn't function as expected. If you wish to accommodate both features, users can manually adjust the settings to utilize a different URL, ie: https://mfa.qa.deepnetid.com:8092/sso)

Image Removed

User Experience

With the password authentication enabled, users will see the hint 'Passwordless enabled" under the password entry box on the login screen. Image Removed


Image Added

Do not enter anything in the password box

Click the continue button Image Removed to Image Added to continue

The 2FA/MFA window will be prompted:Image Removed


Image Added