Updated April 14, 2020
A critical security vulnerability affects SecureAuth Login for Windows version 1.0. SecureAuth recommends all users upgrade to version 1.0.1 (or later) immediately. |
Login for Windows, available in SecureAuth IdP version 9.2 and later, adds SecureAuth’s multi-factor authentication to the Windows desktop and remote server login experience.
See the Release notes to learn about new features and enhancements, resolved issues, and known issues.
This product supports the following authentication methods:
NOTE: Methods delivered via push notification require the use of the SecureAuth Authenticate mobile app.
In addition to the supported multi-factor authentication methods, Login for Windows supports the following setups and features:
DISCLAIMERS:
If a computer is not domain-joined AND all local users are blocked by Adaptive Authentication OR are not Active Directory (AD) members on SecureAuth IdP, end users receive the following message: Access is denied for all users on this computer.
Login for Windows supports the samAccountName login name format if using Microsoft Active Directory; in this use case, userPrincipalName (UPN) is not supported.
UPN is supported at login if running Login for Windows with a non-AD profile store containing OATHSeed/OATHToken/PNToken. In this use case, samAccountName is not supported, so the multi-factor authentication lookup will fail and the user will be unable to use other multi-factor authentication methods.
SecureAuth did not certify Windows 7 and Windows Server 2008 with Login for Windows v20.03 because Microsoft deprecated both operating systems as end-of-life. Be aware of the following:
Ensure SecureAuth IdP v9.2 or later is running and is using a SHA2 or later third-party publicly trusted certificate bound to Microsoft Internet Information Services (IIS). For example, in the IIS Management Console's Default Web Site section, check the Site Bindings section to ensure the https/443 type and port settings have a valid and trusted SHA2 certificate selected in the SSL certificate field. The following example shows the SSL connection being terminated on the SecureAuth server.
Alternatively, you can also terminate the SSL connection on the load balancer, and then your publicly-trusted certificate will reside on the load balancer.
Do not remove the SecureAuth certificates from the certificates console or the SecureAuth appliance will no longer function. |
Ensure target end user machines are running any of the following supported OS versions:
Supported OS versions | ||
---|---|---|
Windows OS versions:
| Windows Server OS versions:
| See SecureAuth compatibility guide for OS and SecureAuth IdP version support information. |
NOTE: To use the proxy bypass feature with Windows, a proxy server and proxy bypass list must be configured. See Login for Windows Installer Configuration for information about configuring the proxy server and proxy bypass list.
End users can log in without second-factor authentication for the number of attempts set by the administrator. This allows end users to log in with a password only so they can set up their two-factor authentication methods before they must authenticate to access their device. After end users set up 2FA, the following is the authentication workflow.
Login for Windows requires end users to use one OATH-based method (i.e., TOTP, YubiKey), if at least one method is available to end users. If at least one OATH-based method is not available to end users, they can use any other available method, but offline login will not be available.
To meet this requirement, end users must use one of the following accounts provisioned with a SecureAuth IdP realm that enables their device to generate timed passcodes for multi-factor authentication:
Thereafter, end users can use Login for Windows to log in when working online and offline.
Additionally, consider the following requirements for end users:
NOTE: If end users are using the SecureAuth Credential Provider and the admin upgrades to a later version of Login for Windows, end users do not need to uninstall the SecureAuth Credential Provider before installing Login for Windows.
Use the following sections to set up Login for Windows with SecureAuth IdP version 9.2 or 9.3.
If your team will set up and use Login for Windows with the cloud or hybrid model of SecureAuth Identity Platform version 19.07 or later, see SecureAuth Identity Platform configuration.
Do not use the same realm for SecureAuth RADIUS server and Login for Windows because the OTPFieldMapping app key in web.config is used differently in the two products.
If using a single OATH seed for end user multi-factor authentication (see sample Post Authentication page image), then map fields to OATH Seed and OATH Tokens Properties, as shown in the Profile Fields image below.
SecureAuth recommends setting OATH Tokens. If OATH Tokens is not set, users might receive a failure message when attempting to authenticate by using TOTP after their device wakes from sleep mode while online. The failure occurs because a second factor method is sent at different times between the device being connected to the internet and disconnected from the internet, which causes the timed passcodes to be out of sync
Use Adaptive Authentication to control the user login experience and to mitigate security risks.
