For the latest versions of this document see:
Security Notice
A critical security vulnerability affects SecureAuth Login for Windows version 1.0. SecureAuth recommends all users upgrade to version 1.0.1 or later immediately.
Login for Endpoints (available in SecureAuth IdP version 9.2+ only) adds SecureAuth’s multi-factor authentication to the Windows desktop and remote server login experience, and the Mac desktop login experience. This product was introduced in SecureAuth IdP version 9.2 and supports these authentication methods:
- Timed Passcode
- Voice Call
- Passcode sent via SMS / Text Message
- Passcode sent via Email
- One-time Passcode via Push Notification
- Login Notification via Push Notification
- YubiKey HOTP Device Passcode
- Passcode from Help Desk
NOTE: Methods delivered via Push Notification require the use of the SecureAuth Authenticate App
In addition to the supported multi-factor authentication methods, Login for Endpoints supports these setups / features for Windows and / or Mac:
Feature | Windows | Mac |
---|---|---|
Offline mode login | x | x |
Multi-factor authentication for desktops and / or remote servers | x | N/A |
Multi-factor authentication for single users only and / or multi-users | x | N/A |
Users in bypass group can skip multi-factor authentication | x | x |
Bypass group lookup on a domain other than user's domain | x | x |
Password expiration notification | x | x |
Password Reset link to SecureAuth IdP realm or 3rd party service | x | N/A |
Multiple login capability | x | x |
Endpoint identified during login multi-factor authentication request | x | x |
Use Third-party Credential Providers | x | N/A |
YubiKey HOTP support for 2-Factor Authentication | x | x |
TOTP 2-Factor Authentication | x | x |
Cached user credentials let users sign in with fewer clicks | x | N/A |
Installation API validation | x | N/A |
Adaptive Authentication | x | N/A |
Non-domain server support | x | N/A |
Validated with FIPS 140-2 compliant cryptographic libraries | x | x |
DISCLAIMERS:
- Login for Windows does not support non-domain joined devices. Issues pertaining to account synchronization are the responsibility of the customer and not SecureAuth.
- Login for Endpoints ONLY supports the samAccountName login name format; userPrincipalName (UPN) is not supported.
Note that UPN is supported at login, but if using a non-AD profile store containing OATHSeed/OATHToken/PNToken but not samAccountName, then the multi-factor authentication lookup will fail and the user will not be able to use other multi-factor authentication methods.
NOTE: If you are currently using the SecureAuth Credential Provider, you do not need to uninstall before installing Login for Windows.
Refer to the Release Notes for more information about releases.
1. Ensure SecureAuth IdP v9.2 or later is running and is using a SHA2 or later certificate bound to Microsoft Internet Information Services (IIS). For example, in the IIS Management Console's Default Web Site section, check the Site Bindings section to ensure the https/443 type and port settings have a valid and trusted SHA2 certificate selected, as shown in the following image:
2. Create a New Realm or access an existing realm on which more than one multi-factor authentication is required.
NOTE: This realm should not be configured for Single Sign-on.
3. Configure the following tabs on the Web Admin in preparation for configuring Login for Endpoints:
- Overview – the description of the realm and SMTP connections must be defined
- Data – an enterprise directory must be integrated with SecureAuth IdP
- Workflow – the way in which users will access the target must be defined
- Multi-Factor Methods – the multi-factor authentication methods that will be used to access the target must be defined
- Post Authentication – the target resource or post authentication action must be defined
- Logs – the logs that will be enabled or disabled for this realm must be defined
4. Ensure target end-user machines are running any of the following supported OS versions:
Supported OS Versions | |
---|---|
Windows OS versions:
| Windows Server OS versions:
|
Minimum macOS versions:
|
NOTE: See SecureAuth Compatibility Guide for OS and SecureAuth IdP version support information.
NOTE : To use the proxy bypass feature with Windows, a proxy server and proxy bypass list must be configured. See Login for Windows Installer Configuration for information about configuring the proxy server and proxy bypass list.
If using Login for Windows in a PCI environment, see Login for Windows SSL configuration requirements if Login for Windows is not installing on a machine.
SecureAuth strongly recommends using a timed passcode the first time you use Login for Windows to access the network.
To meet this requirement, you must have an account provisioned with a SecureAuth IdP realm that enables your device to generate timed passcodes for multi-factor authentication:
- YubiKey HOTP Device – refer to the YubiKey HOTP Device Provisioning and Multi-Factor Authentication Guide to ensure all requirements are met.
- YubiKey TOTP Device – refer to the YubiKey OATH-TOTP Device Provisioning and Multi-Factor Authentication Guide to ensure all requirements are met.
Thereafter, you can use Login for Windows in the offline mode.
