NetIQ Advanced Authentication Framework. FIDO U2F Authentication Provider Installation Guide. Version 5.1.0



Similar documents
NetIQ Advanced Authentication Framework - Administrative Tools. Installation Guide. Version 5.1.0

NetIQ Advanced Authentication Framework - Password Filter. Installation Guide. Version 5.1.0

NetIQ Advanced Authentication Framework - Citrix XenDesktop Plugin. Installation Guide. Version 5.1.0

ACTIVE DIRECTORY DEPLOYMENT

Tool Tip. SyAM Management Utilities and Non-Admin Domain Users

Test Note Phone Manager Deployment Windows Group Policy Sever 2003 and XP SPII Clients

Active Directory Software Deployment

SARANGSoft WinBackup Business v2.5 Client Installation Guide

NetIQ Advanced Authentication Framework - MacOS Client

DigitalPersona Pro Server for Active Directory v4.x Quick Start Installation Guide

NetIQ Advanced Authentication Framework - Client. User's Guide. Version 5.1.0

Distributing SMS v2.0

Lab A: Deploying and Managing Software by Using Group Policy Answer Key

Installing Client GPO Software

4cast Client Specification and Installation

MailStore Outlook Add-in Deployment

Installation Manual (MSI Version)

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER

Comodo ONE Software Version 1.8

Group Policy for Beginners

Publish Cisco VXC Manager GUI as Microsoft RDS Remote App

STATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS

Automating client deployment

TECHNICAL DOCUMENTATION SPECOPS DEPLOY / APP 4.7 DOCUMENTATION

NetWrix Password Manager. Quick Start Guide

Creating and Issuing the Workstation Authentication Certificate Template on the Certification Authority

How to monitor AD security with MOM

ContentWatch Auto Deployment Tool

For Active Directory Installation Guide

ENABLE LOGON/LOGOFF AUDITING

HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION

Installation Instruction STATISTICA Enterprise Server

DeviceLock Management via Group Policy

Web-Access Security Solution

Password Manager Windows Desktop Client

Installation Guide: Delta Module Manager Launcher

Administration Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit

Windows 2008 Server DIRECTIVAS DE GRUPO. Administración SSII

SQL Server 2008 R2 Express Edition Installation Guide

Important Notes for WinConnect Server ES Software Installation:

Setting up DCOM for Windows XP. Research

Autograph 3.3 Network Installation

How to deploy Arkeia Network Backup v10 on Windows Server 2008 and later with a domain

Sharpdesk V3.5. Push Installation Guide for system administrator Version

DriveLock Quick Start Guide

Administrator s Guide

Automatic Network Deployment

Cloud Services ADM. Agent Deployment Guide

Installation Notes for Outpost Network Security (ONS) version 3.2

How to Configure Terminal Services for Pro-Watch in Remote Administration Mode (Windows 2000)

Windows Clients and GoPrint Print Queues

DeviceLock Management via Group Policy

User Document. Adobe Acrobat 7.0 for Microsoft Windows Group Policy Objects and Active Directory

Technical Reference: Deploying the SofTrack MSI Installer

Installation Instruction STATISTICA Enterprise Small Business

Deployment of Keepit for Windows

NetIQ Advanced Authentication Framework

CXM 4.5 Deployed on Windows Chad Adams October 28, 2009

TROUBLESHOOTING GUIDE

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014

STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS

2. Using Notepad, create a file called c:\demote.txt containing the following information:

Deploying Remote Desktop Connection Broker with High Availability Step-by-Step Guide

Secret Server Installation Windows 8 / 8.1 and Windows Server 2012 / R2

Comodo MyDLP Software Version 2.0. Endpoint Installation Guide Guide Version Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013

How to deploy SurveilStar PC/Internet Monitoring Software

Magaya Software Installation Guide

Dell UPS Local Node Manager USER'S GUIDE EXTENSION FOR MICROSOFT VIRTUAL ARCHITECTURES Dellups.com

Secunia CSI integrated with WSUS (SCCM)

Installation Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit

UNICORN 6.4. Administration and Technical Manual

ms-help://ms.technet.2005mar.1033/security/tnoffline/security/smbiz/winxp/fwgrppol...

