This website uses cookies. By clicking Accept, you consent to the use of cookies. Click Here to learn more about how we use cookies.
Accept
Reject
  • RSA.com
  • Home
  • Advisories
    • SecurID
    • SecurID Governance & Lifecycle
  • Documentation
    • SecurID
      • Authentication Agents
        • API / SDK
        • Apache Web Server
        • Citrix StoreFront
        • IIS Web Server
        • MFA Agent for macOS
        • MFA Agent for Windows
        • Microsoft AD FS
        • Microsoft Windows
        • PAM
      • Authentication Engine
      • Authentication Manager
      • Cloud Authentication Service
      • Hardware Appliance
        Component Updates
      • Hardware Tokens
      • Integrations
      • SecurID App
      • SecurID Authenticator for macOS
      • SecurID SDK
      • Software Tokens
        • Android
        • iOS
        • macOS
        • Token Converter
        • Windows
    • SecurID Governance & Lifecycle
    • Technology Partners
  • Downloads
    • SecurID
      • Authentication Agents
        • API / SDK
        • Apache Web Server
        • Citrix StoreFront
        • IIS Web Server
        • MFA Agent for macOS
        • MFA Agent for Windows
        • Microsoft AD FS
        • Microsoft Windows
        • PAM
      • Authentication Engine
      • Authentication Manager
      • Cloud Authentication Service
      • Hardware Appliance
        Component Updates
      • Hardware Tokens
      • Integrations
      • SecurID Authenticator for macOS
      • Software Tokens
        • Android
        • iOS
        • macOS
        • Token Converter
        • Windows
    • SecurID Governance & Lifecycle
  • Community
    • SecurID
      • Blog
      • Discussions
      • Events
      • Idea Exchange
      • Knowledge Base
    • SecurID Governance & Lifecycle
      • Blog
      • Discussions
      • Events
      • Idea Exchange
      • Knowledge Base
  • Support
    • Case Portal
      • Create New Case
      • View My Cases
      • View My Team's Cases
    • Community Support
      • Getting Started
      • News & Announcements
      • Ideas & Suggestions
      • Community Support Articles
      • Community Support Forum
    • Product Life Cycle
    • Support Information
    • General Security Advisories
  • Education
    • Blog
    • Browse Courses
      • SecurID
      • SecurID Governance & Lifecycle
    • Certification Program
    • New Product Readiness
    • Student Resources
Sign In Register Now
cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Search instead for 
Did you mean: 
Announcements

SecurID® Discussions

Browse the SecurID discussion board to get product help and collaborate with other SecurID users.
  • SecurID Community
  • :
  • Products
  • :
  • SecurID
  • :
  • Discussions
  • :
  • After a user RDP's to a server what group policies does a Admin need to only allow the SID 800 hardw...
  • Options
    • Subscribe to RSS Feed
    • Mark Topic as New
    • Mark Topic as Read
    • Float this Topic for Current User
    • Bookmark
    • Subscribe
    • Mute
    • Printer Friendly Page
AndreLocker
AndreLocker Occasional Contributor
Occasional Contributor
‎2016-09-06 12:43 PM
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

After a user RDP's to a server what group policies does a Admin need to only allow the SID 800 hardware token as the only logon option?

Jump to solution

What is the best way to:
1) Only have the RSA SID 800 logon option from the windows logon page whens users RDP into a specific server. What Group policies to do i have to have enabled or disabled?
2) Remove the additional challenge for windows logon credentials after being authenticated by RSA.

 

In the end what i want to achieve is be able to have a user Remote Desktop into server be challenged by RSA for two factor authentication and then have access to the server as per normal.

 

Thanks

Labels (1)
Labels
  • Labels:
  • Authenticators

  • Tags:
  • Authenticator
  • Authenticators
  • Community Thread
  • Discussion
  • Forum Thread
  • group policies
  • rdp
  • RSA SecurID
  • RSA SecurID Access
  • SecurID
  • sid 800
  • sid800
  • Token
  • Token Auth
  • Token Authentication
  • Token Authenticator
  • Token Authenticators
0 Likes
Share
Reply
  • All forum topics
  • Previous Topic
  • Next Topic
1 Solution

Accepted Solutions
HusseinElBaz
Employee HusseinElBaz
Employee
‎2016-09-07 04:01 AM
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Jump to solution

Hello Andre,

 

To have the RSA SID 800 only enabled, please follow the below

 

1) gpedit.msc

2) Go to Administrative Templates -> Classic Administrative Templates (ADM) -> RSA Desktop -> Credential Provider Filter Settings

3) Then change the Setting to 'Enabled' for all the Settings except the one that you want to appear on the logon screen.

4) Then open Windows cmd and type gpupdate /force and press Enter.

5) Log off from the desktop and try to login again.

 

There is no way to bypass the windows password authentication, but you can use the 'Windows Password Integration" option from RSA.

 

You can configure RSA Authentication Agent for Microsoft Windows so that the Windows password is integrated into the SecurID logon process. When you configure Authentication Agent in this way, users provide their Windows passwords only during their initial online authentication.

 

And you can configure that option from the Security Console, click Authentication > Policies > Offline Authentication Policies > Manage Existing. Then enable the Windows Password Integration Option.

 

So kindly check and advise us back if there is any assistance needed from our side.

 

Best Regards,

View solution in original post

2 Likes
Share
Reply
2 Replies
HusseinElBaz
Employee HusseinElBaz
Employee
‎2016-09-07 04:01 AM
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Jump to solution

Hello Andre,

 

To have the RSA SID 800 only enabled, please follow the below

 

1) gpedit.msc

2) Go to Administrative Templates -> Classic Administrative Templates (ADM) -> RSA Desktop -> Credential Provider Filter Settings

3) Then change the Setting to 'Enabled' for all the Settings except the one that you want to appear on the logon screen.

4) Then open Windows cmd and type gpupdate /force and press Enter.

5) Log off from the desktop and try to login again.

 

There is no way to bypass the windows password authentication, but you can use the 'Windows Password Integration" option from RSA.

 

You can configure RSA Authentication Agent for Microsoft Windows so that the Windows password is integrated into the SecurID logon process. When you configure Authentication Agent in this way, users provide their Windows passwords only during their initial online authentication.

 

And you can configure that option from the Security Console, click Authentication > Policies > Offline Authentication Policies > Manage Existing. Then enable the Windows Password Integration Option.

 

So kindly check and advise us back if there is any assistance needed from our side.

 

Best Regards,

2 Likes
Share
Reply
AndreLocker
AndreLocker Occasional Contributor
Occasional Contributor
In response to HusseinElBaz
‎2016-09-13 04:46 PM
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Jump to solution

This helped thx!

2 Likes
Share
Reply
Powered by Khoros
  • Blog
  • Events
  • Discussions
  • Idea Exchange
  • Knowledge Base
  • Case Portal
  • Community Support
  • Product Life Cycle
  • Support Information
  • Customer Success
  • About the Community
  • Terms & Conditions
  • Privacy Statement
  • Provide Feedback
  • Employee Login
© 2022 RSA Security LLC or its affiliates. All rights reserved.