The order of priority to handle user authentication login requests using Adaptive Authentication is as follows:
NOTE: See Group Bypass configuration notes in the Login for Windows Installer configuration section for information about using Adaptive Authentication with the group bypass feature.
Set up Security Questions so users can authenticate by answering knowledge-based questions (KBQ). Security Questions gives users the option to log into devices without requiring a phone or token.
Follow steps in the Knowledge-based Authentication (KBA / KBQ) as 2-Factor Authentication Method Configuration Guide to set up knowledge-based questions for end users.
<add key="OTPFieldMapping" value="AuxID#" />
NOTE: In this example, AuxID3 is used because this Property was selected and configured on the Data tab in step 4. (Recall that you must specify an auxiliary ID (AUX ID) to communicate with the Identity Platform to validate one-time passcodes (OTPs) from email, phone calls, SMS, Helpdesk, and Notification Passcode.)Use the following sections to set up Login for Windows with the cloud and hybrid model of SecureAuth Identity Platform version 19.07 or later.
If your team will set up and use Login for Windows with SecureAuth IdP version 9.2 or 9.3, see SecureAuth IdP Web Admin configuration.
You will configure the Identity Platform and the Classic IdP Experience to use Login for Windows. If your team wants to use biometric identification (face (iOS only) or fingerprint recognition), you must complete the following set up. Only the Identity Platform v19.07 or later supports biometric identification; additionally, you must use the 2019 theme (see Setting the default theme for new realms). You will set up the authentication API in the Classic IdP Experience; this is necessary until feature parity is achieved with the Identity Platform.
The following steps must be completed before you can set up MFA methods; some steps are specific to cloud and they are called out accordingly. Most active sites will have performed the first two steps already and can begin at "Set up a policy."
Add a data store.
See Add an Active Directory data store or Add a SQL Server data store for steps.
In Map Data Store Properties, enter adminDescription in an unused ID field—Aux ID 3 for endpoints—and set the data format to plain text. Later in these steps, you will map this field to the OTP Validation Property, which is used for end user authentication. |
Policies in the Identity Platform allow you to define rules to authenticate and block your users to certain applications. See How policies are used in the Identity Platform to learn about policies.
If you have an existing policy or default policy that will meet your security needs, you can use that policy; otherwise, you can set up a new policy specifically for endpoints.
Use the Application Manager tool to select an application template from over 500 applications in the library, then use the common components to customize each new application integration. See Application Manager overview to learn more.
Set up the authentication API in the Classic IdP Experience.
"http://[user[:password]@]host[:port]\"
Parameters surrounded by [ ] are optional. Both "user" and "password" are not supported on HTTP clients on Login for Windows version 19.06 and earlier, or on 19.09.xx or later that choose to use the legacy HTTP client by setting "legacy_http_communication”: true
in the config.json file." .parent.domain.name"
The following is an example of a domain that uses direct communication with mail.google.com, but does not communicate with google.com itself: *.google.com
C. Windows proxy configuration. See the Netsh.exe and ProxyCfg.exe Proxy Configuration Tools article on the Microsoft website.eUse the following settings to customize the Login for Windows experience.
Setting "allow_self_signed" to true
should be used only in test or lab environments where the server has a self-signed certificate.
false
, only valid certificates are accepted.true
, all certificate validations will be turned off. The HTTP client then will accept valid certificates, self-signed certificates, expired certificates, certificates with invalid root. certificates without matching common names, etc. to establish communication.Do not set this key to true
in a production environment. In production, the key introduces critical security risks, namely the potential "Man in the middle" attack which grants users access to a system without validating their credentials, and lets unauthorized users steal OATH seeds. If the key is set to true in production, the following warning message is displayed: Warning! 'allow_self_signed' is enabled.
Find the config.json file you downloaded in step 8 of the Web Admin Configuration section of this document, and verify the setting for "allow_self_signed". You may need to change this setting based on how users will log on your environment.
Note that after installing an endpoint with "allow_self_signed" set to true
, this setting remains effective until Login for Windows is uninstalled and then re-installed using a configuration file with "allow_self_signed" set to false
.
If you have set up an IdP realm to use HOTP or TOTP, set "version" to v2
in the config.json file. This keeps end users from receiving an error message that they must "change password at next login" or that their expired password fails without allowing them to change the expired password. You must also complete the settings in the Data tab.