Contents 1. Introduction 2. Security Considerations 3. Installation 4. Configuration 5. Uninstallation 6. Automated Bulk Enrollment 7.

Promap V4 ActiveX MSI File

Installation Guide - Client. Rev 1.5.0

DC Agent Troubleshooting

Create, Link, or Edit a GPO with Active Directory Users and Computers

How to Configure Microsoft System Operation Manager to Monitor Active Directory, Group Policy and Exchange Changes Using NetWrix Active Directory

Global VPN Client Getting Started Guide

Appendix B Lab Setup Guide

NETWRIX WINDOWS SERVER CHANGE REPORTER

Windows Firewall Configuration with Group Policy for SyAM System Client Installation

Adobe Acrobat 9 Deployment on Microsoft Windows Group Policy and the Active Directory service

ILTA HANDS ON Securing Windows 7

Active Directory Management. Agent Deployment Guide

Install SQL Server 2014 Express Edition

How To Upgrade A Websense Log Server On A Windows 7.6 On A Powerbook (Windows) On A Thumbdrive Or Ipad (Windows 7.5) On An Ubuntu (Windows 8) Or Windows

PC Power Down. MSI Deployment Guide

Use the below instructions to configure your wireless settings to connect to the secure wireless network using Microsoft Windows Vista/7.

Ascend Interface Service Installation

Virtual Office Remote Installation Guide

Setting Up SSL on IIS6 for MEGA Advisor

Moving the Web Security Log Database

Hosting Users Guide 2011

Cloud Attached Storage

SystemTools Software Inc. White Paper Series Hyena Installation Requirements

Configuring and Launching ANSYS FLUENT Distributed using IBM Platform MPI or Intel MPI

Deploying Microsoft RemoteFX on a Single Remote Desktop Virtualization Host Server Step-by-Step Guide

Administrator s Guide

Managing Windows Environments with Group Policy 50255D; 5 Days, Instructor-led

Transcription:

NetIQ Advanced Authentication Framework FIDO U2F Authentication Provider Installation Guide Version 5.1.0

Table of Contents 1 Table of Contents 2 Introduction 3 About This Document 3 System Requirements 4 Installing and Removing FIDO U2F Authentication Provider 5 Installing FIDO U2F Authentication Provider 5 RDS Farm Support 6 Removing FIDO U2F Authentication Provider 7 Microsoft Windows 7/Microsoft Windows Server 2008 R2 7 Microsoft Windows Server 2003/2003 R2 7 Microsoft Windows 8.1/Microsoft Windows Server 2012 7 Installing and Removing FIDO U2F Authentication Provider via Group Policy 8 Installing FIDO U2F Authentication Provider via Group Policy 9 Removing FIDO U2F Authentication Provider via Group Policy 10 Upgrading FIDO U2F Authentication Provider Components via Group Policy 11 Troubleshooting 12 Cannot Install FIDO U2F Authentication Provider 12 Index 13 2

Introduction About This Document Purpose of the Document This FIDO U2F Authentication Provider Installation Guide is intended for all user categories and describes how to use the client part of NetIQ Advanced Authentication Framework solution. In particular, it gives instructions as for how to install FIDO U2F authentication provider. For more general information on NetIQ Advanced Authentication Framework and the authentication software you are about to use, see NetIQ Advanced Authentication Framework Client User s Guide. Information on managing other types of authenticators is given in separate guides. Document Conventions This document uses the following conventions: Warning. This sign indicates requirements or restrictions that should be observed to prevent undesirable effects. Important notes. This sign indicates important information you need to know to use the product successfully. Notes. This sign indicates supplementary information you may need in some cases. Tips. This sign indicates recommendations. Terms are italicized, e.g.: Authenticator. Names of GUI elements such as dialogs, menu items, and buttons are put in bold type, e.g.: the Logon window. 3

