SafeNet Agent for Windows Logon - Preview
This is a preview feature. Contact Thales Customer Support to request access to preview features.
Product Description
SafeNet Agent for Windows Logon is designed to help Microsoft enterprise customers ensure that valuable resources are accessible only by authorized users. It delivers a simplified and consistent user login experience, virtually eliminates help desk calls related to password management, and helps organizations comply with regulatory requirements.
The use of Two-Factor Authentication (2FA) instead of just traditional static passwords to access a Windows environment is a critical step for information security.
For information about the released features, see: SafeNet Agent for Windows Logon.
For a list of existing issues as of the latest release, refer to Known Issues.
Release Description
SafeNet Agent for Windows Logon v4.2.1 supports FIDO2 authenticators.
Preview Release Disclaimer
Release intent: Thales preview releases are short-lived and made available to customers “On Demand”, allowing them to provide feedback and explore upcoming feature/s specific to the preview release. Release caveats: - Non-production usage: Preview releases are not intended for use in production environments and Thales will not provide support for the production use of preview releases. - Limited functionality: Preview releases may have limited or restricted functionality and there are no warranties for such releases. - Support: Preview releases may be changed or discontinued. Upgrades from previous and upgrade to upcoming GA versions of the product are not supported.
FIDO2 token
This release supports FIDO2 (Fast IDentity Online) authenticators. It is a set of open standards designed to provide phishing-resistant and strong authentication. FIDO authentication in the Windows Logon Agent aims to eliminate passwords for online authentication, offering a more secure and user-friendly experience.
FIDO support in this release is tested with Thales FIDO tokens.
Two registry settings, PasswordlessEnabled and PasswordlessGroup, have been added to support passwordless logon along with FIDO authenticators. For more details, see registry settings.
While authenticating with passwordless logon using a FIDO token, ensure that you configure the registry settings as they are in passwordless logon policy for other tokens.
For additional information about the preview features, see: system requirements, pre-installation, running the solution, and troubleshooting.
Limitations of authentication using a FIDO2 token with WLA
-
Lack of support for platform authenticators: Platform-based authenticators such as Windows Hello and biometric sensors are not compatible.
-
No support for offline authentication: Offline authentication is not supported. Users must possess an offline supported authenticator, however, at least one online authentication must be performed using this authenticator.
-
Unsupported scenarios: Remote Desktop Protocol (RDP), Outgoing RDP connections, and Credential User Interface (CredUI) operations are not supported.
-
Multi-language feature is not supported. The text will be displayed in English by default.
Known Issues
| Issue | Synopsis |
|---|---|
| SASNOI-22603 | Summary: If Allow Outgoing RDP without OTP in the WLA management console is disabled, then FIDO authentication does not work. Workaround: None. Ensure to enable the setting always. |
| SAS-74515 | Summary: While performing logon using the FIDO security key, user is redirected to the Passcode screen. Workaround: None. Report and share logs with the Thales support team. |
| SASNOI-22590 | Summary: The Security key option does not appear on the list of authenticators at the login screen. This is an intermittent issue and will be resolved in a future release. Workaround: Close the list of authenticators screen, switch to a different user tile, and then continue the authentication. |
| SASNOI-22519 | Summary: While enrolling a user for passwordless using FIDO token, the Windows security pop-up displays an untrusted app warning for SafeNet Desktop Logon.exe. Workaround: None. It will be resolved in a future release. |