Find the config.json file you downloaded in step 8 of the Web Admin Configuration section of this document and edit it. Find the "version" key and set it to v2
, as follows:
"version": "v2",
Download the following PDF document, which contains a table of all configuration options for Login for Windows. Be sure to check the configuration version listed under "conf_version," to ensure that the optional settings you want to use are supported. Login for Windows supports three configuration versions; the conf_version value (either 1, 2, or 3) defines the config.json file.
The options supported are listed in the following table. Save the PDF to a folder of your choice by right-clicking over the image and selecting Save link as.
Compatible with: conf_version 1 and later
Login for Windows requires the end user to use multi-factor authentication by default to access the local console or remote console in a Remote Desktop protocol (RDP) session.
Before installing Login for Windows on the end user's (target) machine, the config.json file must be edited if you want to change the end user's login access level setting.
Start a text editor such as Notepad++ and edit the access_level
in the file, changing the value to a pertinent value:
0 = Multi-factor authentication always required
1 = Multi-factor authentication required for local access only
2 = Multi-factor authentication required for remote access only
3 = Multi-factor authentication never required. This setting is used only for Self-service Password Reset (SSPR) where SecureAuth is the primary credential provider.
SSPR is completed in SecureAuth IdP. After the password reset, the local machine still must contact Active Directory to verify the password change. After verification, the new password is available on the local machine. |
4 = Use a primary credential provider different from the SecureAuth credential provider. This setting is also used for SSPR, where end users can update their password by clicking the Password
Reset icon:
Login for Windows is the password reset credential provider.
Compatible with: conf_version 2 and later
You can set Login for Windows to failover to one or more alternate IdP instances automatically if the main IdP instance fails. You can specify up to five backup instances and set the order that they are used.
Find the config.json file you downloaded in step 8 of the Web Admin Configuration section of this document and edit it.
"apis":[
{ "id":"", "secret":"", "host":"https://localhost/secureauth#" }
],
Where secureauth# is your single backup IdP instance."apis":[
{ "id": "", "secret":"", "host":"https://localhost/secureauth2" },
{ "id": "", "secret":"", "host":"https://localhost/secureauth3" }
],
The backup IdP instance is chosen in the order listed in the array. An IdP instance must be online or it is ignored and the next instance is used. In the above example, "secureauth2" will be chosen first, then "secureauth3". Compatible with: conf_version 1 and later
Users who need to log in as local admins without being prompted for additional MFA must belong to a local or domain group that is set up in the config.json file, in the "group_bypass" key. Add local users only to the local group. Users in this group must including a warning stating the group names are case sensitive and need to match AD exactly.
Find the config.json file you downloaded in step 8 of the Web Admin Configuration section of this document and edit it. A dd the "group_bypass" key and set it as follows:
"group_bypass" can include the following:
group name
: For groups of the domain on which the machine is joined; for example, "BypassGroup
"domain\\groupname
: For groups that are part of a specific domain; for example, "customerDomain\\BypassGroup"
.\\groupname
: For local machine groups; for example, ".\\Administrators"
You can also set up bypass groups in the SecureAuth IdP API page, in the Multi-Factor Authentication Settings section, described in step 5.
Compatible with: conf_version 2 and later
You can enable or disable the UAC option based on how you want users to log on your environment.
See How User Account Control works on the Microsoft website to learn more about UAC.
Find the config.json file you downloaded in step 8 of the Web Admin Configuration section of this document and edit it. Add the "enabled_on_uac" key and set it to true
or false
, as follows:
"enabled_on_uac": true
"enabled_on_uac": false
Compatible with: conf_version 2 and later
The adaptive_enabled key is set to true
by default so that administrators can install and modify Login for Windows. Disable this key to false
to ensure that an admin or other user is never restricted. This key acts similar to Adaptive Authentication settings in SecureAuth IdP, where you can restrict admins and users from logging in in several ways, for example, by username, group, IP, etc.
true
.Find the config.json file you downloaded in step 8 of the Web Admin Configuration section of this document and edit it. Add the "adaptive_enabled" key and set it to false
or reset it to true
, as follows:
"adaptive_enabled": false
"adaptive_enabled": true
Compatible with: conf_version 2 and later
SecureAuth uses OATH seeds to validate OTPs when end users log in. Most use cases require SecureAuth to store OATH seeds; if seeds are not stored, end users will not be able to log in while offline. In a scenario where, for example, a server is always online, you might not want to cache the OATH seed, to prevent the seed from leaking or being stolen.