System Requirements Before installing the product, check that the following system requirements are fulfilled: Microsoft Windows 7 (x64/x86) SP1 Microsoft Windows Server 2008 R2 SP1/Microsoft Windows Server 2003 (x64/x86) SP2/Microsoft Windows Server 2003 R2 (x64/x86) SP2/Microsoft Windows Server 2012 FIDO U2F authentication provider should be installed on the computer with already installed NetIQ Advanced Authentication Framework This authentication provider should be installed on every Authenticore Server. 4

Installing and Removing FIDO U2F Authentication Provider NetIQ Advanced Authentication Framework package includes FIDO authentication provider, which allows you to use the FIDO U2F security key for authentication. Installing FIDO U2F Authentication Provider The start of installation may be frozen for a time up to 1 minute in the case of offline mode. This delay occurs due to check of digital signature of component. To install FIDO U2F Authentication Provider: 1. Extend schema on server with an applicable server role. If the configured server role is: AD DS, schema extension should be performed on DC with Schema Admins privileges. AD LDS, schema extension should be performed on the unique AD LDS with Local Admins privileges. Follow the steps: a. Go to the FidoU2FBSP distributives folder. b. Open the Schema folder. c. If the configured server role is AD DS, open the AD folder. If the configured server role is AD LDS, open the ADAM folder. d. Run the biou2fdata.cmd file. e. Follow the schema extension. 2. Run the.msi file. FIDO U2F Authentication Provider will be automatically installed. 5

3. Restart your system for the configuration changes made to FIDO U2F authentication provider to take effect. Click Yes to restart the system immediately or No if you plan to restart it later manually. 4. Open the following certificate and copy it to the directory on Authenticore Server(s): C:\ProgramData\BSP\FIDO U2F BSP\whitelist. Save the file with the.crt extension. The certificate should be obligatory saved on every Authenticore Server. RDS Farm Support Before installing FIDO U2F authentication provider on the Remote Desktop Session Host (RD Session Host) server, follow the steps: 1. Install NetIQ Client and FIDO U2F AP on every RD Session Host server. 2. Install NetIQ Client and FIDO U2F AP on the thin client in the domain. To avoid additional authentication on the thin client, check the following article. 6

Removing FIDO U2F Authentication Provider In this chapter: Microsoft Windows 7/Microsoft Windows Server 2008 R2 Microsoft Windows Server 2003/2003 R2 Microsoft Windows Server 2012 Microsoft Windows 7/Microsoft Windows Server 2008 R2 1. In the Start menu, select Control panel and then double-click Programs and Features. 2. Select FIDO U2F Authentication Provider and click Uninstall. 3. Confirm the removal. 4. Wait a few seconds until the removal is completed. Microsoft Windows Server 2003/2003 R2 1. In the Start menu, select Settings > Control Panel > Add or Remove Programs. 2. Select FIDO U2F Authentication Provider and click Remove. 3. Confirm the removal. Microsoft Windows 8.1/Microsoft Windows Server 2012 1. In the Search menu, select Apps > Control Panel > Programs > Programs and Features. 2. Select FIDO U2F Authentication Provider and click Uninstall. 3. Confirm the removal. 4. Wait a few seconds until the removal is completed. 7

Installing and Removing FIDO U2F Authentication Provider via Group Policy It is recommended that Microsoft Windows Server 2003 users should install Group Policy Management Console. To install/remove NetIQ Advanced Authentication Framework Modules, use: Group Policy Management Console (GPMC), which is installed by default on a Domain Controller. To open GPMC, click Start and select Administrative Tools > Group Policy Management. Group Policy Management Editor (GPME), which can be opened from GPMC. To open GPME, under domain right-click the group policy object (GPO) you are using to install the software and select Edit. It is highly recommended that you do not use Default Group Policy, because it s applicable to entire domain. It is not recommended to install/upgrade client components for all workstations at the same time. To create new group policy and configure it: 1. Create new global security group and new group policy object. 2. Connect them: a. Open created group policy object properties; b. Go to the Security tab; c. Remove Apply Group Policy option for Authenticated Users group; d. Add created group and mark Apply Group Policy option for it. 8