Active Directory Profile Configuration on the Mac
The end-user Active Directory (AD) profile must be accurately configured on the Mac so that the endpoint can retrieve the AD end-user profile during the login process.
Preconfigured Enterprise WiFi System Level Policy
In an enterprise WiFi environment, before setting up Login for Mac on end-user workstations, the system level policy must be configured to allow the Mac to connect to the enterprise WiFi. This setup lets Login for Mac fetch the OATH seed which is used to authenticate the end-user.
Prevention of YubiKey Device Usage Conflicts
If an end-user is already using a YubiKey device for YubiKey multi-factor authentication on a SecureAuth IdP realm, the OATH seed and associated YubiKey device must be removed from the end-user's account in order to prevent a conflict when the end-user attempts to use a YubiKey device for HOTP authentication. (See the steps under End-user Multi-Factor Authentication in the YubiKey Multi-Factor Authentication Configuration Guide to remove the YubiKey device from the user account profile.)
Prevent and Troubleshoot End-user Lockouts
End-users can be locked out of their Mac workstations due to any of these factors:
- Network Setup Issues
- Login for Endpoints Installer Misconfiguration
- End-user Mac Configuration Issues
Expand the section below for more information:
Users Disabled in Active Directory
If an end-user is disabled on Active Directory, the local account will not know the history of the AD account, and the user will not be able to log on the Mac.
IMPORTANT: Before Installing Login for Mac
Your local username and password on the Mac must be the same as your Active Directory username and password. If you are using a different local username than your Active Directory username, then you will need to contact IT to synchronize the IDs.
If the IDs are synchronized, be sure you can log on the Mac before installing Login for Mac.
First-time Usage Requirements
The first time you use Login for Mac to log on the network:
A timed passcode is required. You must have an account provisioned with a SecureAuth IdP realm that enables your device to generate timed passcodes for multi-factor authentication:
- YubiKey HOTP Device – refer to the YubiKey HOTP Device Provisioning and Multi-Factor Authentication Guide to ensure all requirements are met.
Your Mac must either be hardwired to the network, or you must have a preconfigured WiFi connection within range to which your Mac can be manually connected.
Thereafter, you can use Login for Mac in the offline mode.
1. Create a new realm and configure a data store on the Data tab.
2. In the Membership Connections Settings section, under Group Permissions, select False from the Advanced AD User Check dropdown.
3. Select Bind from the Validate User Type dropdown.
4. In the Profile Fields section, enter adminDescription in an unused Aux ID field—Aux ID 3 in this example—and make the field Writable.
5. If using a single OATH seed for end-user multi-factor authentication, then map Fields to OATH Seed and OATH Tokens Properties, as shown in the sample image.
Click Save once the configuration is complete and before leaving the Data page to avoid losing changes.
6. In the Multi-Factor Configuration section, configure the multi-factor authentication methods you want enabled.
Click Save once the configuration is complete and before leaving the Multi-Factor Methods page to avoid losing changes.
7. On the System Info tab, in the Links section, Click to edit Web Config file.
8. In the Web Config Editor section, under <appSettings>, add this line:
<add key="OTPFieldMapping" value="AuxID#" />
NOTE: In this example, AuxID3 is used since this Property was selected and configured on the Data tab in step 4.
Click Save once the configuration is complete and before leaving the Web Config Editor page to avoid losing changes.
9. In the API Key section, click Generate Credentials.
If configuring Login for Endpoints for Windows, the API ID and API Key are required and used in the config.json file for all scenarios of using this product.
10. In the API Permissions section, select Enable Authentication API.
NOTE: It is not recommended to enable Identity Management options since the password reset function uses an IdP realm or third party password reset URL—not the Identity Management API.
Click Save once the configuration is complete.
11. Select Enable Login for Endpoints API , and then click Configure Login for Endpoints Installer.
Adaptive Authentication can be used with Login for Windows to control the user login experience and to mitigate security risks.
The order of priority to handle user authentication login requests using Adaptive Authentication is as follows:
- Threat Service
- IP allow list / deny list
- Geo-location
- Geo-velocity
- User / Group
NOTE: See Group Bypass Configuration Notes in the Login for Windows Installer Configuration section for information about using Adaptive Authentication with the group bypass feature.
Release Date: June 13, 2018
Version 1.0.2
Release Date: May 14, 2018
Version 1.0.1
Release Date: February 1, 2018
Version 1.0
The new Login for Endpoints product gives end-users a secure login experience on a Mac or Windows workstation, or on a remote Windows server, using a SecureAuth multi-factor authentication method. This product, with FIPS 140-2 compliant cryptographic libraries, is newly designed and engineered and replaces the Credential Provider application. After the initial setup and first-time usage, the end-user subsequently logs on without a password by just using a 2-Factor Authentication method.