Imprivata ID for Windows Access

This topic provides an overview of Imprivata ID for Windows Access, what you need to deploy it in your enterprise, and roll it out to users.

Adding Imprivata ID to Windows access is ideal when an extra layer of security is needed for certain users and/or certain computers; for example, administrative accounts or access to virtual desktop servers.

When the user logs into Windows with his username and password, Imprivata ID sends a push notification to his device. He accepts and is granted access.

Number Matching authentication is not available for this workflow.

The user can be prompted to download Imprivata ID and enroll before and/or after the desktop opens.

The user must have a supported iOS or Android device and the Imprivata ID app installed; no additional hardware is required at the endpoint computer to support this workflow.

Licensing Considerations

Unlike other desktop authentication methods that require an Authentication Management license, when you enable Imprivata ID for Windows Access, each user in that policy only counts towards your Confirm ID for Remote Access license total. See Imprivata Licensed Features

Enroll Users

Your users can download and install the Imprivata ID app at any time. They are not prompted to enroll Imprivata ID or use it to authenticate until they are included in a user policy that requires Imprivata ID for authentication.

Based on the required Imprivata ID feature, make sure that the following requirements are met.

NOTE: Unless otherwise noted, a requirement applies to all Imprivata ID features.

iOS Requirements

  • iOS 11 or later installed.

  • An active Internet connection is required to enroll Imprivata ID, as well as to send log files to Imprivata.

  • Hands Free Authentication:

    • Bluetooth enabled.
    • Access to Location Services (Always).
    • An active Internet connection is not required for Hands Free Authentication or manual token code entry.
  • Remote Access:

    • Notifications enabled.
    • An active Internet connection is required for push notifications.
  • Secure Walk Away

    • iPhone 6s or later.

    • Access to Location Services (Always), Bluetooth Sharing, and Motion & Fitness is required.

  • QR code for direct access to the download page on the iTunes App Store:

Android Requirements

  • Android 6 or later installed.

  • An active Internet connection is required to enroll Imprivata ID, as well as to send log files to Imprivata.

  • Hands Free Authentication:

    • Bluetooth enabled.
    • An active Internet connection is not required for Hands Free Authentication or manual token code entry.

  • Remote Access:

    • Notifications enabled.

    • An active Internet connection is required for push notifications.

  • Secure Walk Away:

    • Samsung Galaxy S7 or later.

    • Google Pixel 1 or later.

    • OnePlus 6 or later.

    • Bluetooth enabled.

  • QR code for direct access to the download page on Google Play:

Require Imprivata ID for Windows Access

There are several methods to enable Imprivata ID for Windows Access. You can set up either of these or both:

  • User Requirement — Require all users in a policy complete two-factor authentication with Imprivata ID every time they authenticate at any endpoint computer.
  • Computer Requirement — Require Imprivata ID for Windows Access only at specific desktops.

The Imprivata Credential Provider and Windows Login

If your enterprise is licensed for Imprivata Confirm ID Remote Access but you do not have an Imprivata Authentication Management or Single Sign-On license, the Imprivata credential provider does not appear when logging into Windows workstations. You must override log in and locking of Windows workstations and use the Imprivata credential provider to manage logging into Windows workstations instead:

Configure Workstations to Use the Imprivata Credential Provider

  1. In the Imprivata Admin Console, go to ComputersComputer Policies.
  2. Select a computer policy where the Imprivata credential provider must be used.
  3. Go to the General tab > Desktop experience section.  If the Windows credential provider is in use, Override log in and locking of the Windows workstation is selected here.
  4. Uncheck Override log in and locking of the Windows workstation.
  5. Click Save.

Repeat this process for any other computer policies that will require Imprivata ID for Windows access.

Ensure Access for Non-Imprivata Users

If your enterprise is licensed for Imprivata Confirm ID Remote Access but you do not have an Imprivata Authentication Management or Single Sign-On license, users who are not synchronized with the Imprivata user database or configured to use Imprivata ID for Windows Access can still log into Windows.

When the Imprivata credential provider appears on a Windows desktop and a non-Imprivata user enters their username and password, OneSign authentication fails (because they're not in the Imprivata user database), but if Windows local authentication succeeds, are allowed to log in.

BEST PRACTICE:

To allow non-OneSign users to log in, you can add them to an Active Directory or Local group, and allow this Local group to authenticate to Windows if OneSign authentication fails.

To confirm the default setting in the Imprivata Admin Console:

  1. In the Imprivata Admin Console, go to ComputersComputer policies.

  2. Select a computer policy where Imprivata ID for Windows Access is required.

  3. Go to the General tab > Authentication section.

  4. Verify that If OneSign authentication fails, but Windows authentication succeeds, should the user be allowed to log in to the computer? to Yes.

  5. Click Save.

  6. Repeat this process for any other computer policies where non-Imprivata users must be able to log in.

Troubleshooting