Installing FIDO U2F Authentication Provider via Group Policy To install FIDO U2F authentication provider using the group policy: 1. In GPME, in the selected GPO under Computer configuration > Policies > Software Settings, right-click Software Installation and select New > Package. 2. Specify the network path to the installer package. The directory you are willing to install should be located on network drive. 3. In the Deploy Software dialog, select the Assigned option and click OK. 4. The installer package name, version, state and path are displayed in Group Policy Management Editor. 5. Open package properties: a. On the Deployment tab: clear the Uninstall this application when it falls out of the scope of management check box. It is done to prevent undesirable uninstallation in case of problems as well as for the upgrade to go properly. b. On the Deployment tab: click the Advanced button and select the Ignore language when deploying this package check box. If you do not select this check box, the package will be installed only on OS with package s language. c. Clear the Make this 32-bit X86 application available to Win64 machines check box (if this option is available). 6. Add appropriate 64-bit installer to this group policy object and use settings 5a-5b. The assigned package is installed after you have updated the domain policy and restarted your computer. To update the domain policy immediately, use the gpupdate /force command. 9

Removing FIDO U2F Authentication Provider via Group Policy To remove FIDO U2F authentication provider using the group policy: 1. In GPME, under Computer Configuration > Software Settings > Software installation, right-click the deployed package and select All tasks > Remove. 2. In the Remove Software dialog, click Immediately uninstall the software from users and computers and then click OK. The package is removed after you have updated the domain policy and restarted your computer. To update the domain policy immediately, use the gpupdate /force command. If you have removed option Uninstall this application when it falls out of the scope of management as it was recommended, software will not be uninstalled after selecting Immediately uninstall the software from users and computers. In this case, you will need to uninstall it via Programs and Features/Add or remove programs. Also see Removing FIDO U2F Authentication Provider chapter. 10

Upgrading FIDO U2F Authentication Provider Components via Group Policy Option 1: You can add.msi package with new component version to an existing group policy object. However, this option does not prove to be good, because in case of any problems in new version of component, these problems spread on all computers in installation group. Option 2: The more reliable upgrading procedure implies creating new group policy object for new installers: 1. Create new installation group and new Group Policy Object (GPO), add a new.msi package in it. 2. After having configured software installation, go to Upgrades tab of package properties. 3. Press Add button. 4. In Add Upgrade Package dialog please select A specific GPO option. 5. Select a GPO which was used for installation of previous NetIQ Advanced Authentication Framework version. 6. Select.msi package name. 7. Select option Uninstall the existing package, then install the upgrade package. Make sure that your new GPO is above the old one in the GPO list. 11

Troubleshooting This chapter provides solutions for known issues. If you encounter any problems that are not mentioned here, please contact the support service. Cannot Install FIDO U2F Authentication Provider Description: Error appears when installing FIDO U2F authentication provider on your computer. Cause: a. You have no space left on the disk. b. You are installing FIDO U2F authentication provider on the OS with the wrong bitness. c. You are installing card authentication provider before installing NetIQ Advanced Authentication Framework. Solution: a. Free the amount of disk space needed for installation. b. Check your OS s bitness (x64/x86) and run the corresponding installer (x64/x86). c. Install NetIQ Advanced Authentication Framework first. 12

Index A Authentication 1, 3-5, 7-12 Authenticator 3 C Client 3, 6 Console 8 Control 7 Control panel 7 Create 8, 11 D Default 8 Domain 8 E Error 12 G GPMC 8 GPME 8-10 L Local 5 Logon 3 M Microsoft Windows Server 2003 7-8 Microsoft Windows Server 2008 4 Microsoft Windows Server 2012 7 P Package 9, 11 Policy 8-9 R Remote 6 Remove 7-8, 10 13

S Security 8 Server 4, 6 Settings 7 Software 9-10 Support 6 System 4 W Windows 7 4, 7 Windows 8 7 14