Use the store_seeds key in the config.json file to disable the OATH seed cache, and Login for Windows will not store OATH seeds. The first-time login experience is disabled in this scenario because it is used to store OATH seeds, which are not required for this option.
true
by default.true
.Find the config.json file you downloaded in step 8 of the Web Admin Configuration section of this document and edit it. Add the "store_seeds" key and leave it true
or set it to false
, as follows:
"store_seeds": true
"store_seeds": false
Compatible with: conf_version 2 and later
Enable this option so that end users receive customized assistance when they are locked out of their accounts or their password or passcode is incorrect or expires. Administrators can set a custom assistance string in the config.json file to guide end users so they have next steps after an issue occurs during login.
Find the config.json file you downloaded in step 8 of the Web Admin Configuration section of this document and edit it. Add the "custom_error_message" key and enter your custom assistance message. The following message is an example:
"custom_error_message": "For assistance, please contact Acme helpdesk at 949-555-1212, help@acmeco.com, or https://helpdesk.acmeco.com."
Compatible with: conf_version 2 and later
Set this option to establish the time period between end user authentication and the next MFA log in. Administrators can set a custom duration by adding "bypass_interval" in the config.json file.
Find the config.json file you downloaded in step 8 of the Web Admin Configuration section of this document and edit it. Add the "bypass_interval" key and enter your custom time period. The following time period is an example:
"bypass_interval": 3600
Compatible with: conf_version 3 and later
Set this option to hide the button to retry the connection on the login screen when Login for Windows is offline. Administrators can add the "hide_retry_option" key in the config.json file.
Find the config.json file you downloaded in step 8 of the Web Admin Configuration section of this document and edit it. Add the "hide_retry_option" key and hide the retry button, as in the following example:
"hide_retry_option": false
Compatible with: conf_version 3 and later
Set the "passwordless_enabled" key in the config.json file to enable or disable passwordless authentication as a first factor. End users can use a fingerprint reader to authenticate by using any enrolled fingerprint. (This setting does not enable the second factor biometric identification available to end users through the SecureAuth Authenticate app. See Use fingerprint recognition on mobile for instructions.)
false
.true
for a different OS, the setting will have no effect.Find the config.json file you downloaded in step 8 of the Web Admin Configuration section of this document and edit it. Add the "store_seeds" key and leave it true
or set it to false
, as follows:
"passwordless_enabled": true
"passwordless_enabled": false
Compatible with: conf_version 4 and later
Set this option to establish the number of password-only login attempts that end users are allowed. Administrators can set a custom number of attempts in "login_attempts" in the config.json file. After end users set up their second-factor methods, they can dismiss the password-only login screen.
Login is determined in the following order:
Find the config.json file you downloaded in step 8 of the Web Admin Configuration section of this document and edit it. Add the "login attempts" key and enter the number of password-only login attempts. The following attempt number is an example:
"login_attempts": 3
Read about how this setting impacts end users in First login with password only.
The following sections describe how to upgrade and install Login for Windows.
Login for Windows supports upgrading from version 1.0.4 to 20.03.xx without uninstalling before installing the latest version.
IMPORTANT: On a Windows server, SecureAuth Login for Windows should be installed or uninstalled only from a console session and not an RDP session.
msiexec /i "C:\Temp\SecureAuthLogin-20.03.00-x64.msi" /L*V "C:\Temp\install.log" /qn CONFIG="C:\Temp\config.json"
The Login for Windows software issues a User-Agent HTTP Request Header when the Application Programming Interface interacts with SecureAuth IdP. The following items are included in the User-Agent string:
For example:
SecureAuth Login for Windows 20.03.00 (Windows 10 Pro x64 6.2.9200; LT-JSMITH; (UTC-05:00) Eastern Standard Time; 111.22.333.44; 0f:10;35:7a:81:4e)
Login for Windows error logs
Error logs are displayed in the following locations.
install.log
file: %temp%\install.log
login.log
file C:\ProgramData\SecureAuth\login.log
The login.log
log file displays system information, such as the type and version of the operating system, the version of Login for Windows your organization is running, and more as shown in the following image:
After you view the login.log
file, then connect later through RDP, you might notice what look like inconsistencies because the log file will have new start lines and threads. This is expected behavior because connecting through RDP causes new instances of the credential provider to be created, which causes the new start lines and threads.
