Enterprise Access Management Authentication for Smart Cards or USB Tokens with Microsoft Active Directory (AD) Certificates

Imprivata OneSign supports smart card and smart USB token authentication via the Windows Local Security Authority and Kerberos Security. Smart card and USB token authentication use the same Imprivata OneSign settings.

Smart cards and smart USB tokens provide two-factor authentication by combining a user PIN with a pre-programmed smart card or USB token. Smart cards are valid until the expiration date of the digital certificate on the card, normally valid for two or more years.

In SSO environments, smart card authentication grants network access and an SSO session in a single step. Smart card-enabled users authenticating to Imprivata OneSign use a smart card and associated PIN. Imprivata OneSign makes no difference to the user experience of logging into Windows.

When you authorize users for authentication with smart cards that use Active Directory certificates, you must have a Kerberos Keytab File uploaded to the Imprivata OneSign server as detailed in Creating a Kerberos Keytab File.

Conditional primary methods are primary authentication methods that can be used only under the condition that the user authenticated with the smart card within the allowed period.

This topic describes smart cards and USB tokens with certificates issued by Microsoft Active Directory (AD). Smart cards/USB tokens with certificates issued by an external agency are described in Authentication for Smart Cards or USB Tokens with External Certificates.

For a complete list of supported smart cards, see Imprivata OneSign Supported Components.

NOTE: There is no separate enrollment step for Active Directory smart cards. Enrolling for smart card/USB token use in Active Directory automatically enrolls the user for use in Imprivata OneSign.

To create and run an Enrollment report, in the Imprivata Admin Console, go to Reports > Add new report.