Certificate Template for Security Keys and Smart Cards (Non-exportable Keys)
This document describes how to create a separate certificate template with non-exportable private keys for use with physical security keys and smart cards only. Do not use this template for HYPR Mobile App pairings; mobile requires a template that allows exportable private keys. With the non-exportable template, the private key is generated on the security key or smart card and never leaves the device. Recovery PINs are not available for users who pair with this template.
Complete Steps 1–6 of Creating a Custom Certificate Template (General tab only). Then return here to complete the template for security keys and smart cards.
Complete the non-exportable template
-
(WINDOWS ONLY) Go to the Request Handling tab and change the following settings:
Parameter Value Purpose Signature and smartcard logon Allow private key to be exported Unchecked Prompt the user during enrollment Selected -
Go to the Subject Name tab and change the following settings:
Parameter Value Build from this Active Directory information Checked Subject name format None User principal name (UPN) Checked Important Security Patch Notice for Windows Server 2019 and 2022In January 2025, security patches were released for Windows Server 2019 and 2022. Unfortunately, one of these patches introduced an incompatible fix that caused issues with certificates containing empty 'Subject Name'.
If you're running Domain Controllers on this patch version and cannot upgrade to a later security patch (February 2025 or later), Microsoft offers a Known Issue Rollback as a workaround. To apply this fix, please contact HYPR support for guidance.
-
(WINDOWS ONLY) Go to the Extensions tab and edit Application Policies so that the only listed policies are Client Authentication and Smart Card Logon. (Remove any default policies as necessary)
-
(WINDOWS ONLY) On the Cryptography tab:
-
Minimum key size: HYPR supports a minimum of 1024-bit encryption but recommends you use 2048-bit RSA private keys
-
Provider Category: Select Key Storage Provider
-
Choose which cryptographic providers can be used for requests: Select Requests must use one of the following providers
-
Providers: Check Microsoft Smart Card Key Storage Provider
-
-
Select OK to close the Properties of New Template window and create the template.
After creating the template, issue it on the server and configure the HYPR Passwordless client to use the securityKeyCertTemplate parameter for security key and smart card pairings. See Installing Manually for parameter definitions.