On the target machine, run the following command line with administrator permissions, using the file name of your .msi file and correct path of that file on your machine:
msiexec /x "<msi>" /L*V "uninstall.log" /qn
Alternatively, you can manually uninstall using the Windows "Programs and Features" menu.
|
End users can log in without second-factor authentication for the number of attempts set by the administrator in the config.json file, in the login_attempts value. This allows end users to log in with a password only (without using second-factor authentication), and typically occurs after the Login for Windows installation. End users can then access their device to set up their two-factor authentication methods, such as PIN creation and answers to Security Questions, before they must authenticate to access their device.
Use case: Password-only login is especially useful for one or more new employees who have been issued a laptop on their first day of employment. For example, if Login for Windows is already installed on the laptops and the admin has not set a "login_attempts" value, new employees might not be able to log in to their computer if they cannot connect to the SecureAuth IdP realm to register their mobile phone or self-service page to enter a phone number.
Workflow: End users are prompted to log in with their username and password only. The login screen indicates how many password-only login attempts remain, as shown in the following image. Using the image as an example, end users who want to log in with password only enter their password in the field next to number 1. After end users set up their second-factor methods, they are ready to authenticate so they click the message next to number 2, which dismisses the password-only screen and opens the 2FA login screen. Thereafter, the 2FA login screen opens for end users.
Enter your username on the Windows login screen.
To authenticate by using a different primary credential provider, proceed to instructions for logging in when using a different primary credential provider .
The first time end users log in, Login for Windows shows only OATH-based methods (for example, TOTP, HOTP YubiKey ), if at least one method is available to end users. If at least one OATH-based method is not available to end users, they can use any other available method. This could be a method that uses the SecureAuth Authenticate App on your mobile device or another device provisioned with the SecureAuth IdP realm to supply timed passcodes, such as an HOTP YubiKey.
If the end users need to login when their machine is offline, they must choose an OATH-based method during the first login. After end users select a timed authentication option and enter their password, TOTP and HOTP passcode options will be available for them to use when logging on the machine offline. |
End users with more than one mobile phone or YubiKey provisioned can select which device or token to use when online. When logging on the machine offline, any OATH-based method that was used online will be available for use.
If you do not have an authentication method that provides a timed passcode, then select any other option available to you.
End users who already use the Authenticate app and want to add the ability to accept biometric push notifications to use face (iOS) or fingerprint recognition must first reconnect the account for their mobile device.
You can provision either "Approve login" or "Symbol-to-Accept." The following image shows the login screen with the "Approve login notification on mobile" option; if "Symbol-to-Accept" is set, end users will see the "Passcode from Symbol-to-Accept" option in place of the "Approve login notification on mobile" option on the login dropdown. (On the SecureAuth Authenticate mobile app, the icons will be different, but both icons will have a tool tip that reads "Approve login".)
If you are authenticating through a different primary credential provider (that is, not the SecureAuth credential provider), you will see the login screen offered by that credential provider. The different primary credential provider supports offline mode, for end users who need to login when their machine is offline.
The following image shows an example of a login screen, but yours will look different.
Sign in.
The image shows two sign-in options, a Microsoft credential provider (the key icon) and a Microsoft Smart Card credential provider (the card icon). To sign in, you could click the icon with your preferred method. If your site offers one kind of sign-in option, then only that option will be displayed for you to sign in with.
Additionally, if you can sign in as "Other user", a multi-user credential login provided by that credential provider will be displayed. After specifying who you are, click the Sign-in options link to choose which multi-user credential you want to use to sign in.
You have completed your authentication login process. You can disregard the remaining end user steps in this section and in "Subsequent login experience." Your login experience will remain the same as the one provided by your primary credential provider.
Notice the placement of the Password Reset icon on the lower left. To update your password, click the icon. Login for Windows is the password reset credential provider, and requires online network access.
Show or hide the passcode so that, as you type, you see characters instead of dots.
Fields | Instructions |
---|---|
Timed passcode from app This method and "Passcode from token" are displayed at first login, if available. If not available, all available methods are displayed.
| |
![]() | Passcode from voice call
|
![]() | Passcode from SMS / text
|
![]() | Passcode from email
|
![]() | Passcode from notification
|
Approve login notification on mobile
| |
Contact help desk for passcode
| |
Passcode from token This method and "Timed passcode from app" are displayed at first login, if available. If not available, all available methods are displayed.
| |
Passcode from YubiKey This method and "Timed passcode from app" are displayed at first login, if available. If not available, all available methods are displayed.
| |
Use passwordless as first factor This method and "Timed passcode from app" are displayed at first login, if available. If not available, all available methods are displayed. End users must have a fingerprint reader installed on their computer and must enroll at least one fingerprint to use passwordless as a first factor. For this option:
End users with external fingerprint readers should not disconnect the reader from their computer before logging out; doing so will cause an error to be displayed: Fingerprint data not found. The error is an "unknown identity" signal that the reader sends to the driver; however, the fingerprint data will be found when the reader is connected to the same computer. | |
Use fingerprint recognition on mobile End users must use the Authenticate mobile app to use fingerprint recognition. For this option:
| |
Use face recognition on mobile End users must use the Authenticate mobile app to use face recognition. This option is available to users on iOS mobile phones. For this option:
|
When logging on the same machine in subsequent sessions, the Login for Windows page includes a selection of all multi-factor authentication methods for which you enrolled.
The login screen defaults to the authentication method used in the last login session. |
To show characters as you type a passcode instead of seeing dots, refer to step 3.
You can provision either "Approve login" or "Symbol-to-Accept. The following image shows the login screen with the "Approve login" icon; if "Symbol-to-Accept" is set, end users will see the "Symbol-to-Accept" icon in place of the "Approve login" icon on the login screen. (On the SecureAuth Authenticate mobile app, the icons will be different, but both icons will have a tool tip that reads "Approve login".)
Sign-in option icons | Fields | Instructions |
---|---|---|
![]() | ![]() | Answers to Security questions
|
![]() | Single user credential: Multiple user credential: | Timed passcode from app
|
![]() | ![]() | Contact help desk for passcode
|
![]() | ![]() | Approve login notification on mobile
|
![]() | ![]() | Passcode from notification
|
![]() | ![]() | Passcode from email
|
![]() | ![]() | Passcode from voice call
|
![]() | Passcode from SMS / text
| |
Passcode from Symbol-to-Accept End users must use the Authenticate mobile app to receive symbols.
| ||
Single user credential: Multiple user credential: | Passcode from token
| |
Passcode from YubiKey
| ||
Single user credential: Multiple user credential: | Use fingerprint recognition on mobile End users must use the Authenticate mobile app to use fingerprint recognition.
| |
Single user credential: Multiple user credential: | Use face recognition on mobile End users must use the Authenticate mobile app to use fingerprint recognition. This option is available to users on iOS mobile phones.
|
Login for Windows requires you to enter a multi-factor authentication method when you log in to a privileged account as an administrator (with "Run as administrator") on the same machine used to log into a regular user account. See the options by right-clicking over an executable.
Select one of the options and then enter the admin password.
Users with access to privileged accounts are not prompted for additional MFA when logging into their normal user accounts; however, it is possible to configure UAC policies to prompt administrators for password or MFA when they log into their normal user accounts. See UAC - Require a Password for Administrator. |
To show characters as you type a passcode instead of seeing dots, click and hold the "eye" icon to the right of the characters.
Version: 20.03
Release Date: April 14, 2020
Compatibility: SecureAuth IdP v9.2.x or later, and the SecureAuth Identity Platform v19.07 or later. Additionally, biometric fingerprint and face (iOS only) recognition require SecureAuth Identity Platform v19.07 or later, using the 2019 theme.
CP-106 CP-755 | If the "login_attempts" attribute is set in conf_version 4 in the config.json file, end users are allowed to log in with a password only for a set number of times. This enables end users to have time to set up their 2FA methods, such as PIN creation and answers to Security Questions, before they must authenticate to access their device. If any settings that determine login are changed, for example, an adaptive rule is changed or users no longer belong to a bypass group, end users automatically receive a 3 minute time period to enter their password |
CP-433 | When end users click the "Click to update your password" link on the login screen, they are directed to a Login for Windows SSPR login screen that opens in a modern browser, Chromium version 79.1.36, and not in Internet Explorer. |
CP-815 | Improvements to login performance were completed. |
CP-823 | The installation version number now matches the public version release value; for example, if the public product version is 20.03.01, then the installation version number, which is visible if you uninstall Login for Windows manually, is also 20.03.01. (In previous versions of Login for Windows, the versions were different, but now they match.) |
CP-825 | The error log displays system information, such as the type and version of the operating system, the version of Login for Windows your organization is running, and more. |
CP-833 | Fingerprint recognition works correctly when an administrator is running in Run as administrator mode. |
CP-837 | Login for Windows SSL certificate hostname validation works correctly with a SecureAuth IdP configured for Login for Windows. |
CP-869 | End users assigned a recently created YubiKey can log in to Login for Windows on the first attempt, even if they have not previously logged in to SecureAuth IdP with the YubiKey. |
CP-888 | Sites using MFA throttling are no longer locked out of their accounts after successful logins. |
CP-816 | End users with external fingerprint readers should not disconnect the reader from their computer before logging out; doing so will cause an error to be displayed: Fingerprint data not found. The error is an "unknown identity" signal that the reader sends to the driver; however, the fingerprint data will be found when the reader is connected to the same computer. The fingerprint feature works as designed. When the reader is disconnected and sends the "unknown identity" signal, the code does not differentiate between the signal and an unrecognized finger touch. |
CP-824 | The error log will have new start lines and threads if connecting through RDP; RDP connections cause new instances of the credential provider to be created, which causes the new start lines and threads. |
TW-926 | When upgrading to the Identity Platform v19.07 or later, admins must use the 2019 theme and end users who already use the SecureAuth Authenticate app must reconnect their accounts to add the ability to accept biometric push notifications to use face (iOS) or fingerprint recognition through the mobile app. Workaround: None |
Resolved issue
Known issue
|
Resolved issueVersion: 19.09.02
Known issue
|
New features and enhancementsVersion: 19.09.01
Resolved issues
Known issue
|
New features and enhancementsVersion: 19.09
Resolved issues
Known issue
|
New features and enhancementsVersion: 19.06
Resolved issues
Known issues
Hotfixes
|
New features and enhancementsVersion: 1.0.4
|
CP-386 | SMS / Voice telephone numbers are masked for registered multi-factor authentication methods. |
CP-416 | Manual uninstallation from the "Programs and Features" menu on Windows 10 succeeds. |
CP-418 | End users no longer need to change password at next login to keep expired passwords from failing with TOTP or HOTP. Login for Windows customers on SecureAuth IdP 9.2 or 9.3 must apply a hotfix to take advantage of this fix. (See Hotfixes.) |
CP-421 | End users no longer receive a failure message when attempting to authenticate by using TOTP after their device wakes from sleep mode while online. |
CP-443 | End users no longer given a private IP address when Adaptive Authentication is used in an RDP session. |
CP-447 | A non-local user whose account is not found in Active Directory receives on-screen guidance about how to fix and proceed. |
CP-469 | A SecureAuth file called .saconfig is no longer created after a Login for Windows installation failure. |
CP-470 | The last user displays only when the "multiple_user" flag is set to false. |
CP-471 | End users connecting to Login for Windows for the first time and through an RDP connection are offered appropriate MFA options instead of an "offline MFA" message. |
CP-474 | Adaptive "Skip to post-authentication" and "Skip two factor authentication" options no longer refuse to log on the last user on Windows 8. |
CP-476 | If offline MFA methods are not enabled for an account and end users attempt to log in while offline, they will receive a login error message with guidance. |
CP-490 | Login for Windows and the IdP realm clock cycles are aligned so clock skew no longer occurs between TOTP codes generated by hard and software tokens sharing the same OATH Seed. |
CP-542 | Login for Windows accepts connections when certificates are self-signed because the value of "allow_self_signed" is no longer ignored. |
CP-544 | When SecureAuth IdP encounters a malformed email string that lacks an at symbol (@), IdP returns the string as a Login for Windows email. |
CP-552 | End users cannot use an OTP more than once, even if it is in a valid time range because each OATH list is assigned locally to each machine. |
CP-569 | End users logged onto Login for Windows who use RDP to connect to the same machine will see a standard Windows "Unlock the PC" message when using the knowledge-based MFA method. |
CP-574 | After Login for Windows is first installed, end users who select the Switch User button see "Other User" once instead of twice. |
CP-575 | End users can log on using YubiKey the first time, without receiving an error message. |
CP-578 | Login for Windows will automatically retry a connection if it detects an offline state. Offline states can occur because of initial no-connection states, such as when a device is in sleep mode. |
CP-594 | End users receive a better error message with guidance when attempting to log in while offline, but offline methods were not set up. |
CP-288 | Login for Windows performance degrades when loading the login screen in the offline mode on Windows 10. |
CP-488 | End users can log into their machines with sAMAccountName attributes only. Attributes other than sAMAccountName are not supported. |
New features and enhancementsVersion: 1.0.3
Resolved issues
Known issues
|
Resolved issues and enhancementsVersion: 1.0.2
Known issues
|
Resolved issuesVersion: 1.0.1 Incorrect IP address used for Adaptive Authentication When logging on locally, SecureAuth IdP now correctly uses the endpoint's public-facing IP address instead of a local adapter IP address. In this issue, a private IP address was being used which prevented IP-related Adaptive Authentication features from functioning properly. Remote / RDP logins were not impacted by this issue. AD bad password count incorrectly incremented When attempting to log on using a bad password, the bad password count now increments appropriately – i.e. one time for each login attempt. In this issue, the Active Directory bad password count would increment multiple times for a single login attempt, causing the user to be locked out immediately or sooner than anticipated. In certain scenarios, the bad password count incremented once for each OATH seed-based multi-factor authentication method – e.g. for each app-based OTP or hardware token. Re-installation breaks login functionality Login for Windows can now be re-installed on the same machine. In this issue, the Login for Windows software could become corrupted if re-installed on a machine which already had the software installed. This issue prevented users from logging in and required the user to boot up the machine in safe mode to repair the software. Non-proxy aware Beta support is now available for proxies in Login for Windows – see Login for Windows Installer Configuration to configure Login for Windows 1.0.1 for use with a proxy. Note the known issues when using a proxy in the 1.0.1 release. This issue affected environments in which direct access to the SecureAuth IdP appliance is blocked and users must use a proxy. Login failure for users with a space in sAMAccountName The issue has been resolved for users who were unable to log in if a space exists in their sAMAccountName property. Users in a bypass group unable to use Self-Service Password Reset function The Self-Service Password Reset link now appears for users who are in a bypass group. Known issuesInstallation requires an absolute path to the configuration file The installer does not accept a relative path to the configuration file, which prevents deploying the installer from a directory that cannot be defined in advance (such as when using a Group Policy). Potential offline lockout for new users To use the offline mode, a user must first use an OATH-based authentication method – such as a one-time code (OTP) generated by the SecureAuth Authenticate App – at least one time while online in order to cache the OATH seed used for authenticating the user. SecureAuth recommends instructing users how to enable the offline mode before they attempt to go online. A future release of Login for Windows will address the potential new user lockout issue by providing guidance to users during the login process. Double prompting for RDP logins Users utilizing NLA (Network Level Authentication) when logging on a system with RDP enabled may still be prompted for a username and password once the session is established. Self-service Password Reset function is non-proxy aware The Self-service Password Reset feature – which opens a browser to a Self-Service Password Reset page – does not function in environments using a proxy to access SecureAuth IdP. In these scenarios, contact SecureAuth Support and inquire about workarounds. Note this feature differs from the inline password reset feature that is used when a user’s password expires – this feature functions properly in proxy environments. Self-service Password Reset may not function correctly for certain Operating Systems On Windows Server versions 2008 R2 and 2012 R2, users are unable to complete the self-service password reset process due to default Internet Explorer settings in the operating systems. Offline endpoint when proxy is unavailable Use of any proxy configured for Login for Windows becomes mandatory. If the proxy is unavailable, Login for Windows behaves as if it is offline. This issue may impact laptop users who connect their laptops to networks in which the proxy is unavailable. Re-installing Login for Windows does not apply configuration file updates Re-running the installer with a new or updated configuration file does not result in configuration changes made to the current installation. Administrators must uninstall and then re-install Login for Windows to apply the new settings. SMS and Voice numbers are not correctly masked Users prompted for multi-factor authentication can view the full telephone number for a registered multi-factor authentication method. Incorrect username shown on lock screen Users in a bypass group are shown the wrong username on a Windows 7 workstation lock screen. |
Version: 1.0 The new Login for Windows product gives end users a secure login experience on a Windows workstation, or on a remote Windows server, using a SecureAuth multi-factor authentication method. This product, with FIPS 140-2 compliant cryptographic libraries, is newly designed and engineered and replaces the Credential Provider application. After the initial setup and first-time usage, the end user subsequently logs on without a password by just using a two-factor authentication method. |
YubiKey HOTP Device Provisioning and Multi-Factor Authentication Guide
YubiKey OATH-TOTP Device Provisioning and Multi-Factor Authentication Guide
SecureAuth compatibility guide
Login for Windows v19.09.03 configuration guide
Login for Mac v20.03.01 configuration guide
Login for Windows SSL configuration requirements